Network Security Exam Preparation Guide - 504 Verified Questions

Page 1


Network Security Exam Preparation Guide

Course Introduction

Network Security is an essential course that introduces students to the principles, technologies, and practices used to protect digital networks and information systems against unauthorized access, misuse, and cyber threats. The course covers key concepts such as cryptography, authentication, firewalls, intrusion detection systems, and secure network protocols. Students will learn how to identify vulnerabilities, employ security measures, and assess risks in modern network environments. Through theoretical instruction and practical exercises, the course prepares participants to design, implement, and manage secure communication infrastructures, equipping them with the foundational knowledge necessary for roles in cybersecurity and related fields.

Recommended Textbook

CWSP Guide to Wireless Security 1st Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1118 Page 2

Chapter 1: Foundations of Wireless Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21967

Sample Questions

Q1) Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.

A) 802.11n

B) WiMAX

C) VoWLAN

D) 802.11i

Answer: C

Q2) ____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.

A) Wireless packet sniffer

B) VoWLAN

C) VoIP

D) Malware

Answer: D

Q3) The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.

Answer: information security

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Wireless LAN Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21968

Sample Questions

Q1) WEP relies on a secret key shared between a wireless client device and the access point.

A)True

B)False

Answer: True

Q2) Describe the main characteristics of the open system authentication method.

Answer: There are two types of authentication supported by the 802.11 standard. Open system authentication is the default method. A device discovers a wireless network in the vicinity through scanning the radio frequency and sends a frame known as an association request frame to the AP. The frame carries information about the data rates that the device can support along with the Service Set Identifier (SSID) of the network it wants to join. The SSID serves as the "network name" for the wireless network and can be any alphanumeric string from 2 to 32 characters. After receiving the association request frame, the access point compares the SSID received with the actual SSID of the network. If the two match then the wireless device is authenticated.

Q3) The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the

Answer: default key

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Passive Wireless Discovery

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21969

Sample Questions

Q1) The GPS receiver can deduce its own location based on a mathematical principle called ____________________.

Answer: Trilateration

Q2) ____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.

A) Kismet

B) KisMAC

C) WZC

D) GPSMac

Answer: A

Q3) A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.

Answer: promiscuous mode

Q4) The informal expression used more often for searching for RF signals is ____.

A) phishing

B) pharming

C) beaconing

D) wardriving

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Active Wireless Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21970

Sample Questions

Q1) ____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A) Identity theft

B) Spam

C) DoS attack

D) Phishing

Q2) ____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

A) Logic bomb

B) Adware

C) Spam

D) Phishing

Q3) An incorrect configuration of wireless hardware or software can often result in easy access to a system.

A)True

B)False

Q4) With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wireless Security Models

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21971

Sample Questions

Q1) In 802.1x, the ____ is the wireless device that requires secure network access.

A) supplicant

B) authenticator

C) authentication server

D) RADIUS

Q2) Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.

A) block cipher

B) chain cipher

C) text cipher

D) CRC cipher

Q3) ____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.

A) AES

B) RC4

C) Block cipher

D) Port security

Q4) AES is designed to be an encryption technique that is secure from attacks.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enterprise Wireless Hardware Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21972

Sample Questions

Q1) In EDCA, the four different streams, called ____, are differentiated in terms of priority.

A) port categories

B) access ports

C) access categories (AC)

D) port filters

Q2) The IEEE ____ standard is designed to enable WLAN devices to share the 5 GHz spectrum with other devices such as military radar systems.

A) 802.11e

B) 802.11h

C) 802.11i

D) 802.11r

Q3) What are some of the features of the IEEE 802.11v protocol?

Q4) A(n) ____ wireless mesh network connects special access points, known as wireless mesh routers, in a mesh configuration.

A) managed

B) backhaul

C) ad hoc

D) unmanaged

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 7: Designing a Secure Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21973

Sample Questions

Q1) The foundation of a firewall is a(n) ____________________.

Q2) ____ looks at the incoming packet and permits or denies it based strictly on the rule base.

A) Stateful packet filtering

B) Stateless packet filtering

C) Hubs

D) Stateful hubs

Q3) Sending a packet to all network devices is called a ____ transmission.

A) unicast

B) multicast

C) broadcast

D) singlecast

Q4) What is security by obscurity?

Q5) When a sending device on a LAN sends a packet that is intended for a single receiving device it is known as a ____ transmission.

A) multicast

B) unicast

C) broadcast

D) linecast

Q6) How does Microsoft classify patches?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Secure Wireless Authentication

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21974

Sample Questions

Q1) With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

A) distributed autonomous site

B) distributed sites with centralized authentication and security

C) single site deployment

D) distributed sites and security with centralized authentication

Q2) ____ uses the unique human characteristics of a person for authentication (something the user is).

A) Digital certificates

B) Passwords

C) Biometrics

D) Password tokens

Q3) LEAP is not vulnerable to dictionary attack tools.

A)True

B)False

Q4) Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).

Q5) Certificates are issued by a trusted third party called a(n)

10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Secure Wireless Transmissions

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21975

Sample Questions

Q1) The ____ is a protocol used to manage networked equipment.

A) PPTP

B) SNMP

C) FTP

D) L2TP

Q2) The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.

Q3) An enhanced feature of SSH is known as port forwarding, also called ____________________.

Q4) How does SSH port forwarding work?

Q5) ____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.

A) LCP

B) PPPoE

C) L2TP

D) IPsec

Q6) What are the drawbacks of using public key and private key encryption for transmitting documents?

Q7) How can a user access FTP?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Managing the Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21976

Sample Questions

Q1) The ____________________ governs the privacy of personal health information.

Q2) A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.

A) mobile sniffing audit

B) wireless probe

C) triangulation method

D) trilateration method

Q3) A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.

A) WLAN concentrator

B) AP concentrator

C) wireless intrusion prevention system (WIPS)

D) RF fingerprinter

Q4) How does the nearest sensor method work?

Q5) ____________________ measures the distance between three or more APs rather than the angles between them.

Q6) What are the disadvantages of using a WIDS?

Q7) Global positioning systems (GPS) are widely used in 802.11 WLANs.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Wireless Security Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21977

Sample Questions

Q1) A(n) ____ provides a visual image of the attacks that may occur against an asset.

A) asset tree

B) attack tree

C) asset modeling

D) asset identification

Q2) A(n) ____________________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.

Q3) ____________________ means that one person's work serves as a complementary check on another person's actions.

Q4) A(n) ____ is defined as any item that has a positive economic value.

A) risk

B) asset

C) threat

D) vulnerability

Q5) What are some of the factors to consider when determining the relative value of an asset?

Q6) The ALE is calculated by multiplying the SLE by the ____________________.

Q7) What are the characteristics of a policy?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Operational Support and Wireless Convergence

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21978

Sample Questions

Q1) IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

A) 802.11a

B) 802.11g

C) 802.11i

D) 802.11r

Q2) Briefly describe traffic filtering.

Q3) A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.

A)True

B)False

Q4) ____ allows computers and network equipment to gather data about network performance.

A) FTP

B) SNMP

C) SFTP

D) L2TP

Q5) Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook