Skip to main content

Wireless Networking Chapter Exam Questions - 504 Verified Questions

Page 1


Wireless Networking

Chapter Exam Questions

Course Introduction

Wireless Networking explores the principles, technologies, and protocols that enable communication over wireless networks. The course covers the fundamentals of radio wave propagation, modulation, multiple access techniques, and network architectures such as Wi-Fi, Bluetooth, and cellular networks. Students gain an understanding of network security, performance analysis, and interference management, as well as emerging trends in wireless technologies including 5G and IoT (Internet of Things) connectivity. Practical sessions and case studies help students design, analyze, and troubleshoot wireless networks in real-world scenarios.

Recommended Textbook

CWSP Guide to Wireless Security 1st Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1118

Page 2

Chapter 1: Foundations of Wireless Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21967

Sample Questions

Q1) In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.

A) WLAN

B) Wi-Fi

C) Project 802

D) WiMAX

Answer: C

Q2) The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.

A) 802.11

B) 802.11a

C) 802.11b

D) 802.11z

Answer: B

Q3) Typically all rogue access points have security features implemented.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21968

Sample Questions

Q1) What was the criteria used by the IEEE 802.11 committee to design WEP?

Answer: The IEEE 802.11 committee designed WEP to meet the following criteria:

* Efficient-The WEP algorithm must be proficient enough to be implemented in either hardware or software.

* Exportable-WEP must meet the guidelines set by the U.S. Department of Commerce so that the wireless device using WEP can be exported overseas.

* Optional-The implementation of WEP in wireless LANs is an optional feature.

* Reasonably strong-The security of the algorithm lies in the difficulty of determining the secret keys through attacks. This in turn is related to the length of the secret key and the frequency of changing keys. WEP was to be "reasonably" strong in resisting attacks.

* Self-synchronizing-When using WEP, each packet must be separately encrypted. This is to prevent a single lost packet from making subsequent packets indecipherable.

Q2) In WEP, RC4 uses a(n) ____________________ to create the keystream.

Answer: pseudo random number generator (PRNG) pseudo random number generator PRNG

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Passive Wireless Discovery

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21969

Sample Questions

Q1) ____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.

A) Kismet

B) KisMAC

C) WZC

D) GPSMac

Answer: A

Q2) ____ is a version of NetStumbler that runs on handheld devices.

A) KisMAC

B) MiniStumbler

C) AiroPeek

D) Kismet

Answer: B

Q3) NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Active Wireless Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21970

Sample Questions

Q1) What are the security problems related to supporting remote access in wireless gateways?

Q2) A ____ is a computer program that lies dormant until it is triggered by a specific event.

A) worm

B) virus

C) spam

D) logic bomb

Q3) Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.

A) authorization

B) encryption

C) cryptography

D) authentication

Q4) Briefly explain the password paradox.

Q5) What are the problems of using community strings in SNMP?

Q6) With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.

Q7) What are some of the characteristics of weak passwords?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wireless Security Models

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21971

Sample Questions

Q1) PSK passphrases of fewer than 20 characters can be subject to ____ attacks.

A) DDoS

B) QoS

C) offline dictionary

D) DoS

Q2) What are the steps involved in the 802.1x authentication procedure?

Q3) WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.

A) per-packet keys

B) Message Integrity Check (MIC)

C) TKIP check

D) TKIP keys

Q4) AES is designed to be an encryption technique that is secure from attacks.

A)True

B)False

Q5) An 802.1x ____ only job is to verify the authentication of devices.

A) wireless gateway

B) port security

C) authentication server

D) WNIC

Q6) When should you use the transitional security model?

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Enterprise Wireless Hardware Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21972

Sample Questions

Q1) In the ____ access control, the user can adjust the permissions for other users over network devices.

A) mandatory

B) discretionary

C) role based

D) temporal

Q2) What are some of the advantages of a wireless router?

Q3) In the ____ access control, the user is not allowed to give access to another user to use or access anything on the network.

A) mandatory

B) role based

C) discretionary

D) temporal

Q4) A(n) ____ switch supports both control and monitoring of the network.

A) unmanaged

B) managed

C) free

D) wireless

Q5) What is a wireless switch?

Q6) What are the two basic functions of an access point?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Designing a Secure Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21973

Sample Questions

Q1) A ____ is designed to prevent malicious packets from entering the network or computer.

A) firewall

B) switch

C) hub

D) repeater

Q2) Why is diversity necessary to provide better security?

Q3) Why should information security system be as simple as possible?

Q4) A(n) ____________________ is a logical grouping of network devices within a larger network.

Q5) The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files

B) definition files

C) TPID files

D) infection files

Q6) ____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.

Q7) What are some of the advantages of using NAT?

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Secure Wireless Authentication

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21974

Sample Questions

Q1) When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.

A) temporal keys

B) group keys (GK)

C) key confirmation keys (KEKs)

D) pairwise master keys (PMKs)

Q2) If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A) pairwise master key (PMK)

B) master key (MK)

C) pairwise transient key (PTK)

D) key confirmation key (KCK)

Q3) LEAP is not vulnerable to dictionary attack tools.

A)True

B)False

Q4) ____________________ is the process that determines whether the user has the authority to carry out certain tasks.

Q5) What is authentication for a wired network?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Secure Wireless Transmissions

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21975

Sample Questions

Q1) Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.

A)True

B)False

Q2) What are the areas of protection provided by IPsec?

Q3) L2TP is only supported by Windows 2000 versions and higher.

A)True

B)False

Q4) In IPsec, confidentiality is achieved through the ____ protocol.

A) Encapsulating Security Payload (ESP)

B) ISAKMP/Oakley

C) Authentication Header (AH)

D) L2TP

Q5) Briefly describe how PGP (or GPG) works.

Q6) Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.

A) Secure Shell (SSH)

B) IP Security (IPsec)

C) File Transfer Protocol (FTP)

D) Layer 2 Tunneling Protocol (L2TP)

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing the Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21976

Sample Questions

Q1) What are the advantages and disadvantages of using SNMP for WLANs?

Q2) A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.

A) desktop

B) access point

C) wireless device

D) dedicated

Q3) If SNMP is being used, monitoring often focuses upon the performance of the network.

A)True

B)False

Q4) Briefly describe how SNMP works.

Q5) ____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

A) RF fingerprinting

B) RSSI

C) Trilateration

D) Triangulation

Q6) An SNMP ____________________ acknowledges the message with an SNMP response.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Wireless Security Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21977

Sample Questions

Q1) Many organizations now enforce a(n) ____ policy to address accessing public hotspots.

A) acceptable use

B) VPN

C) password management

D) public access WLAN use

Q2) What are the options faced by an organization when confronted with a risk?

Q3) A ____ is a document that outlines specific requirements or rules that must be met.

A) policy

B) standard

C) guideline

D) risk

Q4) The risks for the least important assets should be reduced first.

A)True

B)False

Q5) A(n) ____________________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.

Q6) Why is it critical to have users "buy in" to the policy and willingly follow it?

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Operational Support and Wireless Convergence

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21978

Sample Questions

Q1) All networks require effective operational support to ensure that everything functions as intended.

A)True

B)False

Q2) Why is it important to train and educate all network users?

Q3) WiMAX is based on the IEEE ____ standard approved in June 2004.

A) 802.3

B) 802.16

C) 802.32

D) 802.56

Q4) The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.

A) last mile connection

B) fiber-optic mile

C) copper line

D) cable connection

Q5) A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook