

Wireless Networking
Chapter Exam Questions
Course Introduction
Wireless Networking explores the principles, technologies, and protocols that enable communication over wireless networks. The course covers the fundamentals of radio wave propagation, modulation, multiple access techniques, and network architectures such as Wi-Fi, Bluetooth, and cellular networks. Students gain an understanding of network security, performance analysis, and interference management, as well as emerging trends in wireless technologies including 5G and IoT (Internet of Things) connectivity. Practical sessions and case studies help students design, analyze, and troubleshoot wireless networks in real-world scenarios.
Recommended Textbook
CWSP Guide to Wireless Security 1st Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1118

Page 2

Chapter 1: Foundations of Wireless Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21967
Sample Questions
Q1) In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.
A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
Answer: C
Q2) The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.
A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
Answer: B
Q3) Typically all rogue access points have security features implemented.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Vulnerabilities
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21968
Sample Questions
Q1) What was the criteria used by the IEEE 802.11 committee to design WEP?
Answer: The IEEE 802.11 committee designed WEP to meet the following criteria:
* Efficient-The WEP algorithm must be proficient enough to be implemented in either hardware or software.
* Exportable-WEP must meet the guidelines set by the U.S. Department of Commerce so that the wireless device using WEP can be exported overseas.
* Optional-The implementation of WEP in wireless LANs is an optional feature.
* Reasonably strong-The security of the algorithm lies in the difficulty of determining the secret keys through attacks. This in turn is related to the length of the secret key and the frequency of changing keys. WEP was to be "reasonably" strong in resisting attacks.
* Self-synchronizing-When using WEP, each packet must be separately encrypted. This is to prevent a single lost packet from making subsequent packets indecipherable.
Q2) In WEP, RC4 uses a(n) ____________________ to create the keystream.
Answer: pseudo random number generator (PRNG) pseudo random number generator PRNG
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Passive Wireless Discovery
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21969
Sample Questions
Q1) ____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.
A) Kismet
B) KisMAC
C) WZC
D) GPSMac
Answer: A
Q2) ____ is a version of NetStumbler that runs on handheld devices.
A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
Answer: B
Q3) NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Active Wireless Attacks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21970
Sample Questions
Q1) What are the security problems related to supporting remote access in wireless gateways?
Q2) A ____ is a computer program that lies dormant until it is triggered by a specific event.
A) worm
B) virus
C) spam
D) logic bomb
Q3) Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.
A) authorization
B) encryption
C) cryptography
D) authentication
Q4) Briefly explain the password paradox.
Q5) What are the problems of using community strings in SNMP?
Q6) With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
Q7) What are some of the characteristics of weak passwords?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wireless Security Models
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21971
Sample Questions
Q1) PSK passphrases of fewer than 20 characters can be subject to ____ attacks.
A) DDoS
B) QoS
C) offline dictionary
D) DoS
Q2) What are the steps involved in the 802.1x authentication procedure?
Q3) WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.
A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys
Q4) AES is designed to be an encryption technique that is secure from attacks.
A)True
B)False
Q5) An 802.1x ____ only job is to verify the authentication of devices.
A) wireless gateway
B) port security
C) authentication server
D) WNIC
Q6) When should you use the transitional security model?
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Enterprise Wireless Hardware Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21972
Sample Questions
Q1) In the ____ access control, the user can adjust the permissions for other users over network devices.
A) mandatory
B) discretionary
C) role based
D) temporal
Q2) What are some of the advantages of a wireless router?
Q3) In the ____ access control, the user is not allowed to give access to another user to use or access anything on the network.
A) mandatory
B) role based
C) discretionary
D) temporal
Q4) A(n) ____ switch supports both control and monitoring of the network.
A) unmanaged
B) managed
C) free
D) wireless
Q5) What is a wireless switch?
Q6) What are the two basic functions of an access point?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Designing a Secure Wireless Network
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21973
Sample Questions
Q1) A ____ is designed to prevent malicious packets from entering the network or computer.
A) firewall
B) switch
C) hub
D) repeater
Q2) Why is diversity necessary to provide better security?
Q3) Why should information security system be as simple as possible?
Q4) A(n) ____________________ is a logical grouping of network devices within a larger network.
Q5) The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.
A) CRC files
B) definition files
C) TPID files
D) infection files
Q6) ____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.
Q7) What are some of the advantages of using NAT?
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Secure Wireless Authentication
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21974
Sample Questions
Q1) When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.
A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
Q2) If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.
A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
Q3) LEAP is not vulnerable to dictionary attack tools.
A)True
B)False
Q4) ____________________ is the process that determines whether the user has the authority to carry out certain tasks.
Q5) What is authentication for a wired network?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Secure Wireless Transmissions
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21975
Sample Questions
Q1) Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
A)True
B)False
Q2) What are the areas of protection provided by IPsec?
Q3) L2TP is only supported by Windows 2000 versions and higher.
A)True
B)False
Q4) In IPsec, confidentiality is achieved through the ____ protocol.
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Q5) Briefly describe how PGP (or GPG) works.
Q6) Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.
A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing the Wireless Network
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21976
Sample Questions
Q1) What are the advantages and disadvantages of using SNMP for WLANs?
Q2) A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.
A) desktop
B) access point
C) wireless device
D) dedicated
Q3) If SNMP is being used, monitoring often focuses upon the performance of the network.
A)True
B)False
Q4) Briefly describe how SNMP works.
Q5) ____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.
A) RF fingerprinting
B) RSSI
C) Trilateration
D) Triangulation
Q6) An SNMP ____________________ acknowledges the message with an SNMP response.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Wireless Security Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21977
Sample Questions
Q1) Many organizations now enforce a(n) ____ policy to address accessing public hotspots.
A) acceptable use
B) VPN
C) password management
D) public access WLAN use
Q2) What are the options faced by an organization when confronted with a risk?
Q3) A ____ is a document that outlines specific requirements or rules that must be met.
A) policy
B) standard
C) guideline
D) risk
Q4) The risks for the least important assets should be reduced first.
A)True
B)False
Q5) A(n) ____________________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
Q6) Why is it critical to have users "buy in" to the policy and willingly follow it?
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Operational Support and Wireless Convergence
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21978
Sample Questions
Q1) All networks require effective operational support to ensure that everything functions as intended.
A)True
B)False
Q2) Why is it important to train and educate all network users?
Q3) WiMAX is based on the IEEE ____ standard approved in June 2004.
A) 802.3
B) 802.16
C) 802.32
D) 802.56
Q4) The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.
A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
Q5) A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
To view all questions and flashcards with answers, click on the resource link above. Page 14