Wireless networks pose a threat to all who use them. Wireless networks lack the safety associated with having one’s communications securely transmitted inside physical cabling. With wireless communications, the air is the transmission medium and that medium is accessible to anyone who wants to listen. This has led to many tools, which were developed to aid the curious in eavesdropping on other people’s wireless communications.
These tools are most often created for network management or troubleshooting and include some powerful capabilities. Often, these same tools have a very dark side if used for that particular purpose.
Multiple-choice questions are one of the most popular question types that present a question or statement with a list of possible answers. The below listed MCQs covers all important topics of wireless security and networking.
1. What happens to an 802.11b wireless signal when an evergreen tree is located between the transmitter and receiver?
A. Nothing.
B. It is refracted.
C. It is diffracted.
D. It is reflected.
E. It is absorbed.
Correct Answer – E
2. What are the two correct terms used to measure antenna gain?
A. dBi and DBd
B. Watts and mill watt
C. dBd and dBi
D. EIRP
Correct Answer – C
3. The designator dBi is a decibel compared to what?
A. Milliwatt
B. Decibel
C. Isotropic radiator
D. RADIUS
Correct Answer – C
4. Which type of modulation does 802.11b use?
A. QAM
B. FM
C. AM
D. CCK
Correct Answer – D
5. How can one send more data across the air?
A. Increase the transmit power.
B. Use a more complex modulation.
C. Use a bigger antenna.
D. Use a wider frequency band.
Correct Answer – B
6. What was the Wi-Fi Alliance formerly known as?
A. FCC
B. WECA
C. IEEE
D. WIFI
Correct Answer – B
7. What seal certifies interoperability in a manufacturer’s wireless device?
A. WHY
B. Hi-Fi
C. WECA
D. Wi-Fi Certified
E. Wi-Fi
Correct Answer – D
8. Which wave will travel the greatest distance?
A. FM radio
B. X-ray
C. 802.11a
D. Microwave
Correct Answer – A
9. What two items should be maintained near the edges of a wireless cell when performing a site survey?
A. High signal-to-noise ratio
B. Low signal-to-noise ratio
C. High noise level
D. High signal strength
Correct Answer – A, D
10. What would the FCC and ETSI regulate on a wireless network? (Select more than one)
A. Power outputs
B. Total client number
C. Channel number and frequency
D. Who can use the system?
Correct Answer – A, C
11. What bandwidth term is this phrase stating? On any given day, my wireless network has a low bandwidth of ______.
A. 11 Mbps
B. 2.4 GHz
C. 11 MHz
D. 5.4 GHz
Correct Answer – A
12. Which of the following show the correct use of a wireless network?
A. Using wireless to connect two buildings point-to-point
B. Mobile access from laptop or PDA
C. As a way to connect a server
D. To increase bandwidth on a 10/100 wired network
Correct Answer – B
13. When a wireless signal changes or bends around an object, sometimes creating a shadow area, it is known as __________.
A. Refraction
B. Reflection
C. Diffraction
D. Scattering
Correct Answer – C
14. When performing wireless power calculations, what two terms are often converted into each other?
A. dBi to dBi
B. dB to Watts
C. dBm to DBi
D. dBd to dB
Correct Answer – D
15. What standards body creates wireless standards?
A. Wi-Fi Alliance
B. IEEE
C. FCC
D. WECA
Correct Answer – B
16. What key size is required in WEP for the Wi-Fi Alliance to certify a product?
A. 40 bits
B. 120 bits
C. 128 bits
D. 56 bits
Correct Answer – A
17. What does Wi-Fi stand for?
A. Wireless infrastructure fidelity industry
B. Wireless Interoperability Forum Institute
C. Wireless fidelity
D. Wireless networking
Correct Answer – C
18. Which of the following processes will not lower the risk of social engineering at a help desk?
A. Positively identifying the caller
B. Using a callback method
C. Shredding documents
D. Having the caller verify the identity of the help desk operator
Correct Answer – D
19. What would a hacker whose motive was money most prefer to attack?
A. School
B. Bank
C. Doll shop
D. Pizza shop
Correct Answer – B
20. Which of the following terms best describes a Wi-Fi hacker?
A. War dialer
B. Hacker
C. War hacker
D. War driver
Correct Answer – D
21. What type of malicious code infects devices and does not have the ability to replicate or spread outside the infected system on its own?
A. Worm
B. Virus
C. Trojan horse
D. Spam
Correct Answer – B
22. List the three main goals of information security.
A. Integrity
B. Encryption
C. Availability
D. Confidentiality
E. Scalability
F. Protecting
Correct Answer – C, D
23. What two pieces of information are required to hack a cell phone?
A. MNN and ESS
B. MIN and ESN
C. ENS and MSN
D. Phone ID and vendor ID
Correct Answer – B
24. What piece of information is unique on every wireless card in the world?
A. IP address
B. Serial number
C. MAC address
D. SSID
Correct Answer – C
25. Which of the following terms are used to describe the process of discovering wireless networks?
A. War flying
B. War walking
C. War driving
D. All of the above
Correct Answer – D
26. A self-replicating and often self-sending piece of malicious code, which is often e-mailed, is called _____________.
A. A worm
B. A virus
C. A Trojan
D. Spam
Correct Answer – A
27. What technique would an attacker do to force a wireless end device to disconnect from the network?
A. Wireless scan
B. Port scan
C. OS fingerprinting
D. RF jamming
Correct Answer – D
28. What would a wireless hacker in his early teens most likely be doing?
A. War flying
B. War driving
C. War walking
D. War gaming
Correct Answer – C
29. What piece of legislation defines communication as “the transfers of signs, signals, writing, images, sound, data, or intelligence of any nature transmitted in whole or in part by wire, radio, electromagnetic, photo-electronic, or photo-optical systems that affects interstate or foreign commerce”?
A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act
Correct Answer – B
30. What act detailed the use, disclosure, interception, and privacy of electronic commutations?
A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act
Correct Answer – B
31. How much loss must a company have before it can get help from the FBI?
A. $5000
B. $50,000
C. $500,000
D. It is based on location and the average loss for that location.
Correct Answer – D
32. What did the Patriot Act amend relating to computer crime? Choose the best answer.
A. Nothing; it was its own act.
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act
Correct Answer – B
33. When was the Electronic Communications Privacy Act created?
A. 1999
B. 1988
C. 1985
D. 1986
Correct Answer – D
34. When was the Computer Fraud and Abuse Act created?
A. 1999
B. 2001
C. 1989
D. 1996
Correct Answer – D
35. What act was created to help protect U.S. Government computers?
A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act
Correct Answer – C
36. What act was created to protect U.S. networks?
A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act
Correct Answer – C
37. Under the Patriot Act, who is required to log and track hacking attempts?
A. The Department of Homeland Security
B. The FBI
C. The NSA
D. The ISP
Correct Answer – C
38. What regulation, act, or law was put into place due to the lack of clear terms regarding what constitutes a computer crime?
A. Patriot Act
B. Electronic Communications Privacy Act
C. Computer Fraud and Abuse Act
D. Computer Crime and Abuse Act
Correct Answer – C
39. The FCC has a law that makes running a sniffer and receiving other people’s network traffic a crime.
A. True
B. False
Correct Answer – A
40. An 802.11a radio uses what technique to transmit its signal?
A. FHSS
B. DSSS
C. OFDM
D. OFSS
Correct Answer – C
41. The 802.11b standard does not use DSSS.
A. True
B. False
Correct Answer – B
42. Which standard listed below supports Frequency Hopping Spread Spectrum?
A. 802.11b
B. 802.11g
C. 802.11a
D. 802.11
Correct Answer – D
43. Within North America, what numbers of channels are considered no overlapping?
A. 1
B. 3
C. 14
D. 11
Correct Answer – B
44. The 802.11g standard supports the use of orthogonal frequency division multiplexing (OFDM) in which radio frequency band?
A. 2.4 MHz
B. 5.4 MHz
C. 5.8 MHz
D. 5.0 MHz
Correct Answer – A
45. Dwell time is a function of which of the following physical layer techniques?
A. DSSS
B. FHSS
C. OFDM
D. PHY
Correct Answer – B
46. DSSS is a type of what?
A. Spread surface
B. Spread spectrum
C. Modulation type
D. Network identifier
Correct Answer – B
47. How many channels of DSSS are in use in the United States?
A. 1
B. 14
C. 12
D. 11
Correct Answer – D
48. How many channels are used in an ESTI-governed location?
A. 1
B. 13
C. 11
D. 14
Correct Answer – B
49. The 2.4 frequency that 802.11b operates in is called __________.
A. DSSS
B. OFMD
C. UNII
D. ISM
Correct Answer – D
50. The 802.11a standard is associated with which two terms?
A. ISM
B. UNII
C. 2.4 GHz
D. 5.15–5.30 GHz
Correct Answer – D
51. How much of the 2.4-GHz ISM band is used when a single access point 802.11b wireless network is enabled?
A. 11 MHz
B. 22 MHz
C. 1 MHz
D. 20 MHz
Correct Answer – D
52. What is the total amount of wireless bandwidth inside the 2.4-GHz ISM band?
A. 70 MHz
B. 11 Mbps
C. 54 Meg
D. 83.5 MHz
Correct Answer – D
53. What is the amount of time a channel takes to switch from one channel to another channel on an FH system called?
A. Hop time
B. Dwell sequence
C. Hopping time
D. Dwell time
Correct Answer – A
54. You are designing an RF network and have channel 6 used. What other channel would you select to use next to channel 6?
A. 4
B. 3
C. 1
D. 9
Correct Answer – C
55. What are the three main wireless frame types?
A. Control frames
B. Management frames
C. Data frames
D. Session frames
Correct Answer – A, B, C
56. When a wireless network is using an access point, which device sends the beacons?
A. Access point
B. Wireless laptop
C. Authentication server
D. User
Correct Answer – A
57. Which layer 2 protocols does 802.11b use?
A. CSMA/CD
B. RTS/CTS
C. DSSS
D. CSMA/CA
Correct Answer – D
58. What is the difference between a Disassociation and De-authentication frame?
A. Frame TTL
B. Frame size
C. Reason code
D. Protocol field
Correct Answer – C
59. CSMA/CA is a _____________ process.
A. One-step
B. Two-step
C. Three-step
D. Four-step
Correct Answer – D
60. To perform management functions and allow for time synchronization, a preset interval where nothing communicates is required. What term does this describe?
A. DCF
B. PCF
C. CTS
D. Interframe spacing
Correct Answer – D
61. Which step takes place first: authentication or association?
A. Authentication
B. Association
Correct Answer – A
62. CTS/RTS is part of what?
A. CSMA/CA
B. CSMA/CD
C. WECA
D. IEEE
Correct Answer – A
63. Which layer 2 protocols does Ethernet use?
A. CSMA/CD
B. RTS/CTS
C. DSSS
D. CSMA/CA
Correct Answer – A
64. What is the SSID used for?
A. Security
B. Identification
C. Information exchange
D. Network management
Correct Answer – B
65. The distributed coordination function (DCF) is used to _________.
A. Poll the media for network identification
B. Poll the media for security
C. Poll the media for network availability
D. Poll the network for any changes
Correct Answer – C
66. The 802.11 standard provides what maximum data rate?
A. 11 Mbps
B. 2 Mbps
C. 5.5 Mbps
D. 54 Mbps
Correct Answer – B
67. With Ad Hoc mode, an AP is required.
A. True
B. False
Correct Answer – B
68. Most wireless networks operate in what mode?
A. Ad hoc
B. Infrastructure
C. Repeater
D. D. Bridge
Correct Answer – B
69. The 802.11b standard provides what maximum data rate?
A. 11 Mbps
B. 54 Mbps
C. 2 Mbps
D. 1 Mbps
Correct Answer – A
70. What part listed below radiates a wireless signal?
A. Access point
B. Antenna
C. Network card
D. Wireless laptop
Correct Answer – B
71. Which of the following terms do 802.11/b/g/a have in common?
A. CSMA\CD
B. CSMA\CA
C. DSSS
D. OFDM
Correct Answer – B
72. In the United States, what is the maximum EIRP limit on 802.11a UNII 1 system?
A. 200 mW
B. 100 mW
C. 250 mW
D. 300 mW
Correct Answer – B
73. The 802.11a standard provides what maximum data rate?
A. 11 Mbps
B. 2 Mbps
C. 48 mbps
D. 54 mbps
Correct Answer – D
74. What UNII band is for outdoor use?
A. UNII 1
B. UNII 2
C. UNII 3
D. UNII 4
Correct Answer – C
75. The 802.11g standard provides what maximum data rate?
A. 11 Mbps
B. 48 Mbps
C. 24 Mbps
D. 54 Mbps
Correct Answer – D
76. Which of the following PAN technologies does 802.11 address in its standard documentation?
A. Bluetooth
B. IR
C. Zigbee
D. UWB
Correct Answer – B
77. What happens on an 802.11g network when an 802.11b client is injected?
A. Nothing, the client will not operate.
B. The access point will service both clients without any problems.
C. The access point and all other access points that can hear the client will down-shift to 802.11b.
D. The access point that the client is connected to will downgrade to 802.11b to support that client
Correct Answer – C
78. What standard would one need to install Wi-Fi phones in a network? Select the best answer.
A. Wi-Fi
B. VoIP
C. 802.11e
D. 802.11g
Correct Answer – C
79. What is the newly formed draft standard that will replace 802.11g?
A. 802.11b
B. 802.16
C. 802.11n
D. 802.11z
Correct Answer – C
80. Which one of these terms is not part of the wireless local area network service set?
A. BSS
B. IBSS
C. ESS
D. IESS
Correct Answer – D
81. Roaming is defined in which of the following standards?
A. 802.11
B. 802.11g
C. 802.11b
D. None of the above
E. All of the above
Correct Answer – D
82. What type of cellular communications is considered G1?
A. Digital
B. GSM
C. AMPS
D. CDMA
Correct Answer – C
83. What type of cellular communications is considered a global Standard?
A. TDMA
B. GSM
C. AMPS
D. CDMA
Correct Answer – B
84. What is the data rate of the CDMA2000?
A. 21 Mbps
B. 144 kbps
C. 550 kbps
D. 2 Mbps
Correct Answer – B
85. The 802.16 standard has built-in mobility.
A. True
B. False
Correct Answer – B
86. GPS has how many satellites orbiting the earth?
A. 24
B. 26
C. 28
D. 30
Correct Answer – A
87. What cellular standard was held back for many years as a militaryonly technology?
A. TDMA
B. GSM
C. AMPS
D. CDMA
Correct Answer – D
88. Which of the following terms is the one that finds other cellular users?
A. Gateway mobile switching center (GSMC)
B. Home location registers (HLR)
C. Visitor location registers (VLR)
D. Mobile station roaming number (MSRN)
Correct Answer – A
89. What is the documented as well as the real data rate of GPRS? (Select two)
A. 170 kbps
B. 210 kbps
C. 10 kbps
D. 55 kbps
Correct Answer – A, D
90. What is the data rate of the 1xEV-DO?
A. 21 Mbps
B. 100 kbps
C. 550 kbps
D. 2 Mbps
Correct Answer – D
91. Which cellular standard uses slices of time to allow for multiple connections?
A. TDMA
B. GSM
C. AMPS
D. CDMA
Correct Answer – A
92. The A3, A8, and A5 algorithms are part of what standard?
A. TDMA
B. GSM
C. AMPS
D. CDMA
Correct Answer – B
93. All the research performed on the security of GPS has led the U.S. Government to say that the biggest risk to the GPS system is ________.
A. Security
B. Jamming
C. Spoofing
D. Attacking the satellites
Correct Answer – B
94. The 802.16e standard addresses mobility.
A. True
B. False
Correct Answer – A
95. What body performs interoperability testing for 802.16?
A. WECA
B. Wi-Fi Alliance
C. WiMAX
D. Wi-FiMAX
Correct Answer – C
96. What is the major difference between 802.16 and 802.20?
A. Range
B. Speed
C. Ability to receive a signal at high rates of velocity
D. Ability to securely connect to a wireless network
Correct Answer – C
97. What is the data rate of TDMA?
A. 2 Mbps
B. 100 kbps
C. 64 kbps
D. 500 kbps
Correct Answer – C
98. When radiating an RF signal to create an area of coverage, what part of the WLAN is used?
A. Client card
B. Access point
C. Antenna
D. None of the above
Correct Answer – C
99. What happens to the radiation pattern of an antenna when the gain is increased?
A. The angle of radiation becomes larger.
B. The angle of radiation becomes smaller.
C. Nothing.
D. The coverage decreases.
Correct Answer – A
100. Which antenna allows for coverage in a 180° area?
A. Yagi
B. Patch
C. Omni-directional
D. Directional
Correct Answer – B
101. What happens when a 50-foot antenna cable must be replaced with a 100-foot cable?
A. Nothing.
B. The area of coverage will decrease.
C. The area of coverage will increase.
D. The antenna cable will reduce the access point’s transmission rate.
Correct Answer – B
102. Which antenna allows for coverage in a 360° area?
A. Yagi
B. Patch
C. Omni
D. Directional
Correct Answer – C
103. EIRP is a representation of the power that an entire RF system has. When correctly measuring EIRP, what should be measured?
A. Cabling output
B. Radio output
C. Antenna output
D. Client card antenna input
Correct Answer – C
104. What connector is used on a 2.4-GHz 1200 Series Cisco access point?
A. RP-SMA
B. SMA
C. RP-TNC
D. MC-MMX
Correct Answer – C
105. How does one calculate EIRP?
A. Antenna gain + Antenna loss
B. Antenna gain + Cable loss − Transmitter power
C. Transmitter power + Antenna gain − Cable loss
D. Cable loss − Antenna gain + Transmitter power
Correct Answer – C
106. To help with null areas and multipathing, what antenna architecture would you recommend?
A. Splitters
B. High gain antennas
C. Low loss cables
D. Diversity
Correct Answer – D
107. Some access points have two antennas on them. Why? (Select two)
A. To increase the speed of the wireless
B. To reduce the effects of multipathing
C. To provide a hot standby antenna
D. To provide antenna diversity
Correct Answer – B, D
108. There is a customer who wants to connect one office building to four warehouses in the area. Most of the offices are located less than a block away; the farthest one is half a mile away. Placing what antenna on the roof of the office will provide the best coverage?
A. 13.5-dBi Yagi
B. 6.5-dBi patch
C. 21.5-dBi dish
D. 5.2-dBi Omni
Correct Answer – D
109. What is the designation for dBi? (Select two)
A. Dipole
B. Decibel
C. Baud
D. Isotropic
Correct Answer – B, D
110. The area around or immediately surrounding a wireless signal between two locations is known as the ________________.
A. Free space loss
B. Line of sight
C. Fresnel zone
D. Signal area
Correct Answer – C
111. What is the typical line of sight when using wireless between two buildings?
A. 2 miles
B. 11 miles
C. 15 miles
D. 6 miles
Correct Answer – D
112. You are trying to provide coverage down a long hallway. What is the best antenna solution for this?
A. Yagi
B. Patch
C. Omni
D. Directional
Correct Answer – A
113. Determine the EIRP for the following configuration: a 20-dBm radio using a 13.5 Yagi antenna with a 100-foot cable at a loss of 8 dBi per 50 feet.
A. 17.5
B. 254
C. 33.5
D. 29.5
Correct Answer – D
114. You are connecting two buildings together with a wireless bridge. You are using a Cisco bridge with a Yagi antenna. In between the two buildings are some trees. You are unable to correctly set up a connection. What should you do?
A. Call Cisco TAC.
B. Use a dish antenna.
C. Raise the antenna above the treetops.
D. Use a high power setting.
Correct Answer – C
115. If an antenna has a 6-dBd rating, what is that rating in dBi?
A. 8.12
B. 9.31
C. 4.8
D. 8.14
Correct Answer – D
116. When an antenna gain increases, its beam width _______________.
A. Increases
B. Decreases
C. Stays the same
D. Multiplies
Correct Answer – B
117. Which antenna is the most directional?
A. Yagi
B. Patch
C. Omni
D. Parabolic dish
Correct Answer – D
118. What is the designator for dBd?
A. Dipole
B. Decibel
C. Diversity
D. Bau
Correct Answer – A
119. What is the second step in a wireless deployment process?
A. Business case
B. Design
C. Certification
D. Estimation
Correct Answer – D
120. When performing a survey, what should the surveyor NOT do?
A. Locate any interfering devices
B. Correctly place access points
C. Provide adequate coverage
D. Use local power
Correct Answer – D
121. When performing a survey, what should a survey team always assume?
A. More work than expected will be needed
B. Everything will break
C. Access into a building will be taken care of
D. Access point might fail
Correct Answer – B
122. When creating a business case, what piece of data is most important?
A. Requirements
B. Area of coverage
C. Estimated cost
D. Time frame
Correct Answer – C
123. When creating an RFQ for a site survey, when should the warranty of the site survey end?
A. Business case
B. Design
C. Certification
D. Estimation
Correct Answer – C
124. What is the first step in a wireless deployment process?
A. Business case
B. Design
C. Certification
D. Estimation
Correct Answer – A
125. What is the final step in a wireless deployment process?
A. Business case
B. Design
C. Audit
D. Estimation
Correct Answer – C
126. What item is not normally included in a site survey kit?
A. Access point
B. Telescoping pole
C. Battery to power access point
D. GPS device
Correct Answer – B
127. What is a spectrum analyzer used for?
A. To find correct coverage patterns
B. To locate interference in the 2.4-GHz range
C. To find the correct channel to set the access at
D. To locate the next location to install an access point
Correct Answer – B
128. Which item inside the physical information document is not correct?
A. Location of access point
B. Placement of antenna
C. IP Address of access point
D. Power settings
E. Channel settings
Correct Answer – C
129. What step of the deployment process is used to validate the site survey vendor’s coverage and work?
A. Business case
B. Design
C. Certification
D. Estimation
E. System test
Correct Answer – C
130. What is the correct DC voltage used to power a Cisco 1200 series access point when using POE?
A. −23
B. –34
C. –99
D. −48
Correct Answer – D
131. The cable used to connect to a Cisco 1200 series access point is commonly referred to as a ________________.
A. Patch cable
B. Coaxial
C. Roll down
D. Roll over
Correct Answer – A, B, C, D
132. What administrative methods are supported in a Cisco access point?
A. IPSSU
B. Console
C. Telnet
D. Web based
Correct Answer – B, C, D
133. Which of the following is not a connection on the Cisco 1200 series access point?
A. RJ-45
B. Power
C. Fiber
D. Ethernet
Correct Answer – C
134. Which types of antennas does the Cisco 1100 series access point support?
A. 13.5 dBi Yagi
B. 5.5 dBi patch
C. 2.2 dBi omni
D. 6 dBi patch
Correct Answer – C
135. What administrative methods are supported in a Linksys access point without firmware modifications?
A. IPSU
B. Console
C. Telnet
D. Web based
Correct Answer – D
136. What command should be issued on a Cisco IOS access point after accessing it from a telnet or console to reach the enable mode?
A. Int Dot11radio
B. Config t
C. Enable
D. Configuration mode
Correct Answer – C
137. What types of operating systems do new Cisco access points use?
A. IOS
B. VxWorks
C. Microsoft
D. Linux
Correct Answer – A, B
138. Do Linksys access points support POE?
A. Yes
B. No
Correct Answer – B
139. Does Cisco currently sell 350 series access points?
A. Yes
B. No
Correct Answer – B
140. Cisco 1200 series access points are capable of supporting 802.11b, 802.11g, and 802.11a all at the same time.
A. True
B. False
Correct Answer – A
141. What standard do all Cisco 350 series access points adhere to?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Correct Answer – B
142. What Cisco access point runs the VxWorks operating system?
A. 1200
B. 1100
C. 350
D. 1400
Correct Answer – C
143. What program is NOT in CE.NET but is in Pocket PC?
A. Active sync
B. Windows Media Player
C. Outlook
D. Internet Explorer
Correct Answer – C
144. What was one of the first PIM devices?
A. PLAM
B. CE.NET
C. Smart phone
D. Zoomer
Correct Answer – D
145. What is one of the biggest risks facing wireless devices?
A. Theft
B. Hacking
C. Information loss
D. Data corruption
Correct Answer – A
146. Healthcare has seen a great increase in productivity due to which wireless end device?
A. Laptop
B. Tablet
C. Smart phone
D. Wi-Fi phone
Correct Answer – B
147. Windows’ first version of CE was based on __________.
A. Windows NT4
B. Windows 2000
C. Windows 95
D. Windows 98
Correct Answer – C
148. What technology do most smart phones have that can be used to track them?
A. CDMA
B. CE.NET
C. GPS
D. PocketPC
Correct Answer – C
149. When was the first computer virus written?
A. 1980
B. 1990
C. 1983
D. 1999
Correct Answer – C
150. What security feature has Microsoft put into its Smartphone OS and PocketPC OS?
A. Security filtering
B. User action required to run an executable file
C. Anti-virus
D. Firewall
Correct Answer – B
151. What makes securing a wireless end device more difficult?
A. The large number of device types
B. Multiple connection options (e.g., WLAN, PAN, cellular)
C. Loose security
D. Extra batteries
Correct Answer – B
152. What does the acronym “LBS” stands for?
A. Lucky basic security
B. Location-based security
C. Location-based services
D. Location basic service
Correct Answer – C
153. Which operating system was created from the ground up as a PDA, phone, and PIM combination?
A. Smart phone
B. RIM
C. Symbian
D. CE.NET
Correct Answer – C
154. What is a major reason why handheld scanners have not gone 802.11g?
A. Security
B. Speed
C. Battery life
D. Chip set availability
Correct Answer – C
155. Which encryption mode was selected for 802.11i?
A. RC4
B. AES
C. AES-CCMP
D. 3DES
Correct Answer – C
156. Which EAP type is part of the EAP RFC?
A. LEAP
B. EAP-MD5
C. EAP-TTLS
D. EAP-TLS
Correct Answer – B
157. What EAP method did Microsoft, Cisco, and RSA create?
A. PEAP
B. LEAP
C. EAP
D. EAP-TLS
Correct Answer – A
158. Does China have its own wireless security standard?
A. Yes
B. No
Correct Answer – A
159. In 802.1x, what is the RADIUS server often called?
A. Supplicant
B. Authenticator
C. Authentication server
D. RADIUS server
Correct Answer – C
160. In 802.11i, what mode is one using if WEP is enabled?
A. RSN
B. TSN
C. TKIP
D. CCMP
Correct Answer – B
161. Which IEEE standards deal with security? (Select two)
A. 802.11
B. 802.11b
C. 802.11i
D. 802.1 xs
E. 802.11g
F. 802.16
Correct Answer – C, D
162. During the time frame when WPA was released and 802.11i was still being finalized, what reservations would an IT manager have about using TKIP?
A. Weak keys
B. Lack of interoperability
C. Possibility of repay attacks
D. Short age
E. PEAP
F. EAP-MD5
Correct Answer – B
163. Which EAP type is used to create a tunnel in which other, older authentication methods can take place?
A. PEAP
B. EAP-MD5
C. EAP-TTLS
D. EAP-TLS
Correct Answer – D
164. Which of the following is not a VPN technology term?
A. IPSec
B. SSL
C. ESP
D. AH
Correct Answer – B
165. Which of the following provides layer 2 security by allowing for unique and changing encryption keys?
A. 802.1x/EAP
B. WEP
C. TKIP
D. AES
Correct Answer – C
166. During an EAP negotiation, what happens after the identity response packet is sent from the client to the access point?
A. The RADIUS server sends out a challenge.
B. The access point sends out a challenge.
C. The access point forwards the message to the RADIUS server.
D. The access point converts the message and sends it to the client.
Correct Answer – A
167. What is a new federal encryption standard that is used in a certain mode on wireless networks?
A. RC4
B. WEP
C. DES
D. AES
Correct Answer – D
168. What is used to ensure the integrity of packets traveling across the airwaves?
A. Authentication server
B. RADIUS
C. MIC
D. IV
Correct Answer – C
169. WEP keys can also be thought of as __________.
A. Tokens
B. Secure IDs
C. Key cards
D. Shared secrets
Correct Answer – D
170. Most wireless equipment is set to which better authentication method?
A. Open key authentication
B. Shared key authentication
C. Dual key authentication
D. WEP key authentication
Correct Answer – A
171. Which of the following can be used with the 802.1x standard for wireless authentication?
A. TACACS
B. RADIUS
C. Kerberos
D. SSL
Correct Answer – B
172. A WEP key is __________.
A. Strong
B. Secure
C. Weak
D. Safe
Correct Answer – C
173. What is EAP-FAST replacing?
A. PEAP
B. LEAP
C. WEP
D. EAP-TLS
Correct Answer – B
174. What IEEE group is responsible for creating WLAN security standards?
A. 802.11a
B. 802.11g
C. 802.11ii
D. 802.11i
Correct Answer – D
175. Which of the following is not a correct EAP type?
A. EAP-MD5
B. PEAP
C. LEAP
D. EAP-TTTLS
Correct Answer – D
176. What security solution provides for unique changing keys that change to prevent an attacker from cracking the key?
A. IPSec
B. 802.1x
C. Dynamic WEP
D. RADIUS
Correct Answer – C
177. What wireless security cipher is approved by the government for standard use?
A. WEP
B. RC4
C. AES
D. TKI
Correct Answer – C
178. What IEEE standard provides the authentication framework for all IEEE 802-based networks?
A. 802.11i
B. 802.1x
C. 802.5
D. 802.11
E. 802.11b
Correct Answer – B
179. What EAP type creates an encrypted tunnel and then performs another EAP exchange inside this tunnel?
A. PEAP
B. EAP-TLS
C. EAP-TTLS
D. EAP-MD5
E. LEAP
F. EAP-FAST
Correct Answer – B
180. What is the process of scanning devices for open ports called?
A. Information gathering
B. Enumeration
C. Compromise
D. Expanding privileges
E. Cleaning logs
Correct Answer – B
181. Using a corrupt EAPOL packet creates what type of attack?
A. Cracking
B. Man-in-the-middle attack
C. Denial-of-service attack
D. Information gathering
Correct Answer – C
182. Why would an attacker use another wireless technology outside what the target is using to place a rogue access point?
A. To get a better connection
B. To provide better bandwidth
C. To conceal the device easier
D. To prevent rogue detection software from finding it
Correct Answer – D
183. What was the most significant attack on 802.1x?
A. Cracking
B. Man-in-the-middle attack
C. Denial-of-service attack
D. Information gathering
Correct Answer – B
184. When an attacker sends a piece of information that is encrypted back into the network in hopes that the access point will decrypt it, what attack is performed?
A. Dictionary attack
B. Plaintext cryptanalysis attack
C. Double encryption attack
D. Shared key authentication attack
Correct Answer – C
185. SNMP can be used to reset passwords.
A. True
B. False
Correct Answer – A
186. When using RADIUS, how many characters should the shared secret be?
A. 32
B. 8
C. 19
D. 24
Correct Answer – D
187. 802.11i with pre-shared keys provided no current security risks.
A. True
B. False
Correct Answer – B
188. What attack on WEP are most WEP cracking tools based on?
A. Dictionary attack
B. Plaintext cryptanalysis attack
C. Double encryption attack
D. Shared key authentication attack
E. Stream cipher attack
Correct Answer – E
189. Telnet provides a secure means of remote authentication.
A. True
B. False
Correct Answer – B
190. When using a wireless gateway, what protocol is most likely to become compromised?
A. IPSec
B. AES
C. SSL
D. EAP-TLS
Correct Answer – C
191. The process of using Google to locate relevant data about a target is performed at what step of the hacking process?
A. Information gathering
B. Enumeration
C. Compromise
D. Expanding privileges
E. Cleaning logs
Correct Answer – A
192. Name two ways an SSID can be captured.
A. Capturing probe frames
B. Capturing beacon frames
C. Capturing authentication frames
D. Capturing association frames
Correct Answer – A, B
193. To compromise a key, which of the following are needed? (Select two)
A. Clear text packet
B. WEP management frame
C. WEP encrypted packet
D. Wireless client
Correct Answer – A, C
194. What would be the most likely place to find out about a company’s IT equipment?
A. Company Web site
B. War driving
C. Checking help forums for a company’s name
D. Using Google
Correct Answer – C
195. What is the first step in developing a wireless security policy?
A. Write the policy
B. Perform a risk assessment
C. Security audit
D. Impact analysis
Correct Answer – B
196. What process results in the identification of flaws in the wireless network?
A. Write the policy
B. Perform a risk assessment
C. Security audit
D. Impact analysis
Correct Answer – C
197. What types of companies should have a wireless security policy?
A. Companies with trade secrets
B. Companies that have wireless networks
C. Companies that do not have wireless networks
D. All companies
Correct Answer – D
198. What is the most important factor in creating a wireless security policy?
A. User buy-in
B. Management buy-in
C. Grammatically correct content
D. Correctly performed audit
Correct Answer – B
199. Which document does not go into detail on how to implement or deploy a solution?
A. Standards
B. Procedure
C. Process
D. Policy
Correct Answer – D
200. Which risk assessment model has a cost involved?
A. Quantitative
B. Qualitative
C. ALE
D. SLE
Correct Answer – A
201. A password alone is considered ___________.
A. Weak
B. Single factor
C. Two factor
D. Smart card
Correct Answer – B
202. What is needed inside a wireless security policy to protect users from the threats of hotspots?
A. Strong ciphers
B. Strong usage policy
C. Public access policy
D. Acceptable use policy
Correct Answer – C
203. Trying all types of password combinations is called a _________________.
A. Dictionary attack
B. Brute force attack
C. Random attack
D. Combo attack
Correct Answer – B
204. Which password has three complexity requirements?
A. hfdj942
B. 23j@w09
C. 1q1q1q1
D. Password
Correct Answer – B
205. Which action will not help the strength of a password?
A. Limit the frequency of reuse
B. Increase the complexity
C. Increase the length
D. Change weekly
Correct Answer – A
206. What document is used to instruct the lowest level of management?
A. Standard
B. Procedure
C. Process
D. Policy
Correct Answer – C
207. What document is used to define how a policy is achieved?
A. Standard
B. Procedure
C. Process
D. Policy
Correct Answer – A
208. What is the most inexpensive architecture to deploy, based solely on hardware?
A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x
Correct Answer – A
209. What architecture is most risky in terms of security?
A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x
Correct Answer – A
210. In a VPN, what protocol creates the keys?
A. IPSec
B. IKE
C. ISAKMP
D. AH
E. ESP
Correct Answer – C
211. When considering a VPN architecture, what two main options do you have to choose from?
A. Locally placing devices
B. Remotely placing devices
C. AH
D. ESP
Correct Answer – A, B
212. When looking at the 802.1x architecture, what RADIUS server has the cost of licensing along with the cost of the server?
A. Cisco
B. Microsoft
C. Funk
D. BlueSocket
Correct Answer – C
213. When looking at a wireless gateway, what vendor would be the best to use if a clientless solution is needed?
A. Air Fortress
B. BlueSocket
C. Vernier
D. Cisco
Correct Answer – B
214. In a VPN, what protocol exchanges the keys?
A. IPSec
B. IKE
C. ISAKMP
D. AH
E. ESP
Correct Answer – B
215. When looking at a wireless gateway, what vendor would be the best to use if a high-security, military-grade solution is needed?
A. Air Fortress
B. BlueSocket
C. Vernier
D. Cisco
Correct Answer – A
216. What cost savings can be seen when using a Microsoft RADIUS solution if the client has an existing MS network in place?
A. Hardware
B. Software
C. Installation
D. Configuration
Correct Answer – A, B, C
217. Name one of the largest hidden costs associated with the VPN architecture.
A. Cost to support the hardware
B. Cost to support the client
C. Cost to keep the wireless in a DMZ
D. Cost to keep the hardware running
Correct Answer – C
218. Which gateway product provides services for worm detection?
A. Air Fortress
B. BlueSocket
C. Vernier
D. Cisco
Correct Answer – C
219. Which IPSec mode is most common for wireless?
A. AH
B. ESP
C. IKE
D. IPSec Mode 2
Correct Answer – B
220. Which two architectures require moving the wireless into a DMZ?
A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x
Correct Answer – C
221. Which architecture is the most difficult to change after a single key is compromised?
A. WEP
B. VPN
C. Wireless firewall or gateway
D. 802.1x
Correct Answer – A
222. What type of tool is Network Stumbler?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – B
223. Wireless scanners all perform sniffing functions in the background.
A. True
B. False
Correct Answer – A
224. What type of tool is AiroPeek?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – A
225. Which of the following tools are not free of charge?
A. Air Snort
B. Network Stumbler
C. AiroPeek
D. Air Magnet
Correct Answer – C, D
226. What type of tool is Air Snort?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – C
227. What type of tool is MiniStumbler?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – B
228. Wireless scanners are used for advanced troubleshooting.
A. True
B. False
Correct Answer – B
229. What type of tool is Kismet?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – E
230. What type of tool is Air Magnet?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – E
231. Which of the following tools are free of charge?
A. Air Snort
B. WEPCrack
C. AiroPeek
D. AirMagnet
Correct Answer – A, B
232. Which of the following tools do not crack WEP keys?
A. AirSnort
B. WEPCrack
C. BSD-Air tools
D. Kismet
Correct Answer – D
233. What type of tool is WLAN-Jack?
A. Wireless sniffer tool
B. Wireless scanner tool
C. Wireless cracker tool
D. Wireless DoS tool
E. Wireless hybrid tool
Correct Answer – D
234. What feature does AiroPeek and AirMagnet share?
A. Remote sniffing
B. WEP cracking
C. Rogue access point identification
D. Packet replay
Correct Answer – C
235. Kismet can be used for a WIDS.
A. True
B. False
Correct Answer – A
236. Network Stumbler works on what platforms?
A. Linux
B. UNIX
C. Windows 2000
D. Windows XP
Correct Answer – C, D
You may also like:- 80 Most Important Network Fundamentals Questions With Answers
- 100 Most Important SOC Analyst Interview Questions
- Top 40 Cyber Security Questions and Answers
- Top 10 React JS Interview Theory Questions and Answers
- CISSP – Practice Test Questions – 2024 – Set 20 (53 Questions)
- Part 2: Exploring Deeper into CCNA – Wireless (145 Practice Test Questions)
- Part 1: Mastering CCNA – Wireless (145 Practice Test Questions)
- [1z0-1085-20] Oracle Cloud Infrastructure Foundations 2020 Associate MCQ Questions – Part 3
- [1z0-1085-20] Oracle Cloud Infrastructure Foundations 2020 Associate MCQ Questions – Part 2
- [1z0-1085-20] Oracle Cloud Infrastructure Foundations 2020 Associate MCQ Questions – Part 1