Applied Cryptography for Wireless Networks Exam Questions - 504 Verified Questions

Page 1


Applied Cryptography for Wireless Networks

Exam Questions

Course Introduction

This course explores the principles and practices of cryptographic techniques specifically tailored for wireless network environments. Students will examine modern encryption algorithms, key management protocols, and authentication mechanisms that address the unique security challenges posed by wireless communication, such as eavesdropping, spoofing, and denial-of-service attacks. Emphasis is placed on the practical application of cryptographic solutions in wireless protocols like Wi-Fi and mobile networks, as well as the design of secure systems for emerging wireless technologies. By the end of the course, students will be equipped to evaluate, implement, and enhance cryptographic protections in real-world wireless network scenarios.

Recommended Textbook

CWSP Guide to Wireless Security 1st Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1118 Page 2

Chapter 1: Foundations of Wireless Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21967

Sample Questions

Q1) A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.

Answer: zero day

Q2) Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.

A) 802.11n

B) WiMAX

C) VoWLAN

D) 802.11i

Answer: C

Q3) The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.

A) 802.1

B) 802.3

C) 802.8

D) 802.11

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Wireless LAN Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21968

Sample Questions

Q1) A(n) ____________________ acts as the central base station for the wireless network.

Answer: access point (AP) access point

AP

Q2) Deploying dynamic WEP is a very expensive solution that involves a lot of effort.

A)True

B)False

Answer: False

Q3) At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.

A) association request frame

B) CRC

C) ICV

D) beacon frame

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Passive Wireless Discovery

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21969

Sample Questions

Q1) Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.

A) warchalking

B) phishing

C) pharming

D) dumpster diving

Answer: A

Q2) The smallest mobile computing device is a(n) ____________________.

Answer: personal digital assistant (PDA)

personal digital assistant

PDA

Q3) ____ is a version of NetStumbler that runs on handheld devices.

A) KisMAC

B) MiniStumbler

C) AiroPeek

D) Kismet

Answer: B

Q4) ____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.

Answer: Google phishing

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Active Wireless Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21970

Sample Questions

Q1) A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.

Q2) Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.

A) ISM

B) CSMA/CD

C) CSMA/CA

D) IPSec

Q3) ____ is a service that allows devices on a network to discover other devices and determine how to work with them.

A) IPSec

B) SNMP

C) UPnP

D) PnP

Q4) What are some of the symptoms that indicate a virus has infected a computer?

Q5) What are some of the characteristics of weak passwords?

Q6) With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Wireless Security Models

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21971

Sample Questions

Q1) WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.

Q2) What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?

Q3) The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A) supplicant

B) authenticator

C) authentication server

D) RADIUS

Q4) The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.

A) personal security

B) enterprise security

C) SOHO security

D) transitional security

Q5) What are the steps involved in the 802.1x authentication procedure?

Q6) WPA replaces WEP with an encryption technology called ____________________.

Q7) What are the TKIP major components?

Q8) What are some of the PSK key management weaknesses?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enterprise Wireless Hardware Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21972

Sample Questions

Q1) A highly directional antenna focuses the energy in one direction but does not have the high power level of a semi-directional antenna.

A)True

B)False

Q2) A(n) ____ switch supports both control and monitoring of the network.

A) unmanaged

B) managed

C) free

D) wireless

Q3) In the ____ access control, the user can adjust the permissions for other users over network devices.

A) mandatory

B) discretionary

C) role based

D) temporal

Q4) What are the three basic types of filtering?

Q5) What are some of the advantages and disadvantages of ad hoc wireless mesh networks?

Q6) What are some of the features of the IEEE 802.11v protocol?

Q7) Describe the main characteristics of transmit power control (TPC).

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Designing a Secure Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21973

Sample Questions

Q1) One standard for marking VLAN packets is the IEEE ____ standard.

A) 802.1q

B) 802.1r

C) 802.1v

D) 802.1z

Q2) Why is diversity necessary to provide better security?

Q3) A firewall is sometimes called a ____.

A) bridge

B) hub

C) packet filter

D) repeater

Q4) A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.

Q5) What is security by obscurity?

Q6) The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files

B) definition files

C) TPID files

D) infection files

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Secure Wireless Authentication

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21974

Sample Questions

Q1) Identify the types of information typically included in a digital certificate.

Q2) ____ uses the unique human characteristics of a person for authentication (something the user is).

A) Digital certificates

B) Passwords

C) Biometrics

D) Password tokens

Q3) What are the primary differences between LDAP and DAP?

Q4) LDAP was developed by Microsoft and the University of Michigan in 1996.

A)True

B)False

Q5) The ____ is used by the EAP key exchanges to provide confidentiality.

A) KEK

B) KCK

C) WPAK

D) nonce key

Q6) EAP was originally defined for dial-up access but is now used for both wired and wireless access.

A)True

B)False

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Secure Wireless Transmissions

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21975

Sample Questions

Q1) How does SCP work?

Q2) What are the areas of protection provided by IPsec?

Q3) The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.

Q4) SSH can even be used as a tool for secure network backups.

A)True

B)False

Q5) A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.

Q6) An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.

A) network access server (NAS)

B) Layer 2 Tunneling Protocol (L2TP)

C) IP Security (IPsec)

D) Link Control Protocol (LCP)

Q7) ____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).

Q8) Briefly describe how SNMP works.

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing the Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21976

Sample Questions

Q1) A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.

A) AP trap

B) CDP trap

C) WLAN trap

D) SNMP trap

Q2) A more proactive approach than intrusion detection is a(n) ____.

A) RF fingerprinting

B) trilateration system

C) RSSI system

D) intrusion prevention system (IPS)

Q3) ____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.

Q4) All wireless network interface card adapters can act as a wireless device probe.

A)True

B)False

Q5) What are the steps to perform a mobile sniffing audit?

Q6) What is the key to wireless probes?

12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Wireless Security Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21977

Sample Questions

Q1) What are the layers of information security?

Q2) Identifying assets is a fairly simple and quick process.

A)True

B)False

Q3) A ____ is a collection of suggestions that should be implemented.

A) code of ethics

B) guideline

C) standard

D) policy

Q4) A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.

A) threat modeling

B) risk assessment

C) attack tree

D) attack modeling

Q5) A(n) ____ outlines the actions to be performed when a security breach occurs.

A) risk identification

B) threat modeling

C) risk management

D) incident response

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Operational Support and Wireless Convergence

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21978

Sample Questions

Q1) Briefly describe traffic filtering.

Q2) Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

A) pedagogical

B) neurological

C) visual

D) kinesthetic

Q3) Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.

Q4) ____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation

B) Configuration management

C) Monitoring

D) Education

Q5) All computer users share responsibility for protecting the assets of an organization.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Applied Cryptography for Wireless Networks Exam Questions - 504 Verified Questions by Quizplus - Issuu