Deck 8: Wireless Networks 2
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/102
Play
Full screen (f)
Deck 8: Wireless Networks 2
1
802.11i offers stronger security than WPA.
True
2
A rogue access point is an unauthorized access point.
True
3
802.11i uses WEP as its encryption method.
False
4
WEP is so strong that it cannot be cracked with readily available software.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
5
802.11i is attractive compared with WPA because ________.
A)802.11i offers stronger security
B)802.11i offers quality of service
C)many older devices can be upgraded to 802.11i
D)802.11i was standardized by the Wi-Fi Alliance
E)All of the above.
A)802.11i offers stronger security
B)802.11i offers quality of service
C)many older devices can be upgraded to 802.11i
D)802.11i was standardized by the Wi-Fi Alliance
E)All of the above.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
6
Who created WPA?
A)The Internet Engineering Task Force.
B)ISO.
C)The 802.1 Working Group.
D)The 802.11 Working Group.
E)The Wi-Fi Alliance.
A)The Internet Engineering Task Force.
B)ISO.
C)The 802.1 Working Group.
D)The 802.11 Working Group.
E)The Wi-Fi Alliance.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
7
What is the strongest security protocol for 802.11 today?
A)802.11i.
B)802.11s.
C)802.11X.
D)WPA.
E)WEP.
A)802.11i.
B)802.11s.
C)802.11X.
D)WPA.
E)WEP.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
8
How long does it take an attacker to crack WEP today with readily available software?
A)About ten seconds.
B)About ten minutes.
C)About ten hours.
D)About ten days.
E)WEP cannot be cracked with readily available software.
A)About ten seconds.
B)About ten minutes.
C)About ten hours.
D)About ten days.
E)WEP cannot be cracked with readily available software.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
9
What does the Wi-Fi Alliance call 802.11i?
A)802.1x.
B)802.11s.
C)802.11X.
D)WPA.
E)WPA2.
A)802.1x.
B)802.11s.
C)802.11X.
D)WPA.
E)WPA2.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
10
What security protocol originally came with 802.11 equipment?
A)WPA.
B)WEP.
C)Both A and B
D)Neither A nor B
A)WPA.
B)WEP.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
11
802.11i and WPA are different names for the same standard.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
12
An unauthorized internal access point is a(n)________.
A)evil twin access point
B)rogue access point
C)Both A and B
A)evil twin access point
B)rogue access point
C)Both A and B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
13
WPA has been partially cracked.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
14
WPA was created by the Internet Engineering Task Force.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
15
What security protocol originally came with 802.11 equipment?
A)802.11e.
B)802.11i.
C)WPA.
D)WEP.
A)802.11e.
B)802.11i.
C)WPA.
D)WEP.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
16
WEP is a strong core security protocol.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the above offers stronger security?
A)WPA.
B)802.11i.
C)Both A and B offer equally strong security.
A)WPA.
B)802.11i.
C)Both A and B offer equally strong security.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
18
To drive around a city looking for working access points that are unprotected is ________.
A)drive-by hacking
B)war driving
A)drive-by hacking
B)war driving
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
19
Breaking into WLANs is ________.
A)drive-by hacking
B)war driving
A)drive-by hacking
B)war driving
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
20
802.11i uses ________ as its encryption method.
A)RC4
B)802.11s
C)AES-CCMP
D)WPA
A)RC4
B)802.11s
C)AES-CCMP
D)WPA
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is NOT a security extension to EAP?
A)EAP-TTLS.
B)MS-EAP.
C)PEAP.
A)EAP-TTLS.
B)MS-EAP.
C)PEAP.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
22
802.1X needs security between the authenticator and the computer in ________.
A)Ethernet
B)802.11i
C)Both A and B
D)Neither A nor B
A)Ethernet
B)802.11i
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
23
In 802.11i PSK mode,the pass phrase should be at least ________ characters long.
A)6
B)8
C)20
D)40
E)128
A)6
B)8
C)20
D)40
E)128
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
A)VLANs.
B)VPNs.
C)PEAP.
D)IPsec.
E)SSL/TLS.
A)VLANs.
B)VPNs.
C)PEAP.
D)IPsec.
E)SSL/TLS.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
25
A notebook computer configured to act like a real access point is a(n)________.
A)evil twin access point
B)rogue access point
C)Both A and B
A)evil twin access point
B)rogue access point
C)Both A and B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
26
802.1X needs security between the authenticator and the computer in Ethernet.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
27
The most popular standard for extended 802.1X security is PEAP.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
28
A notebook computer configured to act like a real access point is a rogue access point.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
29
802.1X needs security between the authenticator and the computer in 802.11 wireless access.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
30
The most popular standard for extended 802.1X security is ________.
A)EAP-TTLS
B)MS-EAP
C)PEAP
A)EAP-TTLS
B)MS-EAP
C)PEAP
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
31
PSK mode automatically prevents the use of weak keys.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
32
The Wi-Fi Alliance refers to 802.1X mode as ________ mode.
A)AES
B)PSK
C)enterprise
D)EAP
A)AES
B)PSK
C)enterprise
D)EAP
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
33
A central authentication server is used in 802.11i PSK mode.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
34
In VPNs designed to frustrate evil twin attacks,the shared secret ________.
A)is transmitted in the clear
B)is transmitted with cryptographic protections
C)is not transmitted
D)Any of the above.
A)is transmitted in the clear
B)is transmitted with cryptographic protections
C)is not transmitted
D)Any of the above.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
35
An evil twin access point can launch attacks against the corporate network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
36
What damage can an evil twin access point do?
A)Eavesdrop on communication.
B)Steal important keys or other information transmitted by the client.
C)Launch attacks against corporate servers.
D)All of the above.
E)Only A and B
A)Eavesdrop on communication.
B)Steal important keys or other information transmitted by the client.
C)Launch attacks against corporate servers.
D)All of the above.
E)Only A and B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
37
If a company uses 802.11i for its core security protocol,an evil twin access point will set up ________ 802.11i connection(s).
A)one
B)two
C)four
D)sixteen
A)one
B)two
C)four
D)sixteen
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
38
The security in 802.1X is sufficient for its direct use in 802.11 WLANs.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
39
In 802.11i ________,hosts must know a shared key.
A)802.1X mode
B)PSK mode
C)Both A and B
D)Neither A nor B
A)802.1X mode
B)PSK mode
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
40
In what mode of 802.11i operation is a central authentication server used?
A)802.1X mode.
B)PSK mode.
C)Both A and B
D)Neither A nor B
A)802.1X mode.
B)PSK mode.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
41
Bluetooth does not use access points.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
42
Centralized access point management raises management costs.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
43
Bluetooth is commonly used for ________.
A)wireless mice
B)wireless headphones
C)Both A and B
D)Neither A nor B
A)wireless mice
B)wireless headphones
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
44
I wish to have a wireless LAN to serve my house.I will use ________.
A)802.11
B)Bluetooth
C)Either A or B
A)802.11
B)Bluetooth
C)Either A or B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
45
Managed access points should ________.
A)identify rogue access points
B)be able to push updates out to access points
C)Both A and B
D)Neither A nor B
A)identify rogue access points
B)be able to push updates out to access points
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
46
As much as possible,WLAN management software should be able to work automatically,taking as many actions as possible without user intervention.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
47
Managed access points should ________.
A)allow access point power to be adjusted remotely
B)provide constant transmission quality monitoring
C)Both A and B
D)Neither A nor B
A)allow access point power to be adjusted remotely
B)provide constant transmission quality monitoring
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
48
Bluetooth offers very high transmission speeds.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
49
The normal maximum distance for Bluetooth propagation is ________.
A)10 meters
B)30 meters
C)50 meters
D)100 meters
A)10 meters
B)30 meters
C)50 meters
D)100 meters
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
50
________ uses access points.
A)802.11
B)Bluetooth
C)Both A and B
D)Neither A nor B
A)802.11
B)Bluetooth
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following was created for PANs?
A)802.11.
B)Bluetooth.
C)Both A and B
D)Neither A nor B
A)802.11.
B)Bluetooth.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
52
Bluetooth offers a rated speed today of about ________.
A)3 Mbps
B)11 Mbps
C)22 Mbps
D)54 Mbps
E)100 Mbps
A)3 Mbps
B)11 Mbps
C)22 Mbps
D)54 Mbps
E)100 Mbps
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
53
Centralized access point management ________.
A)increases management costs but provides better control
B)reduces management costs
A)increases management costs but provides better control
B)reduces management costs
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
54
Bluetooth uses ________.
A)access points
B)peer-to-peer connections between devices
C)Both A and B
D)Neither A nor B
A)access points
B)peer-to-peer connections between devices
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following can be used to centrally manage remote access points?
A)Smart access points.
B)WLAN switches.
C)Both A and B
D)Neither A nor B
A)Smart access points.
B)WLAN switches.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following gives longer battery life?
A)Bluetooth.
B)802.11.
A)Bluetooth.
B)802.11.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
57
Initial WLAN planning begins with drawing circles on building architecture drawings.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
58
Bluetooth is designed to transmit ________.
A)at high speeds
B)over long distances
C)Both A and B
D)Neither A nor B
A)at high speeds
B)over long distances
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
59
Bluetooth is for ________.
A)large WLANs
B)cable replacement
C)Both A and B
D)Neither A nor B
A)large WLANs
B)cable replacement
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
60
Bluetooth is used for cable replacement.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
61
In cellular technology,a cellsite is a small geographical area.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
62
If I use Channel3 in a cell,I can reuse that same channel in an adjacent cell with traditional cellular technology.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
63
What technology could replace universal product code (bar code)tags on products?
A)802.11.
B)Bluetooth.
C)UWB.
D)RFIDs.
A)802.11.
B)Bluetooth.
C)UWB.
D)RFIDs.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
64
________ is an approach for implementing multiple radio technologies in a single device at reduced cost.
A)UWB
B)ZigBee
C)Software defined radio
D)Agile radio
E)Bluetooth
A)UWB
B)ZigBee
C)Software defined radio
D)Agile radio
E)Bluetooth
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
65
Wireless WANs tend to have faster speeds than Wireless LANs.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following tends to have faster speeds?
A)Wireless LANs.
B)Wireless WANs.
C)They generally have about the same speed.
A)Wireless LANs.
B)Wireless WANs.
C)They generally have about the same speed.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
67
An MTSO ________.
A)controls cellsites in a cellular system
B)links mobile users to wired telephone customers
C)Both A and B
D)Neither A nor B
A)controls cellsites in a cellular system
B)links mobile users to wired telephone customers
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following uses application profiles?
A)802.11a.
B)802.11g.
C)All 802.11 networks.
D)Bluetooth.
E)All of the above.
A)802.11a.
B)802.11g.
C)All 802.11 networks.
D)Bluetooth.
E)All of the above.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
69
________ normally is limited to about 10 meters.
A)Bluetooth
B)802.11
C)Both A and B
D)Neither A nor B
A)Bluetooth
B)802.11
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
70
Cellular technology provides channel reuse,in different cells in the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
71
Application profiles are attractive because they allow devices to work with one another automatically at the application layer.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
72
If a pair of Bluetooth devices switch to 802.11 radio transmission,they can transmit at tens of megabits per second.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
73
If I use Channel3 in a cell,I can reuse that same channel in an adjacent cell with ________.
A)traditional cellular technology
B)CDMA
C)Both A and B
D)Neither A nor B
A)traditional cellular technology
B)CDMA
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
74
Most wireless WANs operate in a single metropolitan area.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
75
Bluetooth is faster than ZigBee.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
76
A ________ serves a city and its suburbs.
A)MAN
B)PAN
C)Both A and B
D)Neither A nor B
A)MAN
B)PAN
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
77
Cells are used in cellular telephony to provide ________.
A)service for more customers
B)greater reliability
C)greater speed
D)reduced latency
E)All of the above.
A)service for more customers
B)greater reliability
C)greater speed
D)reduced latency
E)All of the above.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
78
802.11 is faster than UWB.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
79
If I use Channel3 in a cell,I can reuse that same channel in an adjacent cell with CDMA cellular technology.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
80
In cellular technology,a ________ is a small geographical area.
A)cell
B)cellsite
C)Both A and B
D)Neither A nor B
A)cell
B)cellsite
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck