

![]()


Advanced Networking explores the principles, protocols, and technologies that enable modern computer networks to function efficiently and securely at scale. This course covers topics such as high-speed network architectures, advanced routing and switching, network security protocols, Quality of Service (QoS), software-defined networking (SDN), wireless and mobile networking, and network performance optimization. Students will analyze case studies, engage in hands-on lab exercises, and develop practical skills to design, configure, and troubleshoot complex network environments, preparing them to address challenges in enterprise and service provider settings.
Recommended Textbook
CWSP Guide to Wireless Security 1st Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1118 Page 2

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21967
Sample Questions
Q1) A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.
A) flat
B) mesh
C) single
D) linked
Answer: B
Q2) ____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.
A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
Answer: D
Q3) Typically all rogue access points have security features implemented.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21968
Sample Questions
Q1) A wireless device is set to look for beacon frames from the AP. This is known as
Answer: scanning
Q2) Wireless access control through MAC address filtering is the same as access restrictions.
A)True
B)False
Answer: False
Q3) The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the
Answer: default key
Q4) A(n) ____________________ acts as the central base station for the wireless network.
Answer: access point (AP) access point AP
To view all questions and flashcards with answers, click on the resource link above.

4
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21969
Sample Questions
Q1) Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.
A) spear phishing
B) phishing
C) pharming
D) Google phishing
Answer: C
Q2) What are the two fundamental characteristics of antennas?
Answer: There are two fundamental characteristics of antennas. First, as the frequency gets higher the wavelength becomes smaller. This means that the size of the antenna is smaller. Consider a cellular telephone: it uses a high frequency so only a small antenna is required. Second, as the gain (positive difference in amplitude between two signals) of an antenna increases, the coverage area narrows. High-gain antennas offer longer coverage areas than low-gain antennas at the same input power level.
Q3) ____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.
Answer: Wireless location mapping
To view all questions and flashcards with answers, click on the resource link above.

5

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21970
Sample Questions
Q1) ____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.
A) Identity theft
B) Spam
C) DoS attack
D) Phishing
Q2) A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.
A) virus
B) worm
C) spam
D) logic bomb
Q3) A ____ is a computer program that lies dormant until it is triggered by a specific event.
A) worm
B) virus
C) spam
D) logic bomb
Q4) What are the problems of using community strings in SNMP?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21971
Sample Questions
Q1) What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
Q2) IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.
A) pre-authentication
B) port security
C) MIC
D) key-caching
Q3) AES is designed to be an encryption technique that is secure from attacks.
A)True
B)False
Q4) PSK keys are automatically changed (called ____).
A) MIC
B) key mixing
C) IV sequence
D) rekeying
Q5) The block cipher used in 802.11i is the ____________________.
Q6) What are the benefits of limiting the maximum number of DHCP users?
Q7) What are the TKIP major components?
Q8) When should you use the transitional security model?
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21972
Sample Questions
Q1) What are the three basic types of filtering?
Q2) The IEEE ____ task group has been working on wireless QoS since May 2000.
A) 802.11e
B) 802.11f
C) 802.11g
D) 802.11i
Q3) A(n) ____ wireless mesh network is designed to allow wireless devices to be longer distances away from the access point.
A) ad hoc
B) backhaul
C) 802.11f
D) managed
Q4) Using the ____, 802.11F specified information that access points need to exchange to support WLAN roaming.
A) AIFSN
B) HCCA
C) IAPP
D) EDCA
Q5) What are some of the advantages of a wireless router?
Q6) What is the problem solved by the Inter-Access Point Protocol (IAPP)?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21973
Sample Questions
Q1) ____ looks at the incoming packet and permits or denies it based strictly on the rule base.
A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
Q2) The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.
A) CRC files
B) definition files
C) TPID files
D) infection files
Q3) A firewall is sometimes called a ____.
A) bridge
B) hub
C) packet filter
D) repeater
Q4) IEEE 802.11 WLANs have more collisions than wired Ethernet networks.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21974
Sample Questions
Q1) Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
A)True
B)False
Q2) In public key cryptography, the ____ key encrypts the message.
A) public
B) private
C) known
D) user
Q3) The MKs are used for access point to wireless device transmissions, or unicast transmissions.
A)True
B)False
Q4) The purpose of the ____ handshake is to authenticate the GTK.
A) group key
B) four-way
C) five-way
D) MK
Q5) Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21975
Sample Questions
Q1) A ____ VPN is a user-to-LAN connection used by remote users.
A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
Q2) What are some of the advantages of VPN technology?
Q3) A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
Q4) ____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.
A) PPP
B) SFTP
C) SCP
D) SSH
Q5) Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21976
Sample Questions
Q1) ____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
Q2) Compare an intrusion system with a firewall.
Q3) Global positioning systems (GPS) are widely used in 802.11 WLANs.
A)True
B)False
Q4) A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.
A) signature detection
B) anomaly detection
C) known attacks detection
D) pattern detection
Q5) ____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.
A) RF fingerprinting
B) RSSI
C) Trilateration
D) Triangulation
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21977
Sample Questions
Q1) The best approach to creating a security policy is for a member of the IT staff to create the document in a few days with little or no input from other individuals.
A)True
B)False
Q2) What are the options faced by an organization when confronted with a risk?
Q3) A ____ is a document that outlines specific requirements or rules that must be met.
A) policy
B) standard
C) guideline
D) risk
Q4) A ____ can help to clarify some of the ethical obligations and responsibilities undertaken by users.
A) guideline
B) security policy
C) code of ethics
D) standard
Q5) The SLE is computed by multiplying the value of the asset (Asset Value or AV) by the
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21978
Sample Questions
Q1) ____, or controlling changes made to the WLAN after installation, is another key element of operational support.
A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
Q2) Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
Q3) A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
A)True
B)False
Q4) An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.
A) VPN
B) filtering
C) segmentation
D) firewalling
Q5) Briefly describe role-based access control.
Page 14
To view all questions and flashcards with answers, click on the resource link above.