Chapter 8 Wireless Networks 2

1) To drive around a city looking for working access points that are unprotected is ________.
A) drive-by hacking
B) war driving
Answer: B
2) Breaking into WLANs is ________.
A) drive-by hacking
B) war driving
Answer: A
3) An unauthorized internal access point is a(n) ________.
A) evil twin access point
B) rogue access point
C) Both A and B
Answer: B
4) A rogue access point is an unauthorized access point.
A) True.
B) False.
Answer: A
5) What security protocol originally came with 802.11 equipment?
A) 802.11e.
B) 802.11i.
C) WPA.
D) WEP.
Answer: D
6) What security protocol originally came with 802.11 equipment?
A) WPA.
B) WEP.
C) Both A and B
D) Neither A nor B
Answer: B
7) How long does it take an attacker to crack WEP today with readily available software?
A) About ten seconds.
B) About ten minutes.
C) About ten hours.
D) About ten days.
E) WEP cannot be cracked with readily available software.
Answer: B
8) WEP is so strong that it cannot be cracked with readily available software.
A) True.
B) False.
Answer: B
9) WEP is a strong core security protocol.
A) True.
B) False.
Answer: B
10) Who created WPA?
A) The Internet Engineering Task Force.
B) ISO.
C) The 802.1 Working Group.
D) The 802.11 Working Group.
E) The Wi-Fi Alliance.
Answer: E
11) WPA was created by the Internet Engineering Task Force.
A) True.
B) False.
Answer: B
12) 802.11i is attractive compared with WPA because ________.
A) 802.11i offers stronger security
B) 802.11i offers quality of service
C) many older devices can be upgraded to 802.11i
D) 802.11i was standardized by the Wi-Fi Alliance
E) All of the above.
Answer: A
13) Which of the above offers stronger security?
A) WPA.
B) 802.11i.
C) Both A and B offer equally strong security.
Answer: B
14) 802.11i offers stronger security than WPA.
A) True.
B) False.
Answer: A
15) What is the strongest security protocol for 802.11 today?
A) 802.11i.
B) 802.11s.
C) 802.11X.
D) WPA.
E) WEP.
Answer: A
16) What does the Wi-Fi Alliance call 802.11i?
A) 802.1x.
B) 802.11s.
C) 802.11X.
D) WPA.
E) WPA2.
Answer: E
17) 802.11i and WPA are different names for the same standard.
A) True.
B) False.
Answer: B
18) 802.11i uses ________ as its encryption method.
A) RC4
B) 802.11s
C) AES-CCMP
D) WPA
Answer: C
19) 802.11i uses WEP as its encryption method.
A) True.
B) False.
Answer: B
20) WPA has been partially cracked.
A) True.
B) False.
Answer: A
21) In what mode of 802.11i operation is a central authentication server used?
A) 802.1X mode.
B) PSK mode.
C) Both A and B
D) Neither A nor B
Answer: A
22) A central authentication server is used in 802.11i PSK mode.
A) True.
B) False.
Answer: B
23) The Wi-Fi Alliance refers to 802.1X mode as ________ mode.
A) AES
B) PSK
C) enterprise
D) EAP
Answer: C
24) 802.1X needs security between the authenticator and the computer in ________.
A) Ethernet
B) 802.11i
C) Both A and B
D) Neither A nor B
Answer: B
25) 802.1X needs security between the authenticator and the computer in Ethernet.
A) True.
B) False.
Answer: B
26) 802.1X needs security between the authenticator and the computer in 802.11 wireless access.
A) True.
B) False.
Answer: A
27) The security in 802.1X is sufficient for its direct use in 802.11 WLANs.
A) True.
B) False.
Answer: B
28) Which of the following is NOT a security extension to EAP?
A) EAP-TTLS.
B) MS-EAP.
C) PEAP.
Answer: B
29) The most popular standard for extended 802.1X security is ________.
A) EAP-TTLS
B) MS-EAP
C) PEAP
Answer: C
30) The most popular standard for extended 802.1X security is PEAP.
A) True.
B) False.
Answer: A
31) In 802.11i ________, hosts must know a shared key.
A) 802.1X mode
B) PSK mode
C) Both A and B
D) Neither A nor B
Answer: B
32) PSK mode automatically prevents the use of weak keys.
A) True.
B) False.
Answer: B
33) In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
A) 6
B) 8
C) 20
D) 40
E) 128
Answer: C
34) A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point
C) Both A and B
Answer: A
35) A notebook computer configured to act like a real access point is a rogue access point.
A) True.
B) False.
Answer: B
36) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
A) one
B) two
C) four
D) sixteen
Answer: B
37) What damage can an evil twin access point do?
A) Eavesdrop on communication.
B) Steal important keys or other information transmitted by the client.
C) Launch attacks against corporate servers.
D) All of the above.
E) Only A and B
Answer: D
38) An evil twin access point can launch attacks against the corporate network.
A) True.
B) False.
Answer: A
39) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
A) VLANs.
B) VPNs.
C) PEAP.
D) IPsec.
E) SSL/TLS.
Answer: B
40) In VPNs designed to frustrate evil twin attacks, the shared secret ________.
A) is transmitted in the clear
B) is transmitted with cryptographic protections
C) is not transmitted
D) Any of the above.
Answer: C
41) Initial WLAN planning begins with drawing circles on building architecture drawings.
A) True.
B) False.
Answer: A
42) Centralized access point management ________.
A) increases management costs but provides better control
B) reduces management costs
Answer: B
43) Centralized access point management raises management costs.
A) True.
B) False.
Answer: B
44) Which of the following can be used to centrally manage remote access points?
A) Smart access points.
B) WLAN switches.
C) Both A and B
D) Neither A nor B
Answer: C
45) Managed access points should ________.
A) allow access point power to be adjusted remotely
B) provide constant transmission quality monitoring
C) Both A and B
D) Neither A nor B
Answer: C
46) Managed access points should ________.
A) identify rogue access points
B) be able to push updates out to access points
C) Both A and B
D) Neither A nor B
Answer: C
47) As much as possible, WLAN management software should be able to work automatically, taking as many actions as possible without user intervention.
A) True.
B) False.
Answer: A
48) I wish to have a wireless LAN to serve my house. I will use ________.
A) 802.11
B) Bluetooth
C) Either A or B
Answer: A
49) Bluetooth is for ________.
A) large WLANs
B) cable replacement
C) Both A and B
D) Neither A nor B
Answer: B
50) Bluetooth is used for cable replacement.
A) True.
B) False.
Answer: A
51) Which of the following was created for PANs?
A) 802.11.
B) Bluetooth.
C) Both A and B
D) Neither A nor B
Answer: B
52) Bluetooth is commonly used for ________.
A) wireless mice
B) wireless headphones
C) Both A and B
D) Neither A nor B
Answer: C
53) Bluetooth does not use access points.
A) True.
B) False.
Answer: A
54) ________ uses access points.
A) 802.11
B) Bluetooth
C) Both A and B
D) Neither A nor B
Answer: A
55) Bluetooth uses ________.
A) access points
B) peer-to-peer connections between devices
C) Both A and B
D) Neither A nor B
Answer: B
56) Bluetooth offers a rated speed today of about ________.
A) 3 Mbps
B) 11 Mbps
C) 22 Mbps
D) 54 Mbps
E) 100 Mbps
Answer: A
57) Bluetooth offers very high transmission speeds.
A) True.
B) False.
Answer: B
58) The normal maximum distance for Bluetooth propagation is ________.
A) 10 meters
B) 30 meters
C) 50 meters
D) 100 meters
Answer: A
59) Which of the following gives longer battery life?
A) Bluetooth.
B) 802.11.
Answer: A
60) Bluetooth is designed to transmit ________.
A) at high speeds
B) over long distances
C) Both A and B
D) Neither A nor B
Answer: D
61) Application profiles are attractive because they allow devices to work with one another automatically at the application layer.
A) True.
B) False.
Answer: A
62) Which of the following uses application profiles?
A) 802.11a.
B) 802.11g.
C) All 802.11 networks.
D) Bluetooth.
E) All of the above.
Answer: D
63) If a pair of Bluetooth devices switch to 802.11 radio transmission, they can transmit at tens of megabits per second.
A) True.
B) False.
Answer: A
64) Bluetooth is faster than ZigBee.
A) True.
B) False.
Answer: A
65) 802.11 is faster than UWB.
A) True.
B) False.
Answer: B
66) ________ normally is limited to about 10 meters.
A) Bluetooth
B) 802.11
C) Both A and B
D) Neither A nor B
Answer: C
67) What technology could replace universal product code (bar code) tags on products?
A) 802.11.
B) Bluetooth.
C) UWB.
D) RFIDs.
Answer: D
68) ________ is an approach for implementing multiple radio technologies in a single device at reduced cost.
A) UWB
B) ZigBee
C) Software defined radio
D) Agile radio
E) Bluetooth
Answer: C
69) Which of the following tends to have faster speeds?
A) Wireless LANs.
B) Wireless WANs.
C) They generally have about the same speed.
Answer: A
70) Wireless WANs tend to have faster speeds than Wireless LANs.
A) True.
B) False.
Answer: B
71) Most wireless WANs operate in a single metropolitan area.
A) True.
B) False.
Answer: A
72) A ________ serves a city and its suburbs.
A) MAN
B) PAN
C) Both A and B
D) Neither A nor B
Answer: A
73) In cellular technology, a ________ is a small geographical area.
A) cell
B) cellsite
C) Both A and B
D) Neither A nor B
Answer: A
74) In cellular technology, a cellsite is a small geographical area.
A) True.
B) False.
Answer: B
75) An MTSO ________.
A) controls cellsites in a cellular system
B) links mobile users to wired telephone customers
C) Both A and B
D) Neither A nor B
Answer: C
76) Cells are used in cellular telephony to provide ________.
A) service for more customers
B) greater reliability
C) greater speed
D) reduced latency
E) All of the above.
Answer: A
77) Cellular technology provides channel reuse, in different cells in the network.
A) True.
B) False.
Answer: A
78) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________.
A) traditional cellular technology
B) CDMA
C) Both A and B
D) Neither A nor B
Answer: B
79) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology.
A) True.
B) False.
Answer: B
80) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with CDMA cellular technology.
A) True.
B) False.
Answer: A
81) When a cellular customer moves from one cell in a city to another cell in the same city, this is ________.
A) cell switching
B) a handoff
C) cell hopping
D) roaming
E) cell reuse
Answer: B
82) When a cellular customer moves from one city to another, this is ________.
A) roaming
B) a handoff
C) Both A and B
D) Neither A nor B
Answer: A
83) Which of the following is true?
A) “Roaming” means the same thing in cellular and 802.11 networks.
B) “Handoff” means the same thing in cellular and 802.11 networks.
C) Both A and B are true.
Answer: B
84) “Handoff” means the same thing in cellular and 802.11 networks.
A) True.
B) False.
Answer: B
85) Smart phones ________.
A) provide telephone service
B) support web service
C) often have cameras
D) All of the above.
Answer: D
86) Mobile phones that do far more than traditional telephones (such as providing web access) are called ________.
A) smart phones
B) cellsites
C) codecs
Answer: A
87) ________ cellular technology uses digital transmission.
A) 1G
B) 2G
C) Both A and B
D) Neither A nor B
Answer: B
88) 1G cellular technology uses analog transmission.
A) True.
B) False.
Answer: A
89) Which of the following was limited to 10 kbps?
A) 2G.
B) 3G.
C) 4G.
D) None of the above.
Answer: A
90) ________ cellular service typically provides speeds of 300 to 500 kbps.
A) 2G
B) 3G
C) 4G
D) None of the above.
Answer: B
91) What is the planned long-term speed of 3G service for stationary devices?
A) 1 Mbps.
B) 10 Mbps.
C) 100 Mbps.
D) 1 Gbps.
Answer: D
92) What is the planned long-term speed of 3G service for mobile devices?
A) 1 Mbps.
B) 10 Mbps.
C) 100 Mbps.
D) 1 Gbps.
Answer: C
93) For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access?
A) 1G.
B) 2G.
C) 3G.
D) 4G.
Answer: C
94) For high-definition video, what is the lowest generation of cellular service that provides acceptable speed?
A) 1G.
B) 2G.
C) 3G.
D) 4G.
Answer: D
95) Which of the following is one of the initial technologies being used by carriers for 4G service?
A) LTE.
B) WiMAX.
C) Both A and B
D) Neither A nor B
Answer: C
96) Which 4G technology do most carriers intend to use?
A) LTE.
B) WiMAX.
C) Both A and B
D) Neither A nor B
Answer: A
97) Which 4G technology will bring download speeds of 1 Gbps to stationary customers?
A) LTE Advanced.
B) 802.16m.
C) Both A and B
D) Neither A nor B
Answer: C
98) By regulation, cellular systems must give almost the same throughput at different times during the day.
A) True.
B) False
Answer: B
99) By regulation, cellular systems must give almost the same throughput at different places in their service areas.
A) True.
B) False
Answer: B
100) The fact that smart phones can connect to corporate LANs is often advantageous economically for ________.
A) cellular users who pay by the minute
B) cellular users who pay a flat fee for unlimited service
C) Both A and B
D) Neither A nor B
Answer: A
101) Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network.
A) True.
B) False.
Answer: A
102) Some smart phones can act as wireless access points.
A) True.
B) False.
Answer: A