Network Security Exam Bank - 504 Verified Questions

Page 1


Network Security Exam Bank

Course Introduction

Network Security focuses on the fundamental principles and practices used to protect computer networks and data from unauthorized access, misuse, or attacks. Topics covered include cryptography, network vulnerabilities, threat models, firewalls, intrusion detection and prevention systems, authentication protocols, and secure communication techniques. Students learn to identify common security threats, implement security measures, and evaluate the effectiveness of various security solutions in both wired and wireless network environments. Through hands-on labs and case studies, the course also emphasizes real-world applications and current trends in safeguarding information assets.

Recommended Textbook

CWNA Guide to Wireless LANs Networking 2nd Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1032

Page 2

Chapter 1: Its a Wireless World

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20462

Sample Questions

Q1) A(n) ____________________ cable connects the AP to a wired LAN or to the Internet.

Answer: patch

Q2) Where must a WiMax transmitter be located?

A) anywhere in a building

B) anywhere on upper floors of a building

C) by a window in the upper floors of a building

D) on the roof of a building

Answer: D

Q3) An employee who purchases an access point and secretly brings it into the office in order to provide personal wireless access has installed what is known as a ____ access point.

A) rogue

B) hot

C) cold

D) war

Answer: A

Q4) Public ____________________ are locations where wireless data services are available.

Answer: hotspots

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Devices and Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20463

Sample Questions

Q1) The 802.11b standard can support wireless devices that are up to ____ meters apart.

A) 30

B) 90

C) 115

D) 130

Answer: C

Q2) An access point has a(n) ____ wired network interface that allows it to connect by cable to a standard wired network.

A) IEEE 802

B) RJ-45

C) compact flash

D) PCI

Answer: B

Q3) Access points are typically mounted on a(n) ____________________ to reduce interference from surrounding objects.

Answer: ceiling

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Wireless Works

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20464

Sample Questions

Q1) In a wireless transmission data travels on invisible radio waves.

A)True

B)False

Answer: True

Q2) A loss of 10 decibels means that ____ percent of the power has been lost in mW.

A) 10

B) 30

C) 90

D) 100

Answer: C

Q3) The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage).

A)True

B)False

Answer: True

Q4) ____________________ is defined as the positive difference in amplitude between two signals.

Answer: Gain

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: IEEE 80211 Physical Layer Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20465

Sample Questions

Q1) The 802.11g standard outlines two mandatory modes along with one optional mode. Describe each mode.

Q2) What techniques are used by vendors to achieve 2x mode for transmissions?

A) combine two frequency channels

B) use different coding rate schemes

C) reallocating the individual carriers

D) All of the above

Q3) What is the Open Systems Interconnection (OSI) reference model?

Q4) When transmitting with FHSS, if interference is encountered on a particular frequency then that part of the signal will be retransmitted on the previous frequency of the hopping code.

A)True

B)False

Q5) Which system is preferred for 802.11b WLANs?

A) DSSS

B) FHSS

C) OFDM

D) All are equally preferred

Q6) What are the advantages to using DSSS with a chipping code?

Q7) Describe the FCC restrictions on FHSS.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: IEEE 80211 Media Access Control and Network Layer Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20466

Sample Questions

Q1) Describe the three interframe spaces (IFS) defined in the 802.11 standard.

Q2) What is the default authentication method according to the 802.11 standard?

A) basic

B) open system

C) shared key

D) private key

Q3) All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection.

A) unit

B) flag

C) sum

D) check sequence

Q4) How does open system authentication work?

Q5) The ____ field appears last in a data frame.

A) Frame control

B) Duration

C) Sequence control

D) Frame check sequence

Q6) Describe power management for an ad hoc configuration.

Q7) What is a management frame? What are the fields in this type of frame? Page 7

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 6: Planning and Deploying a Wireless LAN

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20467

Sample Questions

Q1) Establishing and staffing an internal help desk is one of the most effective means of support.

A)True

B)False

Q2) In a 802.11b network, how many power users should be associated with one access point?

A) 5

B) 15

C) 25

D) 50

Q3) What do many industry experts believe is the greatest opportunity for business-process improvement at the beginning of the 21st century?

A) access to the Internet from employee's desks

B) extending network access to employees who are away from their desks

C) providing wireless hotspots in rural communities

D) All of the above

Q4) What are thin access points? Describe some of the benefits of using them.

Q5) Wireless ____________________ provide a single mechanism for managing and monitoring the wireless network.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Conducting a Site Survey

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20468

Sample Questions

Q1) What should be included in a site survey report?

Q2) What provides the greatest source of RF interference?

A) mirror

B) interior wall

C) desk

D) chair

Q3) What are the steps involved in gathering data for a site survey?

Q4) When is the best time to perform a site survey?

A) quarterly

B) monthly

C) daily

D) prior to installing a WLAN

Q5) What are the parts of a site survey report?

A) introduction section, graphical section

B) narrative section, graphical section

C) data section, conclusion section

D) data section, recommendation section

Q6) In addition to access points, what wireless tool(s) are required for a site survey?

Q7) What is a spectrum analyzer?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Wireless LAN Security and Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20469

Sample Questions

Q1) What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) speed

B) cost

C) security

D) complexity

Q2) ____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

A) Computer Emergency Response Team Coordination Center (CERT/CC)

B) InfraGard

C) National Security Institute (NSI)

D) SysAdmin, Audit, Network, Security (SANS) Institute

Q3) MAC address filtering ____.

A) is difficult to implement

B) requires pre-approved authentication

C) is expensive

D) does not work well

Q4) What are the three characteristics of information that must be protected by information security?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Implementing Wireless Lan Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20470

Sample Questions

Q1) Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.

A)True

B)False

Q2) What security technology was most recently introduced?

A) WPA

B) WPA2

C) WEP2

D) Dynamic WEP

Q3) What is a wireless gateway?

Q4) Describe the 802.1x authentication procedure.

Q5) Describe pre-shared key authentication.

Q6) At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.

A) captive portals

B) VPNs

C) firewalls

D) wireless sensors

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing a Wireless LAN

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20471

Sample Questions

Q1) ____________________ is software that is embedded into hardware to control the device.

Q2) Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?

Q3) For a proper WLAN performance, the link budget must be ____ dB.

A) greater than zero

B) greater than five

C) greater than ten

D) less than ten

Q4) What is the last step in RF site tuning?

A) adjust channel settings

B) documenting changes

C) modify throughput

D) validate coverage area

Q5) A ____ antenna is most typically used on a WLAN.

A) panel

B) rod

C) sectorized

D) beam steering

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Network Settings and Wireless LAN

Troubleshooting

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20472

Sample Questions

Q1) Frames can be filtered based on the protocol of that frame, such as TCP, or ____.

A) FTP

B) HTTP

C) UDP

D) DHCP

Q2) Describe the LED indicator lights that appear on an AP.

Q3) The primary port of the AP is almost always the ____________________ network port.

Q4) What is the purpose of the Ethernet Timeout setting on an access point?

Q5) When configuring advanced settings for an AP, the ____ is the domain that is serving the AP.

A) Domain Suffix

B) Domain Name Server

C) Default Domain

D) Current Domain

Q6) Enabling the ____________________ stops radio transmissions from the access point for the specified number of seconds if the AP detects no activity on the Ethernet line.

Q7) In Mobile IP what are the home and foreign agents?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20473

Sample Questions

Q1) What is the shape of cells in a cellular telephone network?

A) triangle

B) square

C) circle

D) hexagon

Q2) Describe the last mile connection problem.

Q3) What is the main drawback of 802.15.1 technology?

A) cost

B) speed

C) reliability

D) All of the above

Q4) In a piconet, one device is the ____, and controls all of the wireless traffic.

A) active slave

B) slave

C) master

D) controller

Q5) How does the MAC layer of WiMAX (Worldwide Interoperability for Microwave Access) differ from that used in IEEE 802.11a/b/g?

15

Q6) There are several significant differences between 802.15.3 and 802.15.1 (Bluetooth). What are they?

To view all questions and flashcards with answers, click on the resource link above.

Page 16

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.