Deck 7: Wireless Lans II
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/73
Play
Full screen (f)
Deck 7: Wireless Lans II
1
In 802.11i ________,hosts must know a shared initial key.
A) 802.1X initial authentication mode
B) PSK initial authentication mode
C) both A and B
D) neither A nor B
A) 802.1X initial authentication mode
B) PSK initial authentication mode
C) both A and B
D) neither A nor B
B
2
If a drive-by hacker succeeds in connecting to an internal access point,the network traffic is ________.
A) still protected by a firewall
B) still protected by encryption
C) both A and B
D) neither A nor B
A) still protected by a firewall
B) still protected by encryption
C) both A and B
D) neither A nor B
D
3
802.11i PSK initial authentication mode was created for ________.
A) corporations with multiple access points
B) residences with a single access point
C) residences with less than eight access points
D) corporations with less than eight access points
A) corporations with multiple access points
B) residences with a single access point
C) residences with less than eight access points
D) corporations with less than eight access points
B
4
802.11i 802.1X initial authentication mode was created for ________.
A) corporations with multiple access points
B) residences with a single access point
C) residences with less than eight access points
D) corporations with less than eight access points
A) corporations with multiple access points
B) residences with a single access point
C) residences with less than eight access points
D) corporations with less than eight access points
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
5
In 802.11i,protection is provided between the client and the ________.
A) access point
B) switch
C) router
D) server
A) access point
B) switch
C) router
D) server
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a risk in 802.11i PSK mode?
A) Unauthorized sharing of the pre-shared key.
B) A weak passphrase may be selected.
C) both A and B
D) neither A nor B
A) Unauthorized sharing of the pre-shared key.
B) A weak passphrase may be selected.
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
7
After authentication in 80.11i PSK mode,a wireless client communicates with the access point via a(n)________ key.
A) VPN
B) pairwise session
C) 802.1X
D) preshared
A) VPN
B) pairwise session
C) 802.1X
D) preshared
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
8
The protection of communication between a wireless client and the access point is ________.
A) link security
B) end-to-end security
C) both A and B
D) neither A nor B
A) link security
B) end-to-end security
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
9
After two wireless clients authenticate themselves via PSK to an access point,they will use ________ to communicate with the access point.
A) the preshared key
B) an 802.1X key
C) WPA keys
D) different pairwise session keys
A) the preshared key
B) an 802.1X key
C) WPA keys
D) different pairwise session keys
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
10
802.11i provides ________.
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
11
What is the strongest security protocol for 802.11 today?
A) 802.11s
B) 802.11X
C) WPA
D) 802.11i
A) 802.11s
B) 802.11X
C) WPA
D) 802.11i
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
12
In what initial authentication mode of 802.11i is a central authentication server used?
A) 802.1X
B) PSK
C) both A and B
D) neither A nor B
A) 802.1X
B) PSK
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
13
Communication after authentication is protected most strongly if the ________ initial authentication is used.
A) PSK
B) 802.1X
C) WPA
D) It does not matter which initial authentication mode is used.
A) PSK
B) 802.1X
C) WPA
D) It does not matter which initial authentication mode is used.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
14
The Wi-Fi Alliance calls 802.11i ________.
A) WEP
B) WPA
C) WPA2
D) none of the above
A) WEP
B) WPA
C) WPA2
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
15
In 802.1x initial authentication mode,the VERIFIER is the ________.
A) wireless client
B) wireless access point
C) authentication server
D) none of the above
A) wireless client
B) wireless access point
C) authentication server
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
16
In 802.1x initial authentication mode,the authenticator is the ________.
A) wireless client
B) wireless access point
C) authentication server
D) none of the above
A) wireless client
B) wireless access point
C) authentication server
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
17
Nearly all public Wi-Fi hotspots encrypt your transmissions.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
18
If a firm has many access points,it should use ________ initial authentication mode in 802.11i.
A) PSK
B) 802.1X
C) IPsec
D) WPA
A) PSK
B) 802.1X
C) IPsec
D) WPA
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
19
In 802.11i PSK mode,the pass phrase should be at least ________ characters long.
A) 8
B) 12
C) 20
D) 128
A) 8
B) 12
C) 20
D) 128
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
20
Which offers stronger security?
A) WPA
B) 802.11i
C) both A and B offer equally strong security.
A) WPA
B) 802.11i
C) both A and B offer equally strong security.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
21
You can test whether an evil twin attack has taken place against your wireless client.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
22
802.11i can defeat rogue access points.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
23
If a company uses 802.11i for its core security protocol,an evil twin access point will set up ________ 802.11i connection(s).
A) one
B) two
C) four
D) none of the above.
A) one
B) two
C) four
D) none of the above.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
24
An evil twin access point is usually ________.
A) a database
B) a laptop computer
C) a calculator
D) a spreadsheet
A) a database
B) a laptop computer
C) a calculator
D) a spreadsheet
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
25
Selecting locations for access points first involves ________.
A) laying out circles of a chosen diameter in a diagram of the building
B) doing a wireless site survey
C) selecting locations that reflect organizational units
D) all of the above
A) laying out circles of a chosen diameter in a diagram of the building
B) doing a wireless site survey
C) selecting locations that reflect organizational units
D) all of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
26
You should use a VPN ________.
A) if you know that an evil twin access point is in use.
B) if you know that your device has been compromised by an evil twin attack.
C) always
D) never
A) if you know that an evil twin access point is in use.
B) if you know that your device has been compromised by an evil twin attack.
C) always
D) never
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
28
Site surveys should be done ________.
A) after the initial provisional placement of access points
B) periodically afterwards
C) both A and B
D) neither A nor B
A) after the initial provisional placement of access points
B) periodically afterwards
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
A) VLANs
B) VPNs
C) 802.1X mode
D) none of the above
A) VLANs
B) VPNs
C) 802.1X mode
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
30
Centralized access point management ________.
A) increases management costs but provides better control
B) reduces management costs
A) increases management costs but provides better control
B) reduces management costs
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
31
A security might use SNMP Get commands to ________.
A) change an access point's power
B) collect information to look for a rogue access point
C) both A and B
D) neither A nor B
A) change an access point's power
B) collect information to look for a rogue access point
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
32
What initial authentication mode does 802.11i use?
A) 802.1X
B) PSK
C) both A and B
D) neither A nor B
A) 802.1X
B) PSK
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
33
When a wireless client in an evil twin attack transmits,________.
A) the evil twin reads the packet, encrypts it, and passes on the packet
B) the evil twin reads the frame, encrypts it, and passes on the frame
C) the evil twin reads the packet and passes on the packet
D) the evil twin reads the frame and passes on the frame
A) the evil twin reads the packet, encrypts it, and passes on the packet
B) the evil twin reads the frame, encrypts it, and passes on the frame
C) the evil twin reads the packet and passes on the packet
D) the evil twin reads the frame and passes on the frame
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
34
A rogue access point is usually created by ________.
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
35
A security might use SNMP Set commands to ________.
A) change an access point's power
B) collect information to look for a rogue access point
C) both A and B
D) neither A nor B
A) change an access point's power
B) collect information to look for a rogue access point
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
36
A VPN provides ________.
A) link security
B) end-to-end security
C) comprehensive security
D) none of the above
A) link security
B) end-to-end security
C) comprehensive security
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ is an unauthorized internal access point.
A) binky
B) shadow
C) rogue
D) none of the above
A) binky
B) shadow
C) rogue
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
38
Which initial authentication mode is used for message-by-message encryption,authentication,and message integrity?
A) 802.1X
B) PSK
C) both A and B
D) neither A nor B
A) 802.1X
B) PSK
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
39
In VPNs designed to frustrate evil twin attacks,the shared secret between the client and the server is ________.
A) transmitted in the clear
B) transmitted with cryptographic protections
C) not transmitted
D) any of the above
A) transmitted in the clear
B) transmitted with cryptographic protections
C) not transmitted
D) any of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
40
Employees who set up rogue access points usually have malicious motives.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
41
Classic Bluetooth provides transmission speeds of ________.
A) 3 Mbps
B) 24 Mbps
C) both A and B
D) neither A nor B
A) 3 Mbps
B) 24 Mbps
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
42
In Bluetooth LE,________ notify other Bluetooth devices that it is available.
A) advertisements
B) beacons
C) both A and B
D) neither A nor B
A) advertisements
B) beacons
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
43
A change in power from 2 mW to 17 mW corresponds to approximately ________ decibels.
A) 3
B) 9
C) 12
D) 20
A) 3
B) 9
C) 12
D) 20
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
44
If Wi-Fi supported the basic printing profile,________.
A) documents could be printed without downloading drivers
B) printer drivers would be downloaded automatically
C) printing would use two layers of drivers
D) none of the above
A) documents could be printed without downloading drivers
B) printer drivers would be downloaded automatically
C) printing would use two layers of drivers
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
45
IoT transmissions usually involve ________.
A) high transmission speeds
B) low transmission distances
C) both A and B
D) neither A nor B
A) high transmission speeds
B) low transmission distances
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is true of Bluetooth?
A) A master may have multiple slaves.
B) A slave may have multiple masters.
C) both A and B
D) neither A nor B
A) A master may have multiple slaves.
B) A slave may have multiple masters.
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
47
A change in power from 2 mW to 205 mW corresponds to approximately ________ decibels.
A) 3
B) 9
C) 10
D) 20
A) 3
B) 9
C) 10
D) 20
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
48
Bluetooth ________ is likely to be used most of the time in IoT transmission.
A) HDR
B) HS
C) LE
D) COIN
A) HDR
B) HS
C) LE
D) COIN
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
49
A group of devices on a desk that communicate wirelessly is called a ________.
A) LAN
B) WAN
C) MAN
D) PAN
A) LAN
B) WAN
C) MAN
D) PAN
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
50
Bluetooth uses ________ operation.
A) all-to-all
B) point-to-multipoint
C) one-to-all
D) one-to-one
A) all-to-all
B) point-to-multipoint
C) one-to-all
D) one-to-one
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
51
For a game joystick,you would use the ________ Bluetooth profile.
A) basic printing
B) SYNCH
C) human interface device
D) mouse
A) basic printing
B) SYNCH
C) human interface device
D) mouse
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
52
Bluetooth LE ________.
A) uses about 0.1 to 0.5 watts
B) assumes that transmissions will be infrequent
C) has terse connection openings
D) all of the above
A) uses about 0.1 to 0.5 watts
B) assumes that transmissions will be infrequent
C) has terse connection openings
D) all of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
53
Bluetooth Low Energy ________.
A) provides much higher speed than other IoT transmission standards
B) provides energy to power the other device
C) does not require batteries
D) conserves battery power
A) provides much higher speed than other IoT transmission standards
B) provides energy to power the other device
C) does not require batteries
D) conserves battery power
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
54
Compared to an omnidirectional antenna,a dish antenna quadruples radiated power.How much is this change in decibels?
A) 6 dB
B) 9 db
C) 16 db
D) none of the above
A) 6 dB
B) 9 db
C) 16 db
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
55
The ________ standard dominates IoT transmission today.
A) Bluetooth
B) Zigbee
C) Wi-Fi direct
D) none of the above
A) Bluetooth
B) Zigbee
C) Wi-Fi direct
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
56
Bluetooth LE normally uses ________ for power.
A) a coin battery
B) wall power
C) both A and B
D) neither A nor B
A) a coin battery
B) wall power
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
57
Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)²
C) Log10(P2/P1)
D) none of the above
A) 10 * P2/P1
B) 10 * (P2/P1)²
C) Log10(P2/P1)
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
58
An 8/1 increase in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 20
D) none of the above
A) 3
B) 6
C) 20
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
59
If a master has multiple slaves,Bluetooth will use ________ operation.
A) all-to-all
B) point-to-multipoint
C) one-to-all
D) one-to-one
A) all-to-all
B) point-to-multipoint
C) one-to-all
D) one-to-one
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
60
A change in power from 100 W to 1 W corresponds to approximately ________ decibels.
A) 10
B) 20
C) -10
D) -20
A) 10
B) 20
C) -10
D) -20
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
61
Wi-Fi direct ________ uses access points.
A) always
B) usually
C) rarely
D) never
A) always
B) usually
C) rarely
D) never
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
62
________ can operate in the 2.4 service band.
A) Zigbee
B) Z-Wave
C) both A and B
D) neither A nor B
A) Zigbee
B) Z-Wave
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
63
NFC transmission standards have been set for ________.
A) its service band
B) mesh networking
C) both A and B
D) neither A nor B
A) its service band
B) mesh networking
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
64
In Zigbee,ad hoc networking's mesh is operated by ________.
A) Zigbee Controllers
B) Zigbee End Devices
C) Zigbee Routers
D) Zigbee Hives
A) Zigbee Controllers
B) Zigbee End Devices
C) Zigbee Routers
D) Zigbee Hives
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
65
Passive RFID chips get the power needed to transmit from ________.
A) wall power
B) coin batteries
C) the electricity that always flows through the air in small quantities
D) none of the above
A) wall power
B) coin batteries
C) the electricity that always flows through the air in small quantities
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
66
A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile.
A) classic Bluetooth
B) Bluetooth LE
C) both A and B
D) neither A nor B
A) classic Bluetooth
B) Bluetooth LE
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is an ad hoc networking protocol?
A) Zigbee
B) Z-Wave
C) both A and B
D) neither A nor B
A) Zigbee
B) Z-Wave
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
68
In IoT device transmission,published distance limits are relevant for ________.
A) legitimate users
B) hackers
C) both A and B
D) neither A nor B
A) legitimate users
B) hackers
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
69
When two devices communicate using NFC,how close must they be?
A) a few inches
B) up to 5 feet
C) up to 10 feet
D) up to 50 feet
A) a few inches
B) up to 5 feet
C) up to 10 feet
D) up to 50 feet
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
70
Zigbee is designed to be used in a(n)________ network.
A) one-to one
B) hierarchical
C) multipoint
D) ad hoc
A) one-to one
B) hierarchical
C) multipoint
D) ad hoc
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
71
In Bluetooth LE,________ provide information.
A) advertisements
B) beacons
C) both A and B
D) neither A nor B
A) advertisements
B) beacons
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
72
The state of security in IoT transmission standards is ________.
A) strong
B) weak
C) mixed
D) flawless
A) strong
B) weak
C) mixed
D) flawless
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
73
A lamp in a Zigbee network would probably be a ________.
A) client
B) server
C) router
D) none of the above
A) client
B) server
C) router
D) none of the above
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck