by 0x4b4d


keywords:
Bookmark and Share



Front Back
1. Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA?
WEP
WTLS
WAP
WOP
1. C. Wireless Application Protocol (WAP) is an open international standard for applications that use wireless communication.
2. Which protocol operates on 2.4GHz and has a bandwidth of 1 Mbps or 2 Mbps?
802.11
802.11a
802.11b
802.11g
2. A. 802.11 operates on 2.4GHZ. This standard allows for bandwidths of 1 Mbps or 2 Mbps.
3. You're outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network?
WAP
WTLS
WPA2
IR
3. C. Wi-Fi Protected Access 2 (WPA2) was intended to provide security that's equivalent to the security on a wired network and implements elements of the 802.11i standard.
4. Which of the following is a primary vulnerability of a wireless environment?
Decryption software
IP spoofing
A gap in the WAP
Site survey
4. D. A site survey is the process of monitoring a wireless network using a computer, wireless controller, and analysis software. Site surveys are easily accomplished and hard to detect.
5. Which of the following is synonymous with MAC filtering?
TKIP
Network lock
EAP-TTLS
MAC secure
5. B. The term network lock is synonymous with MAC filtering.
6. Which of the following 802.11 standards is often referenced as WPA2?
802.11a
802.11b
802.11i
802.11n
6. C. The WPA2 standard is also known as 802.11i.
7. Which of the following 802.11 standards provides for bandwidths of up to 300 Mbps?
802.11n
802.11i
802.11g
802.11b
7. A. The 802.11n standard provides for bandwidths of up to 300Mbps.
8. An IV attack is usually associated with which of the following wireless protocols?
WEP
WAP
WPA
WPA2
8. A. An IV attack is usually associated with the WEP wireless protocol.
9. Which type of encryption does CCMP use?
EAP
DES
AES
IV
9. C. CCMP uses 128-bit AES encryption.
10. Which encryption technology is associated with WPA?
TKIP
CCMP
WEP
LDAP
10. A. The encryption technology associated with WPA is TKIP.
11. Which of the following is not one of the three transmission technologies used to communicate in the 802.11 standard?
DSSS
FHSS
VITA
OFDM
11. C. The three technologies available for use with the 802.11 standard are DSSS (direct-sequence spread spectrum), FHSS (frequency-hopping spread spectrum), and OFDM (orthogonal frequency division multiplexing). VITA (Volunteer Income Tax Assistance) is not a wireless transmission technology.
12. What is the size of the initialization vector (IV) that WEP uses for encryption?
6-bit
24-bit
56-bit
128-bit
12. B. The initialization vector (IV) that WEP uses for encryption is 24-bit.
13. Which of the following is a script language WAP-enabled devices can respond to?
WXML
Winsock
WIScript
WMLScript
13. D. WAP-enabled devices can respond to scripts using an environment called WMLScript.
14. Which of the following authentication levels with WAP requires both ends of the connection to authenticate to confirm validity?
Relaxed
Two-way
Server
Anonymous
14. B. Two-way authentication requires both ends of the connection to authenticate to confirm validity.
15. Which of the following manages the session information and connection between wireless devices?
WSP
WPD
WPT
WMD
15. A. WSP (Wireless Session Protocol) manages the session information and connection between wireless devices.
16. Which of the following provides services similar to TCP and UDP for WAP?
WTLS
WDP
WTP
WFMD
16. C. The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP.
17. Which of the following authentication levels with WAP allows virtually anyone to connect to the wireless portal?
Relaxed
Two-way
Server
Anonymous
17. D. Anonymous authentication allows virtually anyone to connect to the wireless portal.
18. If the interconnection between the WAP server and the Internet isn't encrypted, packets between the devices may be intercepted. What is this vulnerability known as?
Packet sniffing
Minding the gap
Middle man
Broken promise
18. A. If the interconnection between the WAP server and the Internet isn't encrypted, packets between the devices may be intercepted and this is known as packet sniffing.
19. WAP uses a smaller version of HTML for Internet displays. This is known as:
DSL
HSL
WML
OFML
19. C. WAP uses a smaller version of HTML called Wireless Markup Language (WML) for Internet displays.
20. What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet?
128-bit
64-bit
56-bit
12-bit
20. A. TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet.
Wireless Application Protocol (WAP)
equivalent to TCP/IP for wireless devices
WTLS
Wireless Transport Layer Security
Security layer of WAP
802.11a
Wireless LAN Standard
5GHz band
54 Mbps
OFDM
802.11b
Wireless LAN Standard
2.4GHz band
11Mbps
DSSS
802.11g
Wireless LAN Standard
2.4GHz band
54 Mbps
802.11n
Wireless LAN Standard
5GHz band
300Mbps
802.11i
Wireless LAN Security standards
WAP2
Site Survey
listening in on wireless signals.
WEP
Wired Equivalent Privacy
Uses RC4 and 24-bit Initialization Vector (IV)
WPA
WiFi Protected Access
Incomplete implementation of 802.11i
Uses TKIP with 128-bit RC4
WPA2
Wifi Protected Access 2
Full Implementation of 802.11i
Uses CCMP with 128-bit AES and 48-bit initalization vector
EAP
extensible authentication protocol
framework for authentication
PEAP
Protected Extensible Authentication Protocol
Replacement for LEAP
Native Windows support
LEAP
Lightweight Extensible Authentication Protocol
Proprietary to Cisco, weak.
802.11
Wireless transmission standard
2.4 GHz band
1 or 2 Mbps
FHSS or DSSS
FHSS
Frequency hopping spread spectrum
hops transmission over predefined frequencies
synchronized between sender and receiver
DSSS
Direct sequence spread spectrum
higher frequency transmission contains redundant data
OFDM
Orthogonal frequency division multiplexing
breaks data into sub-signals and transmits simultaneously on different frequencies
WML
Wireless MArkup Language
Smaller version of HTTP used in WAP
WMLScript
Scripting language similar to Javascript used in WAP
WAP Authentication
Anonymous = anyone
Server authentication = workstation authenticates to server
Two-way = both ends authenticate with each other
WSP
Wireless Session Protocol
manages session information and connection between devices
WTP
Wireless Transaction Protocol
Similar to TCP and UDP for WAP
WDP
Wireless Datagram Protocol
provides a common interface between devices
MAC Filtering
AKA Network Lock
Whitelisting MAC addresses for connection to access point
War Driving
driving around looking for exploitable access points
War Chalking
Leaving marks on buildings to indicate available access points
Bluejacking
spam over bluetooth
Bluesnarfing
gaining unauthorized access through bluetooth
x of y cards Next >|