• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
1 CH12
Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA?
1
A) WEP
B) WTLS
C) WAP
D) WOP
1 C
Wireless Application Protocol (WAP)  is an open international standard for applications that use wireless communication.  
2 CH12
Which protocol operates on 2.4GHz and has a bandwidth of 1 Mbps or 2 Mbps?
2
A) 802.11
B) 802.11a
C) 802.11b
D) 802.11g
2 A
802.11 operates on 2.4GHZ. This standard allows for bandwidths of 1 Mbps or 2 Mbps.
3 CH12
You’re outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network?
3
A)WEP
B) WTLS
C) WPA2
D) IR
3 C
Wi-Fi Protected Access 2 (WPA2) was intended to provide security that’s equivalent to the security on a wired network and implements elements of the 802.11i standard.
4 CH12
Which of the following is a primary vulnerability of a wireless environment?
4
A) Decryption software
B) IP spoofing
C) A gap in the WAP
D) Site survey
4 D
A site survey is the process of monitoring a wireless network using a computer, wireless controller, and analysis software. Site surveys are easily accomplished and hard to detect.
5 CH12
Which of the following is synonymous with MAC filtering?
5
A) TKIP
B) Network lock
C) EAP-TTLS
D) MAC secure
5 B
The term network lock  is synonymous with MAC filtering.
6 CH12
Which of the following 802.11 standards is often referenced as WPA2?
6
A) 802.11a
B) 802.11b
C) 802.11i
D) 802.11n
6 C
The WPA2 standard is also known as 802.11i.
7 CH12
Which of the following 802.11 standards provides for bandwidths of up to 300 Mbps?
7
A) 802.11n
B) 802.11i
C) 802.11g
D) 802.11b
7 A
The 802.11n standard provides for bandwidths of up to 300Mbps.
8 CH12
An IV attack is usually associated with which of the following wireless protocols?
8
A) WEP
B) WAP
C) WPA
D) WPA2
8 A
An IV attack is usually associated with the WEP wireless protocol.
9 CH12
Which type of encryption does CCMP use?
9
A) EAP
B) DES
C) AES
D) IV
9 C
CCMP uses 128-bit AES encryption.
10 CH12
Which encryption technology is associated with WPA?
10
A) TKIP
B) CCMP
C) WEP
D) LDAP
10 A
The encryption technology associated with WPA is TKIP.
11 CH12
Which of the following is not one of the three transmission technologies used to communicate in the 802.11 standard?
11
A) DSSS
B) FHSS
C) VITA
D) OFDM
11 C
The three technologies available for use with the 802.11 standard are DSSS (direct-sequence spread spectrum), FHSS (frequency-hopping spread spectrum), and OFDM (orthogonal frequency division multiplexing). VITA (Volunteer Income Tax Assistance) is not a wireless transmission technology.
12 CH12
What is the size of the initialization vector (IV) that WEP uses for encryption?
12
A) 6-bit
B) 24-bit
C) 56-bit
D) 128-bit
12 B
The initialization vector (IV) that WEP uses for encryption is 24-bit.
13 CH12
Which of the following is a script language WAP-enabled devices can respond to?
13
A) WXML
B) Winsock
C) WIScript
D) WMLScript
13 D
WAP-enabled devices can respond to scripts using an environment called WMLScript.
14 CH12
Which of the following authentication levels with WAP requires both ends of the connection to authenticate to confirm validity?
14
A) Relaxed
B) Two-way
C) Server
D) Anonymous
14 B
Two-way authentication requires both ends of the connection to authenticate to confirm validity.
15 CH12
Which of the following manages the session information and connection between wireless devices?
15
A) WSP
B) WPD
C) WPT
D) WMD
15 A
WSP (Wireless Session Protocol) manages the session information and connection between wireless devices.
16 CH12
Which of the following provides services similar to TCP and UDP for WAP?
16
A) WTLS
B) WDP
C) WTP
D) WFMD
16 C
The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP.
17 CH12
Which of the following authentication levels with WAP allows virtually anyone to connect to the wireless portal?
17
A) Relaxed
B) Two-way
C) Server
D) Anonymous
17 D
Anonymous authentication allows virtually anyone to connect to the wireless portal.
18 CH12
If the interconnection between the WAP server and the Internet isn’t encrypted, packets between the devices may be intercepted. What is this vulnerability known as?
18
A) Packet sniffing
B) Minding the gap
C) Middle man
D) Broken promise
18 A
If the interconnection between the WAP server and the Internet isn’t encrypted, packets between the devices may be intercepted and this is known as packet sniffing.
19 CH12
WAP uses a smaller version of HTML for Internet displays. This is known as:
19
A) DSL
B) HSL
C) WML
D) OFML
19 C
WAP uses a smaller version of HTML called Wireless Markup Language (WML) for Internet displays.
20 CH12
What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet?
20
A) 128-bit
B) 64-bit
C) 56-bit
D) 12-bit
20 A
TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet.