True/False Indicate whether the
statement is true or false.
|
|
|
1.
|
WEP2 attempted to overcome the limitations of WEP by adding two new security
enhancements.
|
|
|
2.
|
The block cipher used in 802.11i is the Data Encryption Standard (DES).
|
|
|
3.
|
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared
key (PSK) technology.
|
|
|
4.
|
Pre-shared key (PSK) authentication uses a passphrase that is automatically
generated to generate the encryption key.
|
|
|
5.
|
A virtual private network (VPN) uses a public, unsecured network as if it were a
private, secured network.
|
|
|
6.
|
Almost all WLAN vendors provide utilities to assist in monitoring the wireless
network.
|
|
|
7.
|
Acquiring data, such as error statistics and packets received, from each access
point and each wireless device across the network is normally a quick and easy task.
|
|
|
8.
|
A wireless network is a static system.
|
|
|
9.
|
Antenna adjustment may require the existing antennas to be reoriented or placed
on a pole or mast for better transmission and reception.
|
|
|
10.
|
Information security weaknesses can never be entirely eliminated.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
11.
|
What authentication system did the proposed WEP2 standard use?
a. | Kerberos | c. | dynamic WEP | b. | AES-CCMP | d. | key caching |
|
|
|
12.
|
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or
logs out and logs back in.
a. | broadcast | c. | passphrase | b. | unicast | d. | ticket |
|
|
|
13.
|
The 802.11i standard addresses both ____.
a. | encryption and confidentiality | c. | authentication and
direction | b. | integrity and confidentiality | d. | encryption and
authentication |
|
|
|
14.
|
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called
rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key
performs 11 rounds, and a 256-bit key uses ____ rounds.
|
|
|
15.
|
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless)
that requests access to the network is prevented from receiving any traffic until its identity
can be verified.
a. | an access control list | c. | port scanning | b. | port security | d. | port blocking |
|
|
|
16.
|
What feature of IEEE 802.11i allows a device to become authenticated to an AP
before moving to it?
a. | key caching | c. | pre-authentication | b. | port security | d. | message passing |
|
|
|
17.
|
How long is the per-packet key used in TKIP?
a. | 40-bits | c. | 128-bits | b. | 64-bits | d. | 256-bits |
|
|
|
18.
|
____ replaces CRC in WPA.
|
|
|
19.
|
____ was designed to address WEP vulnerabilities with a minimum of
inconvenience.
a. | IEEE 802.11i | c. | dynamic WEP | b. | TGi | d. | WPA |
|
|
|
20.
|
What security technology was most recently introduced?
a. | WPA | c. | WEP2 | b. | WPA2 | d. | Dynamic WEP |
|
|
|
21.
|
The ____ wireless security standard provides a low level of security.
a. | Dynamic WEP | c. | WEP2 | b. | WEP | d. | All of the
above |
|
|
|
22.
|
What is the first step in implementing an interim security model?
a. | shared key authentication | c. | turning off SSID
beaconing | b. | port security | d. | MAC address filtering |
|
|
|
23.
|
When implementing an interim security model, most vendors have the option of a
128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most
secure option.
a. | ASCII | c. | hexadecimal | b. | ciphered | d. | plaintext |
|
|
|
24.
|
The personal security model is intended for settings in which a(n) ____ is
unavailable.
a. | wired network | c. | AP | b. | authentication server | d. | intermediate security
model |
|
|
|
25.
|
The ____ method of encryption is used in a personal security model.
|
|
|
26.
|
What is the name of the 128-bit key used in TKIP?
a. | temporal key | c. | XOR | b. | MIC | d. | PRNG |
|
|
|
27.
|
____ is considered to be the “heart and soul” of WPA
security.
|
|
|
28.
|
Encryption under the WPA2 personal security model is accomplished by using the
block cipher ____.
|
|
|
29.
|
____ authentication is used in the enterprise security model using WPA and
WPA2.
a. | AES | c. | IEEE 802.1x | b. | TKIP | d. | All of the
above |
|
|
|
30.
|
A ____ VPN is a user-to-LAN connection used by remote users.
a. | remote-access | c. | peer-to-peer | b. | site-to-site | d. | remote-to-LAN |
|
|
|
31.
|
At the heart of a WIDS are ____; these devices, which can be either separate
hardware devices or a standard access point operating in a special “scan” mode, monitor
the airwaves to detect signals from rogue access points.
a. | captive portals | c. | firewalls | b. | VPNs | d. | wireless
sensors |
|
|
|
32.
|
In the Windows operating system, what window provides basic tools for monitoring
a WLAN?
a. | Wireless Adapter Information | c. | Access Point
Utilities | b. | Wireless Network Connection Status | d. | Network Monitor |
|
|
|
33.
|
It is important for wireless system administrators to maintain a(n) ____ log
that contains a record of all problems, solutions, and configuration changes.
a. | manual | c. | network | b. | event | d. | AP |
|
|
|
34.
