Advanced Networking Final Test Solutions - 504 Verified Questions

Page 1


Advanced Networking

Final Test Solutions

Course Introduction

Advanced Networking explores the principles, protocols, and technologies that enable modern computer networks to function efficiently and securely at scale. This course covers topics such as high-speed network architectures, advanced routing and switching, network security protocols, Quality of Service (QoS), software-defined networking (SDN), wireless and mobile networking, and network performance optimization. Students will analyze case studies, engage in hands-on lab exercises, and develop practical skills to design, configure, and troubleshoot complex network environments, preparing them to address challenges in enterprise and service provider settings.

Recommended Textbook

CWSP Guide to Wireless Security 1st Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1118 Page 2

Chapter 1: Foundations of Wireless Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21967

Sample Questions

Q1) A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.

A) flat

B) mesh

C) single

D) linked

Answer: B

Q2) ____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.

A) Wireless packet sniffer

B) VoWLAN

C) VoIP

D) Malware

Answer: D

Q3) Typically all rogue access points have security features implemented.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21968

Sample Questions

Q1) A wireless device is set to look for beacon frames from the AP. This is known as

Answer: scanning

Q2) Wireless access control through MAC address filtering is the same as access restrictions.

A)True

B)False

Answer: False

Q3) The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the

Answer: default key

Q4) A(n) ____________________ acts as the central base station for the wireless network.

Answer: access point (AP) access point AP

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Passive Wireless Discovery

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21969

Sample Questions

Q1) Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A) spear phishing

B) phishing

C) pharming

D) Google phishing

Answer: C

Q2) What are the two fundamental characteristics of antennas?

Answer: There are two fundamental characteristics of antennas. First, as the frequency gets higher the wavelength becomes smaller. This means that the size of the antenna is smaller. Consider a cellular telephone: it uses a high frequency so only a small antenna is required. Second, as the gain (positive difference in amplitude between two signals) of an antenna increases, the coverage area narrows. High-gain antennas offer longer coverage areas than low-gain antennas at the same input power level.

Q3) ____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.

Answer: Wireless location mapping

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: Active Wireless Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21970

Sample Questions

Q1) ____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A) Identity theft

B) Spam

C) DoS attack

D) Phishing

Q2) A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.

A) virus

B) worm

C) spam

D) logic bomb

Q3) A ____ is a computer program that lies dormant until it is triggered by a specific event.

A) worm

B) virus

C) spam

D) logic bomb

Q4) What are the problems of using community strings in SNMP?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wireless Security Models

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21971

Sample Questions

Q1) What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?

Q2) IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.

A) pre-authentication

B) port security

C) MIC

D) key-caching

Q3) AES is designed to be an encryption technique that is secure from attacks.

A)True

B)False

Q4) PSK keys are automatically changed (called ____).

A) MIC

B) key mixing

C) IV sequence

D) rekeying

Q5) The block cipher used in 802.11i is the ____________________.

Q6) What are the benefits of limiting the maximum number of DHCP users?

Q7) What are the TKIP major components?

Q8) When should you use the transitional security model?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enterprise Wireless Hardware Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21972

Sample Questions

Q1) What are the three basic types of filtering?

Q2) The IEEE ____ task group has been working on wireless QoS since May 2000.

A) 802.11e

B) 802.11f

C) 802.11g

D) 802.11i

Q3) A(n) ____ wireless mesh network is designed to allow wireless devices to be longer distances away from the access point.

A) ad hoc

B) backhaul

C) 802.11f

D) managed

Q4) Using the ____, 802.11F specified information that access points need to exchange to support WLAN roaming.

A) AIFSN

B) HCCA

C) IAPP

D) EDCA

Q5) What are some of the advantages of a wireless router?

Q6) What is the problem solved by the Inter-Access Point Protocol (IAPP)?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Designing a Secure Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21973

Sample Questions

Q1) ____ looks at the incoming packet and permits or denies it based strictly on the rule base.

A) Stateful packet filtering

B) Stateless packet filtering

C) Hubs

D) Stateful hubs

Q2) The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files

B) definition files

C) TPID files

D) infection files

Q3) A firewall is sometimes called a ____.

A) bridge

B) hub

C) packet filter

D) repeater

Q4) IEEE 802.11 WLANs have more collisions than wired Ethernet networks.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Secure Wireless Authentication

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21974

Sample Questions

Q1) Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.

A)True

B)False

Q2) In public key cryptography, the ____ key encrypts the message.

A) public

B) private

C) known

D) user

Q3) The MKs are used for access point to wireless device transmissions, or unicast transmissions.

A)True

B)False

Q4) The purpose of the ____ handshake is to authenticate the GTK.

A) group key

B) four-way

C) five-way

D) MK

Q5) Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Secure Wireless Transmissions

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21975

Sample Questions

Q1) A ____ VPN is a user-to-LAN connection used by remote users.

A) site-to-multipoint

B) site-to-site

C) remote-access

D) multipoint-to-multipoint

Q2) What are some of the advantages of VPN technology?

Q3) A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.

Q4) ____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

A) PPP

B) SFTP

C) SCP

D) SSH

Q5) Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Managing the Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21976

Sample Questions

Q1) ____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.

Q2) Compare an intrusion system with a firewall.

Q3) Global positioning systems (GPS) are widely used in 802.11 WLANs.

A)True

B)False

Q4) A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

A) signature detection

B) anomaly detection

C) known attacks detection

D) pattern detection

Q5) ____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

A) RF fingerprinting

B) RSSI

C) Trilateration

D) Triangulation

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Wireless Security Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21977

Sample Questions

Q1) The best approach to creating a security policy is for a member of the IT staff to create the document in a few days with little or no input from other individuals.

A)True

B)False

Q2) What are the options faced by an organization when confronted with a risk?

Q3) A ____ is a document that outlines specific requirements or rules that must be met.

A) policy

B) standard

C) guideline

D) risk

Q4) A ____ can help to clarify some of the ethical obligations and responsibilities undertaken by users.

A) guideline

B) security policy

C) code of ethics

D) standard

Q5) The SLE is computed by multiplying the value of the asset (Asset Value or AV) by the

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Operational Support and Wireless Convergence

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21978

Sample Questions

Q1) ____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation

B) Configuration management

C) Monitoring

D) Education

Q2) Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.

Q3) A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.

A)True

B)False

Q4) An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.

A) VPN

B) filtering

C) segmentation

D) firewalling

Q5) Briefly describe role-based access control.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook