

Computer Networks
Exam Review
Course Introduction
Computer Networks explores the fundamental principles, technologies, and architectures that enable the exchange of data and resources across interconnected computer systems. The course covers key topics such as network models, protocols, transmission media, data link and network layers, routing algorithms, flow and congestion control, wireless and wired networks, and network security. Through lectures and hands-on projects, students gain a thorough understanding of how the Internet and other networks operate, as well as practical skills in network design, implementation, and troubleshooting.
Recommended Textbook
CWSP Guide to Wireless Security 1st Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1118

Page 2

Chapter 1: Foundations of Wireless Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21967
Sample Questions
Q1) Briefly explain how wireless technology increases network reliability.
Answer: One of the main sources of wired network problems is network cable failure. Moisture from a leak during a thunderstorm or a coffee spill can erode metallic conductors. A user who shifts the computer on his or her desk may break one or more of the wires in a patch cable. A cable splice that is done incorrectly can cause problems that result in intermittent errors that are very difficult to identify. Using wireless LAN technology eliminates these types of cable failures and increases the overall reliability of the network.
Q2) Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.
A) mobility
B) network reliability
C) installation costs
D) security
Answer: D
Q3) The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Answer: information security
To view all questions and flashcards with answers, click on the resource link above. Page 3
Chapter 2: Wireless LAN Vulnerabilities
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21968
Sample Questions
Q1) To encrypt packets WEP can use only a 64-bit or ____-bit number.
A) 72
B) 90
C) 110
D) 128
Answer: D
Q2) Changing the original text to a secret message using cryptography is known as ____.
A) ciphertext
B) decryption
C) encryption
D) plaintext
Answer: C
Q3) The SSID can be easily discovered even when it is not contained in beacon frames.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Passive Wireless Discovery
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21969
Sample Questions
Q1) Promiscuous mode will not work on a WLAN.
A)True
B)False
Answer: True
Q2) Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.
A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
Answer: A
Q3) At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.
A) phishing
B) beaconing
C) pharming
D) mapping
Answer: B
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Active Wireless Attacks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21970
Sample Questions
Q1) What are some of the symptoms that indicate a virus has infected a computer?
Q2) A ____ program creates fake packets and flood the wireless network.
A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
Q3) Briefly describe how to perform a wired network DoS attack.
Q4) Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.
A) Physical
B) MAC
C) Network
D) Application
Q5) Authentication can be performed based on what you have, what you know, or what you are.
A)True
B)False
Q6) What are the problems of using community strings in SNMP?
Q7) What are the problems with using default passwords?
Q8) What are some of the characteristics of weak passwords?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wireless Security Models
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21971
Sample Questions
Q1) How do TKIP and MIC perform encryption in the WPA personal security model?
Q2) When should you use the transitional security model?
Q3) AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.
Q4) What are some of the reasons why turning off SSID beaconing provides a limited degree of security?
Q5) The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Q6) WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.
A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys
Q7) WPA replaces WEP with an encryption technology called
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enterprise Wireless Hardware Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21972
Sample Questions
Q1) In the ____ access control, the user is not allowed to give access to another user to use or access anything on the network.
A) mandatory
B) role based
C) discretionary
D) temporal
Q2) The IEEE ____ protocol allows a wireless client to determine the QoS (and security) being used at a different AP before making the transition.
A) 802.11e
B) 802.11F
C) 802.11q
D) 802.11r
Q3) Like hubs, network switches are capable of inspecting data packets as they are received.
A)True
B)False
Q4) Describe the main characteristics of transmit power control (TPC).
Q5) What are the three basic types of filtering?
Q6) What are the four operational mode supported by remote wireless bridges?
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Designing a Secure Wireless Network
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21973
Sample Questions
Q1) What are some of the features and tools provided by antispyware products?
Q2) ____ is used to create smaller segments for security purposes.
A) CSMA/CA
B) CSMA/CD
C) Ethernet
D) Segmentation
Q3) The foundation of a firewall is a(n) ____________________.
Q4) A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.
Q5) ____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.
Q6) What are some of the advantages of using NAT?
Q7) A firewall is sometimes called a ____.
A) bridge
B) hub
C) packet filter
D) repeater
Q8) How does Microsoft classify patches?
Q9) Briefly describe how to create wireless VLANs using switches.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Secure Wireless Authentication
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21974
Sample Questions
Q1) The International Organization for Standardization (ISO) created a standard for directory services known as ____.
A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
Q2) Entries in the DIB are arranged in a tree structure called the ____________________.
Q3) Identify the types of information typically included in a digital certificate.
Q4) A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.
A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
Q5) How does Kerberos work?
Q6) The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
Q7) What are the primary differences between LDAP and DAP?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Secure Wireless Transmissions
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21975
Sample Questions
Q1) Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
A)True
B)False
Q2) Briefly describe how SNMP works.
Q3) L2TP is only supported by Windows 2000 versions and higher.
A)True
B)False
Q4) In IPsec, key management is accomplished through a protocol known as ____.
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Q5) How does SCP work?
Q6) Why is IPsec considered a transparent protocol?
Q7) The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.
Q8) An enhanced feature of SSH is known as port forwarding, also called
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Managing the Wireless Network
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21976
Sample Questions
Q1) A ____ constantly monitors the radio frequency (using wireless probes) for attacks.
A) wireless intrusion detection system (WIDS)
B) wireless AP detection system (WADS)
C) rogue AP prevention system (RAPS)
D) rogue AP detection system (RADS)
Q2) A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.
A) signature detection
B) anomaly detection
C) known attacks detection
D) pattern detection
Q3) A more proactive approach than intrusion detection is a(n) ____.
A) RF fingerprinting
B) trilateration system
C) RSSI system
D) intrusion prevention system (IPS)
Q4) Global positioning systems (GPS) are widely used in 802.11 WLANs.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Wireless Security Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21977
Sample Questions
Q1) A(n) ____ provides a visual image of the attacks that may occur against an asset.
A) asset tree
B) attack tree
C) asset modeling
D) asset identification
Q2) The ____ is the expected monetary loss that can be expected for an asset because of a risk over a one-year period.
A) Exposure Factor (EF)
B) Annualized Rate of Occurrence (ARO)
C) Annualized Loss Expectancy (ALE)
D) Single Loss Expectancy (SLE)
Q3) What are the characteristics of a policy?
Q4) A(n) ____ policy should clearly address how passwords are managed.
A) password management
B) VPN
C) acceptable use
D) WLAN use
Q5) What are the types of assets available at any organization?
Q6) What are the options faced by an organization when confronted with a risk?
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Operational Support and Wireless Convergence
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21978
Sample Questions
Q1) ____, or controlling changes made to the WLAN after installation, is another key element of operational support.
A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
Q2) Why is it important to train and educate all network users?
Q3) Briefly describe traffic filtering.
Q4) IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.
A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
Q5) All computer users share responsibility for protecting the assets of an organization. A)True
B)False
Q6) What elements can be identified using WLAN monitoring tools?
Page 14
To view all questions and flashcards with answers, click on the resource link above.