200+ Wireless Multiple Choice Questions and Answers

Wireless Multiple Choice Questions Answers Techhyme

Wireless networks pose a threat to all who use them. Wireless networks lack the safety associated with having one’s communications securely transmitted inside physical cabling. With wireless communications, the air is the transmission medium and that medium is accessible to anyone who wants to listen. This has led to many tools, which were developed to aid the curious in eavesdropping on other people’s wireless communications.

Also Read:

These tools are most often created for network management or troubleshooting and include some powerful capabilities. Often, these same tools have a very dark side if used for that particular purpose.

Multiple-choice questions are one of the most popular question types that present a question or statement with a list of possible answers. The below listed MCQs covers all important topics of wireless security and networking.

1. What happens to an 802.11b wireless signal when an evergreen tree is located between the transmitter and receiver?

A. Nothing.
B. It is refracted.
C. It is diffracted.
D. It is reflected.
E. It is absorbed.

Correct Answer – E

2. What are the two correct terms used to measure antenna gain?

A. dBi and DBd
B. Watts and mill watt
C. dBd and dBi
D. EIRP

Correct Answer – C

3. The designator dBi is a decibel compared to what?

A. Milliwatt
B. Decibel
C. Isotropic radiator
D. RADIUS

Correct Answer – C

4. Which type of modulation does 802.11b use?

A. QAM
B. FM
C. AM
D. CCK

Correct Answer – D

5. How can one send more data across the air?

A. Increase the transmit power.
B. Use a more complex modulation.
C. Use a bigger antenna.
D. Use a wider frequency band.

Correct Answer – B

6. What was the Wi-Fi Alliance formerly known as?

A. FCC
B. WECA
C. IEEE
D. WIFI

Correct Answer – B

7. What seal certifies interoperability in a manufacturer’s wireless device?

A. WHY
B. Hi-Fi
C. WECA
D. Wi-Fi Certified
E. Wi-Fi

Correct Answer – D

8. Which wave will travel the greatest distance?

A. FM radio
B. X-ray
C. 802.11a
D. Microwave

Correct Answer – A

9. What two items should be maintained near the edges of a wireless cell when performing a site survey?

A. High signal-to-noise ratio
B. Low signal-to-noise ratio
C. High noise level
D. High signal strength

Correct Answer – A, D

10. What would the FCC and ETSI regulate on a wireless network? (Select more than one)

A. Power outputs
B. Total client number
C. Channel number and frequency
D. Who can use the system?

Correct Answer – A, C

11. What bandwidth term is this phrase stating? On any given day, my wireless network has a low bandwidth of ______.

A. 11 Mbps
B. 2.4 GHz
C. 11 MHz
D. 5.4 GHz

Correct Answer – A

12. Which of the following show the correct use of a wireless network?

A. Using wireless to connect two buildings point-to-point
B. Mobile access from laptop or PDA
C. As a way to connect a server
D. To increase bandwidth on a 10/100 wired network

Correct Answer – B

13. When a wireless signal changes or bends around an object, sometimes creating a shadow area, it is known as __________.

A. Refraction
B. Reflection
C. Diffraction
D. Scattering

Correct Answer – C

14. When performing wireless power calculations, what two terms are often converted into each other?

A. dBi to dBi
B. dB to Watts
C. dBm to DBi
D. dBd to dB

Correct Answer – D

15. What standards body creates wireless standards?

A. Wi-Fi Alliance
B. IEEE
C. FCC
D. WECA

Correct Answer – B

16. What key size is required in WEP for the Wi-Fi Alliance to certify a product?

A. 40 bits
B. 120 bits
C. 128 bits
D. 56 bits

Correct Answer – A

17. What does Wi-Fi stand for?

A. Wireless infrastructure fidelity industry
B. Wireless Interoperability Forum Institute
C. Wireless fidelity
D. Wireless networking

Correct Answer – C

18. Which of the following processes will not lower the risk of social engineering at a help desk?

A. Positively identifying the caller
B. Using a callback method
C. Shredding documents
D. Having the caller verify the identity of the help desk operator

Correct Answer – D

19. What would a hacker whose motive was money most prefer to attack?

A. School
B. Bank
C. Doll shop
D. Pizza shop

Correct Answer – B

20. Which of the following terms best describes a Wi-Fi hacker?

A. War dialer
B. Hacker
C. War hacker
D. War driver

Correct Answer – D

21. What type of malicious code infects devices and does not have the ability to replicate or spread outside the infected system on its own?

A. Worm
B. Virus
C. Trojan horse
D. Spam

Correct Answer – B

22. List the three main goals of information security.

A. Integrity
B. Encryption
C. Availability
D. Confidentiality
E. Scalability
F. Protecting

Correct Answer – C, D

23. What two pieces of information are required to hack a cell phone?

A. MNN and ESS
B. MIN and ESN
C. ENS and MSN
D. Phone ID and vendor ID

Correct Answer – B

24. What piece of information is unique on every wireless card in the world?

A. IP address
B. Serial number
C. MAC address
D. SSID

Correct Answer – C

25. Which of the following terms are used to describe the process of discovering wireless networks?

A. War flying
B. War walking
C. War driving
D. All of the above

Correct Answer – D

26. A self-replicating and often self-sending piece of malicious code, which is often e-mailed, is called _____________.

A. A worm
B. A virus
C. A Trojan
D. Spam

Correct Answer – A

27. What technique would an attacker do to force a wireless end device to disconnect from the network?

A. Wireless scan
B. Port scan
C. OS fingerprinting
D. RF jamming

Correct Answer – D

28. What would a wireless hacker in his early teens most likely be doing?

A. War flying
B. War driving
C. War walking
D. War gaming

Correct Answer – C

29. What piece of legislation defines communication as “the transfers of signs, signals, writing, images, sound, data, or intelligence of any nature transmitted in whole or in part by wire, radio, electromagnetic, photo-electronic, or photo-optical systems that affects interstate or foreign commerce”?

A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act

Correct Answer – B

30. What act detailed the use, disclosure, interception, and privacy of electronic commutations?

A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act

Correct Answer – B

31. How much loss must a company have before it can get help from the FBI?

A. $5000
B. $50,000
C. $500,000
D. It is based on location and the average loss for that location.

Correct Answer – D

32. What did the Patriot Act amend relating to computer crime? Choose the best answer.

A. Nothing; it was its own act.
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act

Correct Answer – B

33. When was the Electronic Communications Privacy Act created?

A. 1999
B. 1988
C. 1985
D. 1986

Correct Answer – D

34. When was the Computer Fraud and Abuse Act created?

A. 1999
B. 2001
C. 1989
D. 1996

Correct Answer – D

35. What act was created to help protect U.S. Government computers?

A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act

Correct Answer – C

36. What act was created to protect U.S. networks?

A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act

Correct Answer – C

37. Under the Patriot Act, who is required to log and track hacking attempts?

A. The Department of Homeland Security
B. The FBI
C. The NSA
D. The ISP

Correct Answer – C

38. What regulation, act, or law was put into place due to the lack of clear terms regarding what constitutes a computer crime?

A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act

Correct Answer – C

39. The FCC has a law that makes running a sniffer and receiving other people’s network traffic a crime.

A. True
B. False

Correct Answer – A

40. An 802.11a radio uses what technique to transmit its signal?

A. FHSS
B. DSSS
C. OFDM
D. OFSS

Correct Answer – C

41. The 802.11b standard does not use DSSS.

A. True
B. False

Correct Answer – B

42. Which standard listed below supports Frequency Hopping Spread Spectrum?

A. 802.11b
B. 802.11g
C. 802.11a
D. 802.11

Correct Answer – D

43. Within North America, what numbers of channels are considered no overlapping?

A. 1
B. 3
C. 14
D. 11

Correct Answer – B

44. The 802.11g standard supports the use of orthogonal frequency division multiplexing (OFDM) in which radio frequency band?

A. 2.4 MHz
B. 5.4 MHz
C. 5.8 MHz
D. 5.0 MHz

Correct Answer – A

45. Dwell time is a function of which of the following physical layer techniques?

A. DSSS
B. FHSS
C. OFDM
D. PHY

Correct Answer – B

46. DSSS is a type of what?

A. Spread surface
B. Spread spectrum
C. Modulation type
D. Network identifier

Correct Answer – B

47. How many channels of DSSS are in use in the United States?

A. 1
B. 14
C. 12
D. 11

Correct Answer – D

48. How many channels are used in an ESTI-governed location?

A. 1
B. 13
C. 11
D. 14

Correct Answer – B

49. The 2.4 frequency that 802.11b operates in is called __________.

A. DSSS
B. OFMD
C. UNII
D. ISM

Correct Answer – D

50. The 802.11a standard is associated with which two terms?

A. ISM
B. UNII
C. 2.4 GHz
D. 5.15–5.30 GHz

Correct Answer – D

51. How much of the 2.4-GHz ISM band is used when a single access point 802.11b wireless network is enabled?

A. 11 MHz
B. 22 MHz
C. 1 MHz
D. 20 MHz

Correct Answer – D

52. What is the total amount of wireless bandwidth inside the 2.4-GHz ISM band?

A. 70 MHz
B. 11 Mbps
C. 54 Meg
D. 83.5 MHz

Correct Answer – D

53. What is the amount of time a channel takes to switch from one channel to another channel on an FH system called?

A. Hop time
B. Dwell sequence
C. Hopping time
D. Dwell time

Correct Answer – A

54. You are designing an RF network and have channel 6 used. What other channel would you select to use next to channel 6?

