Chapter 6

Review Questions

1. The amendment to add 5.5 Mbps and 11 Mbps to the IEEE 802.11 standard is ______.

A. IEEE 802.11a

B. IEEE 802.11b

C. IEEE 802.11g

D. IEEE 802.11n

2. Access to the wireless network can be restricted by _______.

A. MAC address filtering

B. ARP resolution

C. TKIP encryption

D. WEP authentication

3. The cyclic redundancy check (CRC) is also called the _______.

A. integrity check value (ICV)

B. initialized vector resource (IVR)

C. check parity bit (CPB)

D. R5C check

4. A wireless network requires that the _____ be authenticated first.

A. user

B. thick wireless device

C. wireless device

D. authentication probe

5. The Service Set Identifier (SSID) _____.

A. serves as the network name for a WLAN

B. is only used on IEEE 802.11g networks

C. is optional on all networks

D. is used only with closed system authentication

6. The optional authentication method that forces the wireless device to encrypt challenge text using its WEP encryption key is known as _____ .

A. WEP encryption

B. shared key authentication

C. challenge text verification (CTV)

D. AP authentication (APA)

7. Each of the following is a weakness of open system authentication except _______.

A. SSIDs are by default contained in beacon frames to all wireless devices

B. turning off SSIDs can hinder roaming

C. SSIDs are transmitted in other management frames sent by the access point

D. open system authentication requires an authentication server

8. The weakness of WEP is that _____.

A. it requires the use of an enhanced access point (EAP) for it to function properly

B. it is costly to implement

C. the encryption algorithm has been broken by attackers

D. the initialization vectors (IVs) are repeated

9. The two models for personal wireless security developed by the Wi-Fi Alliance are Wi-Fi Protected Access (WPA) and _____ .

A. Protected Wireless Security (WPS)

B. IEEE 802.11x

C. Postshared Key Protection (PKP)

D. Wi-Fi Protected Access 2 (WPA2)

10. The _____ replaces the cyclic redundancy check (CRC) and is designed to prevent an attacker from capturing, altering, and resending a data packet.

A. Message Integrity Check (MIC)

B. Cyclic Redundancy Check 2 (CRC2)

C. Wi-Fi CRC

D. Wireless Parity Check (WPC)

11. The IEEE standard for wireless security is known as _____ .

A. IEEE 803.x

B. IEEE Wi-Fi Protected Access

C. IEEE 802.11i

D. IEEE PSK

12. A(n) _____ is designed to verify the authentication of wireless devices using IEEE 802.1x.

A. proxy ID server

B. access point server

C. check point server

D. authentication server

13. Wireless switches are used in conjunction with _____ for increased security by moving security features to the switch.

A. authentication access points (AAPs)

B. network intrusion prevention system (NIPS)

C. access control appliances (ACA)

D. thin access points

14. Separate _____ can be used to support low-security guest Internet access and high-security administrators on the same access point.

A. wireless virtual local area networks (VLANs)

B. segmented access points

C. separated wireless streams (SWS)

D. proxy security servers

15. Each of the following can be used to monitor airwaves for traffic except a(n) _____.

A. dedicated probe

B. access point probe

C. resource monitor probe

D. wireless device probe

16. A WEP key that is 128 bits in length _____ .

A. has an initialization vector (IV) that is the same length as a WEP key of 64 bits

B. is less secure than a WEP key of 64 bits because shorter keys are better

C. cannot be cracked because it is too long

D. cannot be used on access points that use passphrases

17. For a SOHO the best security model would be the _____

A. Wi-Fi Protected Access Personal Security model

B. Enterprise Protection Personal Security model

C. IEEE Wi-Fi Personal Protection model

D. Wi-Fi Protected Access 2 Personal Security model

18. Preshared key (PSK) authentication requires that the encryption key _____.

A. must be entered on all devices prior to wireless communication occurring

B. be the same length as the Initialization Vector (IV)

C. be entered in hexadecimal notation on the access point

D. be encrypted before it can be entered by a user on a wireless device

19. _____ stores information from a device on the network so if a user roams away from a wireless access point and later returns, he does not need to re-enter all of the credentials.

A. Key-caching

B. Pre-key authentication

C. Key roaming

D. Security key resolution

20. The _____ model is designed for medium to large-size organizations in which an authentication server is available.

A. IEEE 802.11d

B. Wi-Fi Academic

C. WPA 2 Enterprise Security

D. Wi-Fi 802.x