

Network Security Exam Bank
Course Introduction
Network Security focuses on the fundamental principles and practices used to protect computer networks and data from unauthorized access, misuse, or attacks. Topics covered include cryptography, network vulnerabilities, threat models, firewalls, intrusion detection and prevention systems, authentication protocols, and secure communication techniques. Students learn to identify common security threats, implement security measures, and evaluate the effectiveness of various security solutions in both wired and wireless network environments. Through hands-on labs and case studies, the course also emphasizes real-world applications and current trends in safeguarding information assets.
Recommended Textbook
CWNA Guide to Wireless LANs Networking 2nd Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1032

Page 2

Chapter 1: Its a Wireless World
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20462
Sample Questions
Q1) A(n) ____________________ cable connects the AP to a wired LAN or to the Internet.
Answer: patch
Q2) Where must a WiMax transmitter be located?
A) anywhere in a building
B) anywhere on upper floors of a building
C) by a window in the upper floors of a building
D) on the roof of a building
Answer: D
Q3) An employee who purchases an access point and secretly brings it into the office in order to provide personal wireless access has installed what is known as a ____ access point.
A) rogue
B) hot
C) cold
D) war
Answer: A
Q4) Public ____________________ are locations where wireless data services are available.
Answer: hotspots
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Devices and Standards
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20463
Sample Questions
Q1) The 802.11b standard can support wireless devices that are up to ____ meters apart.
A) 30
B) 90
C) 115
D) 130
Answer: C
Q2) An access point has a(n) ____ wired network interface that allows it to connect by cable to a standard wired network.
A) IEEE 802
B) RJ-45
C) compact flash
D) PCI
Answer: B
Q3) Access points are typically mounted on a(n) ____________________ to reduce interference from surrounding objects.
Answer: ceiling
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Wireless Works
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20464
Sample Questions
Q1) In a wireless transmission data travels on invisible radio waves.
A)True
B)False
Answer: True
Q2) A loss of 10 decibels means that ____ percent of the power has been lost in mW.
A) 10
B) 30
C) 90
D) 100
Answer: C
Q3) The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage).
A)True
B)False
Answer: True
Q4) ____________________ is defined as the positive difference in amplitude between two signals.
Answer: Gain
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: IEEE 80211 Physical Layer Standards
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20465
Sample Questions
Q1) The 802.11g standard outlines two mandatory modes along with one optional mode. Describe each mode.
Q2) What techniques are used by vendors to achieve 2x mode for transmissions?
A) combine two frequency channels
B) use different coding rate schemes
C) reallocating the individual carriers
D) All of the above
Q3) What is the Open Systems Interconnection (OSI) reference model?
Q4) When transmitting with FHSS, if interference is encountered on a particular frequency then that part of the signal will be retransmitted on the previous frequency of the hopping code.
A)True
B)False
Q5) Which system is preferred for 802.11b WLANs?
A) DSSS
B) FHSS
C) OFDM
D) All are equally preferred
Q6) What are the advantages to using DSSS with a chipping code?
Q7) Describe the FCC restrictions on FHSS.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: IEEE 80211 Media Access Control and Network Layer Standards
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20466
Sample Questions
Q1) Describe the three interframe spaces (IFS) defined in the 802.11 standard.
Q2) What is the default authentication method according to the 802.11 standard?
A) basic
B) open system
C) shared key
D) private key
Q3) All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection.
A) unit
B) flag
C) sum
D) check sequence
Q4) How does open system authentication work?
Q5) The ____ field appears last in a data frame.
A) Frame control
B) Duration
C) Sequence control
D) Frame check sequence
Q6) Describe power management for an ad hoc configuration.
Q7) What is a management frame? What are the fields in this type of frame? Page 7
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Chapter 6: Planning and Deploying a Wireless LAN
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20467
Sample Questions
Q1) Establishing and staffing an internal help desk is one of the most effective means of support.
A)True
B)False
Q2) In a 802.11b network, how many power users should be associated with one access point?
A) 5
B) 15
C) 25
D) 50
Q3) What do many industry experts believe is the greatest opportunity for business-process improvement at the beginning of the 21st century?
A) access to the Internet from employee's desks
B) extending network access to employees who are away from their desks
C) providing wireless hotspots in rural communities
D) All of the above
Q4) What are thin access points? Describe some of the benefits of using them.
Q5) Wireless ____________________ provide a single mechanism for managing and monitoring the wireless network.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Conducting a Site Survey
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20468
Sample Questions
Q1) What should be included in a site survey report?
Q2) What provides the greatest source of RF interference?
A) mirror
B) interior wall
C) desk
D) chair
Q3) What are the steps involved in gathering data for a site survey?
Q4) When is the best time to perform a site survey?
A) quarterly
B) monthly
C) daily
D) prior to installing a WLAN
Q5) What are the parts of a site survey report?
A) introduction section, graphical section
B) narrative section, graphical section
C) data section, conclusion section
D) data section, recommendation section
Q6) In addition to access points, what wireless tool(s) are required for a site survey?
Q7) What is a spectrum analyzer?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Wireless LAN Security and Vulnerabilities
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20469
Sample Questions
Q1) What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
A) speed
B) cost
C) security
D) complexity
Q2) ____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.
A) Computer Emergency Response Team Coordination Center (CERT/CC)
B) InfraGard
C) National Security Institute (NSI)
D) SysAdmin, Audit, Network, Security (SANS) Institute
Q3) MAC address filtering ____.
A) is difficult to implement
B) requires pre-approved authentication
C) is expensive
D) does not work well
Q4) What are the three characteristics of information that must be protected by information security?
To view all questions and flashcards with answers, click on the resource link above. Page 11
Chapter 9: Implementing Wireless Lan Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20470
Sample Questions
Q1) Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
A)True
B)False
Q2) What security technology was most recently introduced?
A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
Q3) What is a wireless gateway?
Q4) Describe the 802.1x authentication procedure.
Q5) Describe pre-shared key authentication.
Q6) At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.
A) captive portals
B) VPNs
C) firewalls
D) wireless sensors

Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing a Wireless LAN
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20471
Sample Questions
Q1) ____________________ is software that is embedded into hardware to control the device.
Q2) Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
Q3) For a proper WLAN performance, the link budget must be ____ dB.
A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
Q4) What is the last step in RF site tuning?
A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
Q5) A ____ antenna is most typically used on a WLAN.
A) panel
B) rod
C) sectorized
D) beam steering
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Network Settings and Wireless LAN
Troubleshooting
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20472
Sample Questions
Q1) Frames can be filtered based on the protocol of that frame, such as TCP, or ____.
A) FTP
B) HTTP
C) UDP
D) DHCP
Q2) Describe the LED indicator lights that appear on an AP.
Q3) The primary port of the AP is almost always the ____________________ network port.
Q4) What is the purpose of the Ethernet Timeout setting on an access point?
Q5) When configuring advanced settings for an AP, the ____ is the domain that is serving the AP.
A) Domain Suffix
B) Domain Name Server
C) Default Domain
D) Current Domain
Q6) Enabling the ____________________ stops radio transmissions from the access point for the specified number of seconds if the AP detects no activity on the Ethernet line.
Q7) In Mobile IP what are the home and foreign agents?
To view all questions and flashcards with answers, click on the resource link above. Page 14
Chapter

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20473
Sample Questions
Q1) What is the shape of cells in a cellular telephone network?
A) triangle
B) square
C) circle
D) hexagon
Q2) Describe the last mile connection problem.
Q3) What is the main drawback of 802.15.1 technology?
A) cost
B) speed
C) reliability
D) All of the above
Q4) In a piconet, one device is the ____, and controls all of the wireless traffic.
A) active slave
B) slave
C) master
D) controller
Q5) How does the MAC layer of WiMAX (Worldwide Interoperability for Microwave Access) differ from that used in IEEE 802.11a/b/g?
15
Q6) There are several significant differences between 802.15.3 and 802.15.1 (Bluetooth). What are they?
To view all questions and flashcards with answers, click on the resource link above.
Page 16