A. 4
B. 3
C. 1
D. 9

Correct Answer – C

55. What are the three main wireless frame types?

A. Control frames
B. Management frames
C. Data frames
D. Session frames

Correct Answer – A, B, C

56. When a wireless network is using an access point, which device sends the beacons?

A. Access point
B. Wireless laptop
C. Authentication server
D. User

Correct Answer – A

57. Which layer 2 protocols does 802.11b use?

A. CSMA/CD
B. RTS/CTS
C. DSSS
D. CSMA/CA

Correct Answer – D

58. What is the difference between a Disassociation and De-authentication frame?

A. Frame TTL
B. Frame size
C. Reason code
D. Protocol field

Correct Answer – C

59. CSMA/CA is a _____________ process.

A. One-step
B. Two-step
C. Three-step
D. Four-step

Correct Answer – D

60. To perform management functions and allow for time synchronization, a preset interval where nothing communicates is required. What term does this describe?

A. DCF
B. PCF
C. CTS
D. Interframe spacing

Correct Answer – D

61. Which step takes place first: authentication or association?

A. Authentication
B. Association

Correct Answer – A

62. CTS/RTS is part of what?

A. CSMA/CA
B. CSMA/CD
C. WECA
D. IEEE

Correct Answer – A

63. Which layer 2 protocols does Ethernet use?

A. CSMA/CD
B. RTS/CTS
C. DSSS
D. CSMA/CA

Correct Answer – A

64. What is the SSID used for?

A. Security
B. Identification
C. Information exchange
D. Network management

Correct Answer – B

65. The distributed coordination function (DCF) is used to _________.

A. Poll the media for network identification
B. Poll the media for security
C. Poll the media for network availability
D. Poll the network for any changes

Correct Answer – C

66. The 802.11 standard provides what maximum data rate?

A. 11 Mbps
B. 2 Mbps
C. 5.5 Mbps
D. 54 Mbps

Correct Answer – B

67. With Ad Hoc mode, an AP is required.

A. True
B. False

Correct Answer – B

68. Most wireless networks operate in what mode?

A. Ad hoc
B. Infrastructure
C. Repeater
D. D. Bridge

Correct Answer – B

69. The 802.11b standard provides what maximum data rate?

A. 11 Mbps
B. 54 Mbps
C. 2 Mbps
D. 1 Mbps

Correct Answer – A

70. What part listed below radiates a wireless signal?

A. Access point
B. Antenna
C. Network card
D. Wireless laptop

Correct Answer – B

71. Which of the following terms do 802.11/b/g/a have in common?

A. CSMA\CD
B. CSMA\CA
C. DSSS
D. OFDM

Correct Answer – B

72. In the United States, what is the maximum EIRP limit on 802.11a UNII 1 system?

A. 200 mW
B. 100 mW
C. 250 mW
D. 300 mW

Correct Answer – B

73. The 802.11a standard provides what maximum data rate?

A. 11 Mbps
B. 2 Mbps
C. 48 mbps
D. 54 mbps

Correct Answer – D

74. What UNII band is for outdoor use?

A. UNII 1
B. UNII 2
C. UNII 3
D. UNII 4

Correct Answer – C

75. The 802.11g standard provides what maximum data rate?

A. 11 Mbps
B. 48 Mbps
C. 24 Mbps
D. 54 Mbps

Correct Answer – D

76. Which of the following PAN technologies does 802.11 address in its standard documentation?

A. Bluetooth
B. IR
C. Zigbee
D. UWB

Correct Answer – B

77. What happens on an 802.11g network when an 802.11b client is injected?

A. Nothing, the client will not operate.
B. The access point will service both clients without any problems.
C. The access point and all other access points that can hear the client will down-shift to 802.11b.
D. The access point that the client is connected to will downgrade to 802.11b to support that client

Correct Answer – C

78. What standard would one need to install Wi-Fi phones in a network? Select the best answer.

A. Wi-Fi
B. VoIP
C. 802.11e
D. 802.11g

Correct Answer – C

79. What is the newly formed draft standard that will replace 802.11g?

A. 802.11b
B. 802.16
C. 802.11n
D. 802.11z

Correct Answer – C

80. Which one of these terms is not part of the wireless local area network service set?

A. BSS
B. IBSS
C. ESS
D. IESS

Correct Answer – D

81. Roaming is defined in which of the following standards?

A. 802.11
B. 802.11g
C. 802.11b
D. None of the above
E. All of the above

Correct Answer – D

82. What type of cellular communications is considered G1?

A. Digital
B. GSM
C. AMPS
D. CDMA

Correct Answer – C

83. What type of cellular communications is considered a global Standard?

A. TDMA
B. GSM
C. AMPS
D. CDMA

Correct Answer – B

84. What is the data rate of the CDMA2000?

A. 21 Mbps
B. 144 kbps
C. 550 kbps
D. 2 Mbps

Correct Answer – B

85. The 802.16 standard has built-in mobility.

A. True
B. False

Correct Answer – B

86. GPS has how many satellites orbiting the earth?

A. 24
B. 26
C. 28
D. 30

Correct Answer – A

87. What cellular standard was held back for many years as a militaryonly technology?

A. TDMA
B. GSM
C. AMPS
D. CDMA

Correct Answer – D

88. Which of the following terms is the one that finds other cellular users?

A. Gateway mobile switching center (GSMC)
B. Home location registers (HLR)
C. Visitor location registers (VLR)
D. Mobile station roaming number (MSRN)

Correct Answer – A

89. What is the documented as well as the real data rate of GPRS? (Select two)

A. 170 kbps
B. 210 kbps
C. 10 kbps
D. 55 kbps

Correct Answer – A, D

90. What is the data rate of the 1xEV-DO?

A. 21 Mbps
B. 100 kbps
C. 550 kbps
D. 2 Mbps

Correct Answer – D

91. Which cellular standard uses slices of time to allow for multiple connections?

A. TDMA
B. GSM
C. AMPS
D. CDMA

Correct Answer – A

92. The A3, A8, and A5 algorithms are part of what standard?

A. TDMA
B. GSM
C. AMPS
D. CDMA

Correct Answer – B

93. All the research performed on the security of GPS has led the U.S. Government to say that the biggest risk to the GPS system is ________.

A. Security
B. Jamming
C. Spoofing
D. Attacking the satellites

Correct Answer – B

94. The 802.16e standard addresses mobility.

A. True
B. False

Correct Answer – A

95. What body performs interoperability testing for 802.16?

A. WECA
B. Wi-Fi Alliance
C. WiMAX
D. Wi-FiMAX

Correct Answer – C

96. What is the major difference between 802.16 and 802.20?

A. Range
B. Speed
C. Ability to receive a signal at high rates of velocity
D. Ability to securely connect to a wireless network

Correct Answer – C

97. What is the data rate of TDMA?

A. 2 Mbps
B. 100 kbps
C. 64 kbps
D. 500 kbps

Correct Answer – C

98. When radiating an RF signal to create an area of coverage, what part of the WLAN is used?

A. Client card
B. Access point
C. Antenna
D. None of the above

Correct Answer – C

99. What happens to the radiation pattern of an antenna when the gain is increased?

A. The angle of radiation becomes larger.
B. The angle of radiation becomes smaller.
C. Nothing.
D. The coverage decreases.

Correct Answer – A

100. Which antenna allows for coverage in a 180° area?

A. Yagi
B. Patch
C. Omni-directional
D. Directional

Correct Answer – B

101. What happens when a 50-foot antenna cable must be replaced with a 100-foot cable?

A. Nothing.
B. The area of coverage will decrease.
C. The area of coverage will increase.
D. The antenna cable will reduce the access point’s transmission rate.

Correct Answer – B

102. Which antenna allows for coverage in a 360° area?

A. Yagi
B. Patch
C. Omni
D. Directional

Correct Answer – C

103. EIRP is a representation of the power that an entire RF system has. When correctly measuring EIRP, what should be measured?

A. Cabling output
B. Radio output
C. Antenna output
D. Client card antenna input

Correct Answer – C

104. What connector is used on a 2.4-GHz 1200 Series Cisco access point?

A. RP-SMA
B. SMA
C. RP-TNC
D. MC-MMX

Correct Answer – C

105. How does one calculate EIRP?

A. Antenna gain + Antenna loss
B. Antenna gain + Cable loss − Transmitter power
C. Transmitter power + Antenna gain − Cable loss
D. Cable loss − Antenna gain + Transmitter power

Correct Answer – C

106. To help with null areas and multipathing, what antenna architecture would you recommend?

A. Splitters
B. High gain antennas
C. Low loss cables
D. Diversity

Correct Answer – D

107. Some access points have two antennas on them. Why? (Select two)

A. To increase the speed of the wireless
B. To reduce the effects of multipathing
C. To provide a hot standby antenna
D. To provide antenna diversity

Correct Answer – B, D

108. There is a customer who wants to connect one office building to four warehouses in the area. Most of the offices are located less than a block away; the farthest one is half a mile away. Placing what antenna on the roof of the office will provide the best coverage?

A. 13.5-dBi Yagi
B. 6.5-dBi patch
C. 21.5-dBi dish
D. 5.2-dBi Omni

Correct Answer – D

109. What is the designation for dBi? (Select two)

A. Dipole
B. Decibel
C. Baud
D. Isotropic

Correct Answer – B, D

110. The area around or immediately surrounding a wireless signal between two locations is known as the ________________.

A. Free space loss
B. Line of sight
C. Fresnel zone
D. Signal area

Correct Answer – C

111. What is the typical line of sight when using wireless between two buildings?

A. 2 miles
B. 11 miles
C. 15 miles
D. 6 miles

Correct Answer – D

112. You are trying to provide coverage down a long hallway. What is the best antenna solution for this?

A. Yagi
B. Patch
C. Omni
D. Directional

Correct Answer – A

113. Determine the EIRP for the following configuration: a 20-dBm radio using a 13.5 Yagi antenna with a 100-foot cable at a loss of 8 dBi per 50 feet.

A. 17.5
B. 254
C. 33.5
D. 29.5

Correct Answer – D

114. You are connecting two buildings together with a wireless bridge. You are using a Cisco bridge with a Yagi antenna. In between the two buildings are some trees. You are unable to correctly set up a connection. What should you do?

A. Call Cisco TAC.
B. Use a dish antenna.
C. Raise the antenna above the treetops.
D. Use a high power setting.

Correct Answer – C

115. If an antenna has a 6-dBd rating, what is that rating in dBi?

A. 8.12
B. 9.31
C. 4.8
D. 8.14

Correct Answer – D

116. When an antenna gain increases, its beam width _______________.

A. Increases
B. Decreases
C. Stays the same
D. Multiplies

Correct Answer – B

117. Which antenna is the most directional?

A. Yagi
B. Patch
C. Omni
D. Parabolic dish

Correct Answer – D

118. What is the designator for dBd?

A. Dipole
B. Decibel
C. Diversity
D. Bau

Correct Answer – A

119. What is the second step in a wireless deployment process?

A. Business case
B. Design
C. Certification
D. Estimation

Correct Answer – D

120. When performing a survey, what should the surveyor NOT do?

A. Locate any interfering devices
B. Correctly place access points
C. Provide adequate coverage
D. Use local power

Correct Answer – D

121. When performing a survey, what should a survey team always assume?

A. More work than expected will be needed
B. Everything will break
C. Access into a building will be taken care of
D. Access point might fail

Correct Answer – B

122. When creating a business case, what piece of data is most important?

A. Requirements
B. Area of coverage
C. Estimated cost
D. Time frame

Correct Answer – C

123. When creating an RFQ for a site survey, when should the warranty of the site survey end?

A. Business case
B. Design
C. Certification
D. Estimation

Correct Answer – C

124. What is the first step in a wireless deployment process?

A. Business case
B. Design
C. Certification
D. Estimation

Correct Answer – A

125. What is the final step in a wireless deployment process?

A. Business case
B. Design
C. Audit
D. Estimation

Correct Answer – C

126. What item is not normally included in a site survey kit?

A. Access point
B. Telescoping pole
C. Battery to power access point
D. GPS device

Correct Answer – B

127. What is a spectrum analyzer used for?

A. To find correct coverage patterns
B. To locate interference in the 2.4-GHz range
C. To find the correct channel to set the access at
D. To locate the next location to install an access point

Correct Answer – B

128. Which item inside the physical information document is not correct?

A. Location of access point
B. Placement of antenna
C. IP Address of access point
D. Power settings
E. Channel settings

Correct Answer – C

129. What step of the deployment process is used to validate the site survey vendor’s coverage and work?

A. Business case
B. Design
C. Certification
D. Estimation
E. System test

Correct Answer – C

130. What is the correct DC voltage used to power a Cisco 1200 series access point when using POE?

A. −23
B. –34
C. –99
D. −48

Correct Answer – D

131. The cable used to connect to a Cisco 1200 series access point is commonly referred to as a ________________.

A. Patch cable
B. Coaxial
C. Roll down
D. Roll over

Correct Answer – A, B, C, D

132. What administrative methods are supported in a Cisco access point?

A. IPSSU
B. Console
C. Telnet
D. Web based

Correct Answer – B, C, D

133. Which of the following is not a connection on the Cisco 1200 series access point?

A. RJ-45
B. Power
C. Fiber
D. Ethernet

Correct Answer – C

134. Which types of antennas does the Cisco 1100 series access point support?

A. 13.5 dBi Yagi
B. 5.5 dBi patch
C. 2.2 dBi omni
D. 6 dBi patch

Correct Answer – C

135. What administrative methods are supported in a Linksys access point without firmware modifications?

A. IPSU
B. Console
C. Telnet
D. Web based

Correct Answer – D

136. What command should be issued on a Cisco IOS access point after accessing it from a telnet or console to reach the enable mode?

A. Int Dot11radio
B. Config t
C. Enable
D. Configuration mode

Correct Answer – C

137. What types of operating systems do new Cisco access points use?

A. IOS
B. VxWorks
C. Microsoft
D. Linux

Correct Answer – A, B

138. Do Linksys access points support POE?

A. Yes
B. No

Correct Answer – B

139. Does Cisco currently sell 350 series access points?

A. Yes
B. No

Correct Answer – B

140. Cisco 1200 series access points are capable of supporting 802.11b, 802.11g, and 802.11a all at the same time.

A. True
B. False

Correct Answer – A

141. What standard do all Cisco 350 series access points adhere to?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer – B

142. What Cisco access point runs the VxWorks operating system?

A. 1200
B. 1100
C. 350
D. 1400

Correct Answer – C

143. What program is NOT in CE.NET but is in Pocket PC?

A. Active sync
B. Windows Media Player
C. Outlook
D. Internet Explorer

Correct Answer – C

144. What was one of the first PIM devices?

A. PLAM
B. CE.NET
C. Smart phone
D. Zoomer

Correct Answer – D

145. What is one of the biggest risks facing wireless devices?

A. Theft
B. Hacking
C. Information loss
D. Data corruption

Correct Answer – A

146. Healthcare has seen a great increase in productivity due to which wireless end device?

A. Laptop
B. Tablet
C. Smart phone
D. Wi-Fi phone

Correct Answer – B

147. Windows’ first version of CE was based on __________.

A. Windows NT4
B. Windows 2000
C. Windows 95
D. Windows 98

Correct Answer – C

148. What technology do most smart phones have that can be used to track them?

A. CDMA
B. CE.NET
C. GPS
D. PocketPC

Correct Answer – C

149. When was the first computer virus written?

A. 1980
B. 1990
C. 1983
D. 1999

Correct Answer – C

150. What security feature has Microsoft put into its Smartphone OS and PocketPC OS?

A. Security filtering
B. User action required to run an executable file
C. Anti-virus
D. Firewall

Correct Answer – B

151. What makes securing a wireless end device more difficult?

A. The large number of device types
B. Multiple connection options (e.g., WLAN, PAN, cellular)
C. Loose security
D. Extra batteries

Correct Answer – B

152. What does the acronym “LBS” stands for?

A. Lucky basic security
B. Location-based security
C. Location-based services
D. Location basic service

Correct Answer – C

153. Which operating system was created from the ground up as a PDA, phone, and PIM combination?

A. Smart phone
B. RIM
C. Symbian
D. CE.NET

Correct Answer – C

154. What is a major reason why handheld scanners have not gone 802.11g?

A. Security
B. Speed
C. Battery life
D. Chip set availability

Correct Answer – C

155. Which encryption mode was selected for 802.11i?

A. RC4
B. AES
C. AES-CCMP
D. 3DES

Correct Answer – C

156. Which EAP type is part of the EAP RFC?

A. LEAP
B. EAP-MD5
C. EAP-TTLS
D. EAP-TLS

Correct Answer – B

157. What EAP method did Microsoft, Cisco, and RSA create?

A. PEAP
B. LEAP
C. EAP
D. EAP-TLS

Correct Answer – A

158. Does China have its own wireless security standard?

A. Yes
B. No

Correct Answer – A

159. In 802.1x, what is the RADIUS server often called?

A. Supplicant
B. Authenticator
C. Authentication server
D. RADIUS server

Correct Answer – C

160. In 802.11i, what mode is one using if WEP is enabled?

A. RSN
B. TSN
C. TKIP
D. CCMP

Correct Answer – B

161. Which IEEE standards deal with security? (Select two)

A. 802.11
B. 802.11b
C. 802.11i
D. 802.1 xs
E. 802.11g
F. 802.16

Correct Answer – C, D

162. During the time frame when WPA was released and 802.11i was still being finalized, what reservations would an IT manager have about using TKIP?

A. Weak keys
B. Lack of interoperability
C. Possibility of repay attacks
D. Short age
E. PEAP
F. EAP-MD5

Correct Answer – B

163. Which EAP type is used to create a tunnel in which other, older authentication methods can take place?

A. PEAP
B. EAP-MD5
C. EAP-TTLS
D. EAP-TLS

Correct Answer – D

164. Which of the following is not a VPN technology term?

A. IPSec
B. SSL
C. ESP
D. AH

Correct Answer – B

165. Which of the following provides layer 2 security by allowing for unique and changing encryption keys?

A. 802.1x/EAP
B. WEP
C. TKIP
D. AES

Correct Answer – C

166. During an EAP negotiation, what happens after the identity response packet is sent from the client to the access point?

A. The RADIUS server sends out a challenge.
B. The access point sends out a challenge.
C. The access point forwards the message to the RADIUS server.
D. The access point converts the message and sends it to the client.

Correct Answer – A

167. What is a new federal encryption standard that is used in a certain mode on wireless networks?

A. RC4
B. WEP
C. DES
D. AES

Correct Answer – D

168. What is used to ensure the integrity of packets traveling across the airwaves?

A. Authentication server
B. RADIUS
C. MIC
D. IV

Correct Answer – C

169. WEP keys can also be thought of as __________.

A. Tokens
B. Secure IDs
C. Key cards
D. Shared secrets

Correct Answer – D

170. Most wireless equipment is set to which better authentication method?

A. Open key authentication
B. Shared key authentication
C. Dual key authentication
D. WEP key authentication

Correct Answer – A

171. Which of the following can be used with the 802.1x standard for wireless authentication?

A. TACACS
B. RADIUS
C. Kerberos
D. SSL

Correct Answer – B

172. A WEP key is __________.

A. Strong
B. Secure
C. Weak
D. Safe

Correct Answer – C

173. What is EAP-FAST replacing?

A. PEAP
B. LEAP
C. WEP
D. EAP-TLS

Correct Answer – B

174. What IEEE group is responsible for creating WLAN security standards?

A. 802.11a
B. 802.11g
C. 802.11ii
D. 802.11i

Correct Answer – D

175. Which of the following is not a correct EAP type?

A. EAP-MD5
B. PEAP
C. LEAP
D. EAP-TTTLS

Correct Answer – D

176. What security solution provides for unique changing keys that change to prevent an attacker from cracking the key?

A. IPSec
B. 802.1x
C. Dynamic WEP
D. RADIUS

Correct Answer – C

177. What wireless security cipher is approved by the government for standard use?

A. WEP
B. RC4
C. AES
D. TKI

Correct Answer – C

178. What IEEE standard provides the authentication framework for all IEEE 802-based networks?

A. 802.11i
B. 802.1x
C. 802.5
D. 802.11
E. 802.11b

Correct Answer – B

179. What EAP type creates an encrypted tunnel and then performs another EAP exchange inside this tunnel?

A. PEAP
B. EAP-TLS
C. EAP-TTLS
D. EAP-MD5
E. LEAP
F. EAP-FAST

Correct Answer – B

180. What is the process of scanning devices for open ports called?

A. Information gathering
B. Enumeration
C. Compromise
D. Expanding privileges
E. Cleaning logs

Correct Answer – B

181. Using a corrupt EAPOL packet creates what type of attack?

A. Cracking
B. Man-in-the-middle attack
C. Denial-of-service attack
D. Information gathering

Correct Answer – C

182. Why would an attacker use another wireless technology outside what the target is using to place a rogue access point?

A. To get a better connection
B. To provide better bandwidth
C. To conceal the device easier
D. To prevent rogue detection software from finding it

Correct Answer – D

183. What was the most significant attack on 802.1x?

A. Cracking
B. Man-in-the-middle attack
C. Denial-of-service attack
D. Information gathering

Correct Answer – B

184. When an attacker sends a piece of information that is encrypted back into the network in hopes that the access point will decrypt it, what attack is performed?

A. Dictionary attack
B. Plaintext cryptanalysis attack
C. Double encryption attack
D. Shared key authentication attack

Correct Answer – C

185. SNMP can be used to reset passwords.

A. True
B. False

Correct Answer – A

186. When using RADIUS, how many characters should the shared secret be?

A. 32
B. 8
C. 19
D. 24

Correct Answer – D

187. 802.11i with pre-shared keys provided no current security risks.

A. True
B. False

Correct Answer – B

188. What attack on WEP are most WEP cracking tools based on?

A. Dictionary attack
B. Plaintext cryptanalysis attack
C. Double encryption attack
D. Shared key authentication attack
E. Stream cipher attack

Correct Answer – E

189. Telnet provides a secure means of remote authentication.

A. True
B. False

Correct Answer – B

190. When using a wireless gateway, what protocol is most likely to become compromised?

A. IPSec
B. AES
C. SSL
D. EAP-TLS

Correct Answer – C

191. The process of using Google to locate relevant data about a target is performed at what step of the hacking process?

A. Information gathering
B. Enumeration
C. Compromise
D. Expanding privileges
E. Cleaning logs

Correct Answer – A

192. Name two ways an SSID can be captured.

A. Capturing probe frames
B. Capturing beacon frames
C. Capturing authentication frames
D. Capturing association frames

Correct Answer – A, B

193. To compromise a key, which of the following are needed? (Select two)

A. Clear text packet
B. WEP management frame
C. WEP encrypted packet
D. Wireless client

Correct Answer – A, C

194. What would be the most likely place to find out about a company’s IT equipment?

A. Company Web site
B. War driving
C. Checking help forums for a company’s name
D. Using Google

Correct Answer – C

195. What is the first step in developing a wireless security policy?

A. Write the policy
B. Perform a risk assessment
C. Security audit
D. Impact analysis

Correct Answer – B

196. What process results in the identification of flaws in the wireless network?

A. Write the policy
B. Perform a risk assessment
C. Security audit
D. Impact analysis

Correct Answer – C

197. What types of companies should have a wireless security policy?

A. Companies with trade secrets
B. Companies that have wireless networks
C. Companies that do not have wireless networks
D. All companies

Correct Answer – D

198. What is the most important factor in creating a wireless security policy?

A. User buy-in
B. Management buy-in
C. Grammatically correct content
D. Correctly performed audit

Correct Answer – B

199. Which document does not go into detail on how to implement or deploy a solution?

A. Standards
B. Procedure
C. Process
D. Policy

Correct Answer – D

200. Which risk assessment model has a cost involved?

A. Quantitative
B. Qualitative
C. ALE
D. SLE

Correct Answer – A

201. A password alone is considered ___________.

A. Weak
B. Single factor
C. Two factor
D. Smart card

Correct Answer – B

202. What is needed inside a wireless security policy to protect users from the threats of hotspots?

A. Strong ciphers
B. Strong usage policy
C. Public access policy
D. Acceptable use policy

Correct Answer – C

203. Trying all types of password combinations is called a _________________.

A. Dictionary attack
B. Brute force attack
C. Random attack
D. Combo attack

Correct Answer – B

204. Which password has three complexity requirements?

A. hfdj942
B. 23j@w09
C. 1q1q1q1
D. Password

Correct Answer – B

205. Which action will not help the strength of a password?

A. Limit the frequency of reuse
B. Increase the complexity
C. Increase the length
D. Change weekly

Correct Answer – A

206. What document is used to instruct the lowest level of management?

A. Standard
B. Procedure
C. Process
D. Policy

Correct Answer – C

207. What document is used to define how a policy is achieved?

A. Standard
B. Procedure
C. Process
D. Policy

Correct Answer – A

208. What is the most inexpensive architecture to deploy, based solely on hardware?

A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x

Correct Answer – A

209. What architecture is most risky in terms of security?

A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x

Correct Answer – A

210. In a VPN, what protocol creates the keys?

A. IPSec
B. IKE
C. ISAKMP
D. AH
E. ESP

Correct Answer – C

211. When considering a VPN architecture, what two main options do you have to choose from?

A. Locally placing devices
B. Remotely placing devices
C. AH
D. ESP

Correct Answer – A, B

212. When looking at the 802.1x architecture, what RADIUS server has the cost of licensing along with the cost of the server?

A. Cisco
B. Microsoft
C. Funk
D. BlueSocket

Correct Answer – C

213. When looking at a wireless gateway, what vendor would be the best to use if a clientless solution is needed?

A. Air Fortress
B. BlueSocket
C. Vernier
D. Cisco

Correct Answer – B

214. In a VPN, what protocol exchanges the keys?

A. IPSec
B. IKE
C. ISAKMP
D. AH
E. ESP

Correct Answer – B

215. When looking at a wireless gateway, what vendor would be the best to use if a high-security, military-grade solution is needed?

A. Air Fortress
B. BlueSocket
C. Vernier
D. Cisco

Correct Answer – A

216. What cost savings can be seen when using a Microsoft RADIUS solution if the client has an existing MS network in place?

A. Hardware
B. Software
C. Installation
D. Configuration

Correct Answer – A, B, C

217. Name one of the largest hidden costs associated with the VPN architecture.

A. Cost to support the hardware
B. Cost to support the client
C. Cost to keep the wireless in a DMZ
D. Cost to keep the hardware running

Correct Answer – C

218. Which gateway product provides services for worm detection?

A. Air Fortress
B. BlueSocket
C. Vernier
D. Cisco

Correct Answer – C

219. Which IPSec mode is most common for wireless?

A. AH
B. ESP
C. IKE
D. IPSec Mode 2

Correct Answer – B

220. Which two architectures require moving the wireless into a DMZ?

A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x

Correct Answer – C

221. Which architecture is the most difficult to change after a single key is compromised?

A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x

Correct Answer – A

222. What type of tool is Network Stumbler?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – B

223. Wireless scanners all perform sniffing functions in the background.

A. True
B. False

Correct Answer – A

224. What type of tool is AiroPeek?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – A

225. Which of the following tools are not free of charge?

A. Air Snort
B. Network Stumbler
C. AiroPeek
D. Air Magnet

Correct Answer – C, D

226. What type of tool is Air Snort?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – C

227. What type of tool is MiniStumbler?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – B

228. Wireless scanners are used for advanced troubleshooting.

A. True
B. False

Correct Answer – B

229. What type of tool is Kismet?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – E

230. What type of tool is Air Magnet?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – E

231. Which of the following tools are free of charge?

A. Air Snort
B. WEPCrack
C. AiroPeek
D. AirMagnet

Correct Answer – A, B

232. Which of the following tools do not crack WEP keys?

A. AirSnort
B. WEPCrack
C. BSD-Air tools
D. Kismet

Correct Answer – D

233. What type of tool is WLAN-Jack?

A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool

Correct Answer – D

234. What feature does AiroPeek and AirMagnet share?

A. Remote sniffing
B. WEP cracking
C. Rogue access point identification
D. Packet replay

Correct Answer – C

235. Kismet can be used for a WIDS.

A. True
B. False

Correct Answer – A

236. Network Stumbler works on what platforms?

A. Linux
B. UNIX
C. Windows 2000
D. Windows XP

Correct Answer – C, D

Leave a Reply