Chapter 8 Wireless Networks 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
1) To drive around a city looking for working access points that are unprotected is ________. A) drive-by hacking B) war driving
answer
Answer: B
question
2) Breaking into WLANs is ________. A) drive-by hacking B) war driving
answer
Answer: A
question
3) An unauthorized internal access point is a(n) ________. A) evil twin access point B) rogue access point C) Both A and B
answer
Answer: B
question
4) A rogue access point is an unauthorized access point. A) True. B) False.
answer
Answer: A
question
5) What security protocol originally came with 802.11 equipment? A) 802.11e. B) 802.11i. C) WPA. D) WEP.
answer
Answer: D
question
6) What security protocol originally came with 802.11 equipment? A) WPA. B) WEP. C) Both A and B D) Neither A nor B
answer
Answer: B
question
7) How long does it take an attacker to crack WEP today with readily available software? A) About ten seconds. B) About ten minutes. C) About ten hours. D) About ten days. E) WEP cannot be cracked with readily available software.
answer
Answer: B
question
8) WEP is so strong that it cannot be cracked with readily available software. A) True. B) False.
answer
Answer: B
question
9) WEP is a strong core security protocol. A) True. B) False.
answer
Answer: B
question
10) Who created WPA? A) The Internet Engineering Task Force. B) ISO. C) The 802.1 Working Group. D) The 802.11 Working Group. E) The Wi-Fi Alliance.
answer
Answer: E
question
11) WPA was created by the Internet Engineering Task Force. A) True. B) False.
answer
Answer: B
question
12) 802.11i is attractive compared with WPA because ________. A) 802.11i offers stronger security B) 802.11i offers quality of service C) many older devices can be upgraded to 802.11i D) 802.11i was standardized by the Wi-Fi Alliance E) All of the above.
answer
Answer: A
question
13) Which of the above offers stronger security? A) WPA. B) 802.11i. C) Both A and B offer equally strong security.
answer
Answer: B
question
14) 802.11i offers stronger security than WPA. A) True. B) False.
answer
Answer: A
question
15) What is the strongest security protocol for 802.11 today? A) 802.11i. B) 802.11s. C) 802.11X. D) WPA. E) WEP.
answer
Answer: A
question
16) What does the Wi-Fi Alliance call 802.11i? A) 802.1x. B) 802.11s. C) 802.11X. D) WPA. E) WPA2.
answer
Answer: E
question
17) 802.11i and WPA are different names for the same standard. A) True. B) False.
answer
Answer: B
question
18) 802.11i uses ________ as its encryption method. A) RC4 B) 802.11s C) AES-CCMP D) WPA
answer
Answer: C
question
19) 802.11i uses WEP as its encryption method. A) True. B) False.
answer
Answer: B
question
20) WPA has been partially cracked. A) True. B) False.
answer
Answer: A
question
21) In what mode of 802.11i operation is a central authentication server used? A) 802.1X mode. B) PSK mode. C) Both A and B D) Neither A nor B
answer
Answer: A
question
22) A central authentication server is used in 802.11i PSK mode. A) True. B) False.
answer
Answer: B
question
23) The Wi-Fi Alliance refers to 802.1X mode as ________ mode. A) AES B) PSK C) enterprise D) EAP
answer
Answer: C
question
24) 802.1X needs security between the authenticator and the computer in ________. A) Ethernet B) 802.11i C) Both A and B D) Neither A nor B
answer
Answer: B
question
25) 802.1X needs security between the authenticator and the computer in Ethernet. A) True. B) False.
answer
Answer: B
question
26) 802.1X needs security between the authenticator and the computer in 802.11 wireless access. A) True. B) False.
answer
Answer: A
question
27) The security in 802.1X is sufficient for its direct use in 802.11 WLANs. A) True. B) False.
answer
Answer: B
question
28) Which of the following is NOT a security extension to EAP? A) EAP-TTLS. B) MS-EAP. C) PEAP.
answer
Answer: B
question
29) The most popular standard for extended 802.1X security is ________. A) EAP-TTLS B) MS-EAP C) PEAP
answer
Answer: C
question
30) The most popular standard for extended 802.1X security is PEAP. A) True. B) False.
answer
Answer: A
question
31) In 802.11i ________, hosts must know a shared key. A) 802.1X mode B) PSK mode C) Both A and B D) Neither A nor B
answer
Answer: B
question
32) PSK mode automatically prevents the use of weak keys. A) True. B) False.
answer
Answer: B
question
33) In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 6 B) 8 C) 20 D) 40 E) 128
answer
Answer: C
question
34) A notebook computer configured to act like a real access point is a(n) ________. A) evil twin access point B) rogue access point C) Both A and B
answer
Answer: A
question
35) A notebook computer configured to act like a real access point is a rogue access point. A) True. B) False.
answer
Answer: B
question
36) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s). A) one B) two C) four D) sixteen
answer
Answer: B
question
37) What damage can an evil twin access point do? A) Eavesdrop on communication. B) Steal important keys or other information transmitted by the client. C) Launch attacks against corporate servers. D) All of the above. E) Only A and B
answer
Answer: D
question
38) An evil twin access point can launch attacks against the corporate network. A) True. B) False.
answer
Answer: A
question
39) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs. B) VPNs. C) PEAP. D) IPsec. E) SSL/TLS.
answer
Answer: B
question
40) In VPNs designed to frustrate evil twin attacks, the shared secret ________. A) is transmitted in the clear B) is transmitted with cryptographic protections C) is not transmitted D) Any of the above.
answer
Answer: C
question
41) Initial WLAN planning begins with drawing circles on building architecture drawings. A) True. B) False.
answer
Answer: A
question
42) Centralized access point management ________. A) increases management costs but provides better control B) reduces management costs
answer
Answer: B
question
43) Centralized access point management raises management costs. A) True. B) False.
answer
Answer: B
question
44) Which of the following can be used to centrally manage remote access points? A) Smart access points. B) WLAN switches. C) Both A and B D) Neither A nor B
answer
Answer: C
question
45) Managed access points should ________. A) allow access point power to be adjusted remotely B) provide constant transmission quality monitoring C) Both A and B D) Neither A nor B
answer
Answer: C
question
46) Managed access points should ________. A) identify rogue access points B) be able to push updates out to access points C) Both A and B D) Neither A nor B
answer
Answer: C
question
47) As much as possible, WLAN management software should be able to work automatically, taking as many actions as possible without user intervention. A) True. B) False.
answer
Answer: A
question
48) I wish to have a wireless LAN to serve my house. I will use ________. A) 802.11 B) Bluetooth C) Either A or B
answer
Answer: A
question
49) Bluetooth is for ________. A) large WLANs B) cable replacement C) Both A and B D) Neither A nor B
answer
Answer: B
question
50) Bluetooth is used for cable replacement. A) True. B) False.
answer
Answer: A
question
51) Which of the following was created for PANs? A) 802.11. B) Bluetooth. C) Both A and B D) Neither A nor B
answer
Answer: B
question
52) Bluetooth is commonly used for ________. A) wireless mice B) wireless headphones C) Both A and B D) Neither A nor B
answer
Answer: C
question
53) Bluetooth does not use access points. A) True. B) False.
answer
Answer: A
question
54) ________ uses access points. A) 802.11 B) Bluetooth C) Both A and B D) Neither A nor B
answer
Answer: A
question
55) Bluetooth uses ________. A) access points B) peer-to-peer connections between devices C) Both A and B D) Neither A nor B
answer
Answer: B
question
56) Bluetooth offers a rated speed today of about ________. A) 3 Mbps B) 11 Mbps C) 22 Mbps D) 54 Mbps E) 100 Mbps
answer
Answer: A
question
57) Bluetooth offers very high transmission speeds. A) True. B) False.
answer
Answer: B
question
58) The normal maximum distance for Bluetooth propagation is ________. A) 10 meters B) 30 meters C) 50 meters D) 100 meters
answer
Answer: A
question
59) Which of the following gives longer battery life? A) Bluetooth. B) 802.11.
answer
Answer: A
question
60) Bluetooth is designed to transmit ________. A) at high speeds B) over long distances C) Both A and B D) Neither A nor B
answer
Answer: D
question
61) Application profiles are attractive because they allow devices to work with one another automatically at the application layer. A) True. B) False.
answer
Answer: A
question
62) Which of the following uses application profiles? A) 802.11a. B) 802.11g. C) All 802.11 networks. D) Bluetooth. E) All of the above.
answer
Answer: D
question
63) If a pair of Bluetooth devices switch to 802.11 radio transmission, they can transmit at tens of megabits per second. A) True. B) False.
answer
Answer: A
question
64) Bluetooth is faster than ZigBee. A) True. B) False.
answer
Answer: A
question
65) 802.11 is faster than UWB. A) True. B) False.
answer
Answer: B
question
66) ________ normally is limited to about 10 meters. A) Bluetooth B) 802.11 C) Both A and B D) Neither A nor B
answer
Answer: C
question
67) What technology could replace universal product code (bar code) tags on products? A) 802.11. B) Bluetooth. C) UWB. D) RFIDs.
answer
Answer: D
question
68) ________ is an approach for implementing multiple radio technologies in a single device at reduced cost. A) UWB B) ZigBee C) Software defined radio D) Agile radio E) Bluetooth
answer
Answer: C
question
69) Which of the following tends to have faster speeds? A) Wireless LANs. B) Wireless WANs. C) They generally have about the same speed.
answer
Answer: A
question
70) Wireless WANs tend to have faster speeds than Wireless LANs. A) True. B) False.
answer
Answer: B
question
71) Most wireless WANs operate in a single metropolitan area. A) True. B) False.
answer
Answer: A
question
72) A ________ serves a city and its suburbs. A) MAN B) PAN C) Both A and B D) Neither A nor B
answer
Answer: A
question
73) In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) Both A and B D) Neither A nor B
answer
Answer: A
question
74) In cellular technology, a cellsite is a small geographical area. A) True. B) False.
answer
Answer: B
question
75) An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B D) Neither A nor B
answer
Answer: C
question
76) Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater speed D) reduced latency E) All of the above.
answer
Answer: A
question
77) Cellular technology provides channel reuse, in different cells in the network. A) True. B) False.
answer
Answer: A
question
78) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________. A) traditional cellular technology B) CDMA C) Both A and B D) Neither A nor B
answer
Answer: B
question
79) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology. A) True. B) False.
answer
Answer: B
question
80) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with CDMA cellular technology. A) True. B) False.
answer
Answer: A
question
81) When a cellular customer moves from one cell in a city to another cell in the same city, this is ________. A) cell switching B) a handoff C) cell hopping D) roaming E) cell reuse
answer
Answer: B
question
82) When a cellular customer moves from one city to another, this is ________. A) roaming B) a handoff C) Both A and B D) Neither A nor B
answer
Answer: A
question
83) Which of the following is true? A) "Roaming" means the same thing in cellular and 802.11 networks. B) "Handoff" means the same thing in cellular and 802.11 networks. C) Both A and B are true.
answer
Answer: B
question
84) "Handoff" means the same thing in cellular and 802.11 networks. A) True. B) False.
answer
Answer: B
question
85) Smart phones ________. A) provide telephone service B) support web service C) often have cameras D) All of the above.
answer
Answer: D
question
86) Mobile phones that do far more than traditional telephones (such as providing web access) are called ________. A) smart phones B) cellsites C) codecs
answer
Answer: A
question
87) ________ cellular technology uses digital transmission. A) 1G B) 2G C) Both A and B D) Neither A nor B
answer
Answer: B
question
88) 1G cellular technology uses analog transmission. A) True. B) False.
answer
Answer: A
question
89) Which of the following was limited to 10 kbps? A) 2G. B) 3G. C) 4G. D) None of the above.
answer
Answer: A
question
90) ________ cellular service typically provides speeds of 300 to 500 kbps. A) 2G B) 3G C) 4G D) None of the above.
answer
Answer: B
question
91) What is the planned long-term speed of 3G service for stationary devices? A) 1 Mbps. B) 10 Mbps. C) 100 Mbps. D) 1 Gbps.
answer
Answer: D
question
92) What is the planned long-term speed of 3G service for mobile devices? A) 1 Mbps. B) 10 Mbps. C) 100 Mbps. D) 1 Gbps.
answer
Answer: C
question
93) For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access? A) 1G. B) 2G. C) 3G. D) 4G.
answer
Answer: C
question
94) For high-definition video, what is the lowest generation of cellular service that provides acceptable speed? A) 1G. B) 2G. C) 3G. D) 4G.
answer
Answer: D
question
95) Which of the following is one of the initial technologies being used by carriers for 4G service? A) LTE. B) WiMAX. C) Both A and B D) Neither A nor B
answer
Answer: C
question
96) Which 4G technology do most carriers intend to use? A) LTE. B) WiMAX. C) Both A and B D) Neither A nor B
answer
Answer: A
question
97) Which 4G technology will bring download speeds of 1 Gbps to stationary customers? A) LTE Advanced. B) 802.16m. C) Both A and B D) Neither A nor B
answer
Answer: C
question
98) By regulation, cellular systems must give almost the same throughput at different times during the day. A) True. B) False
answer
Answer: B
question
99) By regulation, cellular systems must give almost the same throughput at different places in their service areas. A) True. B) False
answer
Answer: B
question
100) The fact that smart phones can connect to corporate LANs is often advantageous economically for ________. A) cellular users who pay by the minute B) cellular users who pay a flat fee for unlimited service C) Both A and B D) Neither A nor B
answer
Answer: A
question
101) Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network. A) True. B) False.
answer
Answer: A
question
102) Some smart phones can act as wireless access points. A) True. B) False.
answer
Answer: A
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New