|
What tool(s) are used most often as “standard” network monitoring
tools?
a. | AP Monitor and Simple Network Management Protocol | b. | WLAN Logger and
Remote Monitoring | c. | Simple Network Management Protocol and Remote
Monitoring | d. | All of the above |
|
|
|
35.
|
The current version of SNMP (____) addresses security and remote
configuration.
|
|
|
36.
|
____ is a nonvolatile storage chip used in computers and other devices.
a. | Firmware | c. | RMON | b. | SNMP | d. | EEPROM |
|
|
|
37.
|
When updating firmware in an enterprise-level access point, the Receiving AP
must be able to hear the IP ____ issued by the Distribution AP.
a. | multicast | c. | broadcast | b. | unicast | d. | netcast |
|
|
|
38.
|
What is the last step in RF site tuning?
a. | adjust channel settings | c. | modify
throughput | b. | documenting changes | d. | validate coverage area |
|
|
|
39.
|
What is another name for propagation loss?
a. | transmission loss | c. | free space loss | b. | effective loss | d. | signal loss |
|
|
|
40.
|
What information is required for a link budget?
a. | power of the transmitter | c. | frequency of the
link | b. | path length | d. | All of the above |
|
|
|
41.
|
For a proper WLAN performance, the link budget must be ____ dB.
a. | greater than zero | c. | greater than ten | b. | greater than five | d. | less than ten |
|
|
|
42.
|
Which type of RF loss is caused by the equipment itself, not external
objects?
a. | Refraction | c. | Voltage Standing Wave Ratio | b. | Scattering | d. | Absorption |
|
|
|
43.
|
A ____ antenna is most typically used on a WLAN.
a. | panel | c. | sectorized | b. | rod | d. | beam steering |
|
|
|
44.
|
Most vendors illustrate their radiation patterns by splitting the
three-dimensional donut into two perpendicular planes called ____ and elevation.
a. | donut | c. | plain | b. | horizontal | d. | azimuth |
|
|
|
45.
|
A(n) ____ amplifier boosts the RF signal before it is injected into the
device that contains the antenna.
a. | bidirectional | c. | unidirectional | b. | pre-injection | d. | internal |
|
|
|
46.
|
____ attenuators are the only type permitted by the FCC for WLAN systems.
a. | Variable-loss | c. | Bidirectional | b. | Fixed-loss | d. | Unidirectional |
|
|
|
47.
|
A ____ limits the amplitude and disturbing interference voltages by
channeling them to the ground.
a. | RF attenuator | c. | lightning arrestor | b. | splitter | d. | phase modulator |
|
|
|
48.
|
The first step in creating a security policy is ____.
a. | risk assessment | c. | impact analysis | b. | security auditing | d. | documentation |
|
|
|
49.
|
When conducting a security audit, ____ should determine vulnerabilities.
a. | a highly-paid consultant | b. | a wireless system administrator employed by the
company | c. | a junior administrator | d. | a team with diverse
backgrounds |
|
|
|
50.
|
Vulnerabilities that are ranked as ____ are events that would cause the
organization to cease functioning or be seriously crippled in its capacity to perform.
a. | major | c. | significant | b. | catastrophic | d. | small impact |
|
|
|
51.
|
____ security protects the equipment and infrastructure itself, and has one
primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or
vandalize it.
a. | Physical | c. | Hardware | b. | Practical | d. | Social |
|
|
|
52.
|
What technique(s) is/are most effective for defeating social engineering
attacks?
a. | physical and software security | b. | documentation | c. | education and
policies | d. | undercover work by network administrators |
|
Completion Complete each
statement.
|
|
|
53.
|
____________________ was developed by the Massachusetts Institute of Technology
(MIT) and used to verify the identity of network users.
|
|
|
54.
|
In WPA, ________________________________________ encryption replaces WEP’s
small 40-bit encryption key that must be manually entered on wireless APs and devices and does not
change.
|
|
|
55.
|
The ____________________ security model is designed for single users or small
office home office (SOHO) settings of generally 10 or fewer wireless devices.
|
|
|
56.
|
The ____________________ security model is designed for medium to large-size
organizations such as businesses, government agencies, and universities.
|
|
|
57.
|
Most consumer access points are in reality wireless ____________________,
because they combine the functions of an access point, router, network address translator, firewall,
and switch.
|
|
|
58.
|
In order to use SNMP, a software ____________________ is loaded onto each
network device that will be managed using SNMP.
|
|
|
59.
|
____________________ is software that is embedded into hardware to control the
device.
|
|
|
60.
|
A(n) ____________________ antenna is typically used in outdoor areas. They
are designed to be used in installations where aesthetics and high performance are key
factors.
|
|
|
61.
|
The first step in the security policy cycle is to perform a(n)
____________________, which attempts to determine the nature of the risks to the organization’s
assets.
|
|
|
62.
|
____________________ engineering relies on tricking or deceiving someone to give
a hacker access to a system.
|