Information Security Question Bank - 504 Verified Questions

Page 1


Information Security

Question Bank

Course Introduction

Information Security is a comprehensive course that introduces students to the principles and practices used to protect digital information and systems from unauthorized access, misuse, or destruction. The course covers foundational topics such as cryptography, network security, access control, authentication, security policies, and risk management. Students will also explore real-world security challenges, including malware, social engineering, and vulnerabilities in software and hardware. Through lectures, hands-on labs, and case studies, students gain the skills necessary to identify potential threats, implement security measures, and respond effectively to security incidents in various organizational contexts.

Recommended Textbook

CWSP Guide to Wireless Security 1st Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1118

Page 2

Chapter 1: Foundations of Wireless Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21967

Sample Questions

Q1) A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.

Answer: zero day

Q2) The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.

A) 802.1

B) 802.3

C) 802.8

D) 802.11

Answer: D

Q3) ____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures.

A) Information security

B) VoWLAN

C) FCC

D) FDA

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Wireless LAN Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21968

Sample Questions

Q1) The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.

A) SSID broadcast

B) handoff

C) roaming

D) scanning

Answer: C

Q2) ____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.

A) WEP2

B) Dynamic WEP

C) SSID

D) Roaming

Answer: B

Q3) WEP relies on a secret key shared between a wireless client device and the access point.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Passive Wireless Discovery

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21969

Sample Questions

Q1) The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

A) community strings

B) management information base (MIB)

C) packet sniffers

D) flash memories

Answer: A

Q2) ____ relies on tricking and deceiving someone to access a system.

A) Social engineering

B) Wardriving

C) Warchalking

D) Wireless site mapping

Answer: A

Q3) ____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.

Answer: Google phishing

Q4) The GPS receiver can deduce its own location based on a mathematical principle called ____________________.

Answer: Trilateration

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Active Wireless Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21970

Sample Questions

Q1) DoS attacks are rare against wired network servers.

A)True

B)False

Q2) What are the security problems related to adware?

Q3) ____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.

A) Physical layer

B) MAC layer

C) LLC layer

D) Transport layer

Q4) Briefly describe how to perform a wired network DoS attack.

Q5) A ____ program creates fake packets and flood the wireless network.

A) MAC

B) packet sniffer

C) packet generator

D) CSMA/CA

Q6) Briefly explain the password paradox.

Q7) What are the problems of using community strings in SNMP?

Q9) What are the minimum criteria for creating good passwords? Page 6

Q8) What are some of the symptoms that indicate a virus has infected a computer?

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 5: Wireless Security Models

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21971

Sample Questions

Q1) PSK requires that a key (also called a(n) ____) be entered in both the access point and the wireless devices.

A) shared secret

B) MIC key

C) mixed key

D) interval key

Q2) The block cipher used in 802.11i is the ____________________.

Q3) The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A) supplicant

B) authenticator

C) authentication server

D) RADIUS

Q4) AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.

Q5) How do TKIP and MIC perform encryption in the WPA personal security model?

Q6) What are some of the reasons why turning off SSID beaconing provides a limited degree of security?

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Enterprise Wireless Hardware Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21972

Sample Questions

Q1) Using the ____, 802.11F specified information that access points need to exchange to support WLAN roaming.

A) AIFSN

B) HCCA

C) IAPP

D) EDCA

Q2) What are some of the advantages of a wireless router?

Q3) Instead of having only a single path through which data can travel, a(n) ____ network provides multiple paths.

A) wireless

B) wired

C) Ethernet

D) mesh

Q4) Most bridges have what is known as ____________________ that minimizes the spread of the signal so that it can reach farther distances.

Q5) The 802.11 MAC layer ____________________ mode is contention-based and supports different "streams" (types) of traffic.

Q6) Describe the main characteristics of transmit power control (TPC).

Q7) What are some of the features of the IEEE 802.11v protocol?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Designing a Secure Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21973

Sample Questions

Q1) ____ is used to create smaller segments for security purposes.

A) CSMA/CA

B) CSMA/CD

C) Ethernet

D) Segmentation

Q2) Why is diversity necessary to provide better security?

Q3) ____ replaces the sender's actual IP address with another IP address.

A) CSMA/CA

B) NAT

C) CSMA/CD

D) HTTP

Q4) The foundation of a firewall is a(n) ____________________.

Q5) A network ____________________ is a subset of a larger network.

Q6) Limiting consists of placing a password on a system to keep unauthorized persons out.

A)True

B)False

Q7) A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.

Q8) How can you create network segments in a wired network?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Secure Wireless Authentication

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21974

Sample Questions

Q1) Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).

Q2) With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

A) distributed autonomous site

B) distributed sites with centralized authentication and security

C) single site deployment

D) distributed sites and security with centralized authentication

Q3) A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

A) distributed autonomous site

B) distributed sites with centralized authentication and security

C) single site deployment

D) distributed sites and security with centralized authentication

Q4) Entries in the DIB are arranged in a tree structure called the

Q5) Briefly describe the functions of a RADIUS client and a RADIUS server.

Q6) How does Kerberos work?

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Secure Wireless Transmissions

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21975

Sample Questions

Q1) ____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

A) PPP

B) SFTP

C) SCP

D) SSH

Q2) In IPsec, authentication is accomplished by the ____ protocol.

A) Encapsulating Security Payload (ESP)

B) ISAKMP/Oakley

C) Authentication Header (AH)

D) L2TP

Q3) In a ____ VPN, multiple sites can connect to other sites over the Internet.

A) point-to-point

B) person-to-person

C) remote-access

D) site-to-site

Q4) What are the drawbacks of using public key and private key encryption for transmitting documents?

Q5) An enhanced feature of SSH is known as port forwarding, also called

12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing the Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21976

Sample Questions

Q1) A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A) baseline detection

B) anomaly detection

C) behavior detection

D) signature detection

Q2) An SNMP ____________________ acknowledges the message with an SNMP response.

Q3) Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.

Q4) ____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.

A) MIB

B) SSH

C) SFTP

D) PING

Q5) Wireless network bandwidth is less than that of a wired network.

A)True

B)False

Q6) Compare an intrusion system with a firewall.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Wireless Security Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21977

Sample Questions

Q1) The risks for the least important assets should be reduced first.

A)True

B)False

Q2) Briefly describe the areas that should be considered when creating an incident response team (IRT).

Q3) Briefly explain how to perform a risk assessment.

Q4) A ____ is a collection of suggestions that should be implemented.

A) code of ethics

B) guideline

C) standard

D) policy

Q5) Why is it critical to have users "buy in" to the policy and willingly follow it?

Q6) A(n) ____ policy should clearly address how passwords are managed.

A) password management

B) VPN

C) acceptable use

D) WLAN use

Q7) Identifying assets is a fairly simple and quick process.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Operational Support and Wireless Convergence

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21978

Sample Questions

Q1) ____ allows computers and network equipment to gather data about network performance.

A) FTP

B) SNMP

C) SFTP

D) L2TP

Q2) With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.

A) 1G

B) 2G

C) 2.5G

D) 3G

Q3) A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.

Q4) How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?

Page 15

Q5) Briefly describe role-based access control.

Q6) How does RADIUS work?

To view all questions and flashcards with answers, click on the resource link above.

Page 16

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Information Security Question Bank - 504 Verified Questions by Quizplus - Issuu