Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
- 3rd side (hint)
1 CH12
Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA? |
1
A) WEP B) WTLS C) WAP D) WOP |
1 C
Wireless Application Protocol (WAP) is an open international standard for applications that use wireless communication. |
|
2 CH12
Which protocol operates on 2.4GHz and has a bandwidth of 1 Mbps or 2 Mbps? |
2
A) 802.11 B) 802.11a C) 802.11b D) 802.11g |
2 A
802.11 operates on 2.4GHZ. This standard allows for bandwidths of 1 Mbps or 2 Mbps. |
|
3 CH12
You’re outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network? |
3
A)WEP B) WTLS C) WPA2 D) IR |
3 C
Wi-Fi Protected Access 2 (WPA2) was intended to provide security that’s equivalent to the security on a wired network and implements elements of the 802.11i standard. |
|
4 CH12
Which of the following is a primary vulnerability of a wireless environment? |
4
A) Decryption software B) IP spoofing C) A gap in the WAP D) Site survey |
4 D
A site survey is the process of monitoring a wireless network using a computer, wireless controller, and analysis software. Site surveys are easily accomplished and hard to detect. |
|
5 CH12
Which of the following is synonymous with MAC filtering? |
5
A) TKIP B) Network lock C) EAP-TTLS D) MAC secure |
5 B
The term network lock is synonymous with MAC filtering. |
|
6 CH12
Which of the following 802.11 standards is often referenced as WPA2? |
6
A) 802.11a B) 802.11b C) 802.11i D) 802.11n |
6 C
The WPA2 standard is also known as 802.11i. |
|
7 CH12
Which of the following 802.11 standards provides for bandwidths of up to 300 Mbps? |
7
A) 802.11n B) 802.11i C) 802.11g D) 802.11b |
7 A
The 802.11n standard provides for bandwidths of up to 300Mbps. |
|
8 CH12
An IV attack is usually associated with which of the following wireless protocols? |
8
A) WEP B) WAP C) WPA D) WPA2 |
8 A
An IV attack is usually associated with the WEP wireless protocol. |
|
9 CH12
Which type of encryption does CCMP use? |
9
A) EAP B) DES C) AES D) IV |
9 C
CCMP uses 128-bit AES encryption. |
|
10 CH12
Which encryption technology is associated with WPA? |
10
A) TKIP B) CCMP C) WEP D) LDAP |
10 A
The encryption technology associated with WPA is TKIP. |
|
11 CH12
Which of the following is not one of the three transmission technologies used to communicate in the 802.11 standard? |
11
A) DSSS B) FHSS C) VITA D) OFDM |
11 C
The three technologies available for use with the 802.11 standard are DSSS (direct-sequence spread spectrum), FHSS (frequency-hopping spread spectrum), and OFDM (orthogonal frequency division multiplexing). VITA (Volunteer Income Tax Assistance) is not a wireless transmission technology. |
|
12 CH12
What is the size of the initialization vector (IV) that WEP uses for encryption? |
12
A) 6-bit B) 24-bit C) 56-bit D) 128-bit |
12 B
The initialization vector (IV) that WEP uses for encryption is 24-bit. |
|
13 CH12
Which of the following is a script language WAP-enabled devices can respond to? |
13
A) WXML B) Winsock C) WIScript D) WMLScript |
13 D
WAP-enabled devices can respond to scripts using an environment called WMLScript. |
|
14 CH12
Which of the following authentication levels with WAP requires both ends of the connection to authenticate to confirm validity? |
14
A) Relaxed B) Two-way C) Server D) Anonymous |
14 B
Two-way authentication requires both ends of the connection to authenticate to confirm validity. |
|
15 CH12
Which of the following manages the session information and connection between wireless devices? |
15
A) WSP B) WPD C) WPT D) WMD |
15 A
WSP (Wireless Session Protocol) manages the session information and connection between wireless devices. |
|
16 CH12
Which of the following provides services similar to TCP and UDP for WAP? |
16
A) WTLS B) WDP C) WTP D) WFMD |
16 C
The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP. |
|
17 CH12
Which of the following authentication levels with WAP allows virtually anyone to connect to the wireless portal? |
17
A) Relaxed B) Two-way C) Server D) Anonymous |
17 D
Anonymous authentication allows virtually anyone to connect to the wireless portal. |
|
18 CH12
If the interconnection between the WAP server and the Internet isn’t encrypted, packets between the devices may be intercepted. What is this vulnerability known as? |
18
A) Packet sniffing B) Minding the gap C) Middle man D) Broken promise |
18 A
If the interconnection between the WAP server and the Internet isn’t encrypted, packets between the devices may be intercepted and this is known as packet sniffing. |
|
19 CH12
WAP uses a smaller version of HTML for Internet displays. This is known as: |
19
A) DSL B) HSL C) WML D) OFML |
19 C
WAP uses a smaller version of HTML called Wireless Markup Language (WML) for Internet displays. |
|
20 CH12
What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet? |
20
A) 128-bit B) 64-bit C) 56-bit D) 12-bit |
20 A
TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet. |