

![]()


Network Security is an essential course that introduces students to the principles, technologies, and practices used to protect digital networks and information systems against unauthorized access, misuse, and cyber threats. The course covers key concepts such as cryptography, authentication, firewalls, intrusion detection systems, and secure network protocols. Students will learn how to identify vulnerabilities, employ security measures, and assess risks in modern network environments. Through theoretical instruction and practical exercises, the course prepares participants to design, implement, and manage secure communication infrastructures, equipping them with the foundational knowledge necessary for roles in cybersecurity and related fields.
Recommended Textbook
CWSP Guide to Wireless Security 1st Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1118 Page 2
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21967
Sample Questions
Q1) Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.
A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
Answer: C
Q2) ____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.
A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
Answer: D
Q3) The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Answer: information security
To view all questions and flashcards with answers, click on the resource link above.

Page 3

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21968
Sample Questions
Q1) WEP relies on a secret key shared between a wireless client device and the access point.
A)True
B)False
Answer: True
Q2) Describe the main characteristics of the open system authentication method.
Answer: There are two types of authentication supported by the 802.11 standard. Open system authentication is the default method. A device discovers a wireless network in the vicinity through scanning the radio frequency and sends a frame known as an association request frame to the AP. The frame carries information about the data rates that the device can support along with the Service Set Identifier (SSID) of the network it wants to join. The SSID serves as the "network name" for the wireless network and can be any alphanumeric string from 2 to 32 characters. After receiving the association request frame, the access point compares the SSID received with the actual SSID of the network. If the two match then the wireless device is authenticated.
Q3) The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the
Answer: default key
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21969
Sample Questions
Q1) The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
Answer: Trilateration
Q2) ____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.
A) Kismet
B) KisMAC
C) WZC
D) GPSMac
Answer: A
Q3) A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.
Answer: promiscuous mode
Q4) The informal expression used more often for searching for RF signals is ____.
A) phishing
B) pharming
C) beaconing
D) wardriving
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21970
Sample Questions
Q1) ____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.
A) Identity theft
B) Spam
C) DoS attack
D) Phishing
Q2) ____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.
A) Logic bomb
B) Adware
C) Spam
D) Phishing
Q3) An incorrect configuration of wireless hardware or software can often result in easy access to a system.
A)True
B)False
Q4) With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21971
Sample Questions
Q1) In 802.1x, the ____ is the wireless device that requires secure network access.
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Q2) Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.
A) block cipher
B) chain cipher
C) text cipher
D) CRC cipher
Q3) ____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
A) AES
B) RC4
C) Block cipher
D) Port security
Q4) AES is designed to be an encryption technique that is secure from attacks.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21972
Sample Questions
Q1) In EDCA, the four different streams, called ____, are differentiated in terms of priority.
A) port categories
B) access ports
C) access categories (AC)
D) port filters
Q2) The IEEE ____ standard is designed to enable WLAN devices to share the 5 GHz spectrum with other devices such as military radar systems.
A) 802.11e
B) 802.11h
C) 802.11i
D) 802.11r
Q3) What are some of the features of the IEEE 802.11v protocol?
Q4) A(n) ____ wireless mesh network connects special access points, known as wireless mesh routers, in a mesh configuration.
A) managed
B) backhaul
C) ad hoc
D) unmanaged
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21973
Sample Questions
Q1) The foundation of a firewall is a(n) ____________________.
Q2) ____ looks at the incoming packet and permits or denies it based strictly on the rule base.
A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
Q3) Sending a packet to all network devices is called a ____ transmission.
A) unicast
B) multicast
C) broadcast
D) singlecast
Q4) What is security by obscurity?
Q5) When a sending device on a LAN sends a packet that is intended for a single receiving device it is known as a ____ transmission.
A) multicast
B) unicast
C) broadcast
D) linecast
Q6) How does Microsoft classify patches?
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21974
Sample Questions
Q1) With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.
A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
Q2) ____ uses the unique human characteristics of a person for authentication (something the user is).
A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
Q3) LEAP is not vulnerable to dictionary attack tools.
A)True
B)False
Q4) Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
Q5) Certificates are issued by a trusted third party called a(n)
10
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21975
Sample Questions
Q1) The ____ is a protocol used to manage networked equipment.
A) PPTP
B) SNMP
C) FTP
D) L2TP
Q2) The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
Q3) An enhanced feature of SSH is known as port forwarding, also called ____________________.
Q4) How does SSH port forwarding work?
Q5) ____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.
A) LCP
B) PPPoE
C) L2TP
D) IPsec
Q6) What are the drawbacks of using public key and private key encryption for transmitting documents?
Q7) How can a user access FTP?
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21976
Sample Questions
Q1) The ____________________ governs the privacy of personal health information.
Q2) A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.
A) mobile sniffing audit
B) wireless probe
C) triangulation method
D) trilateration method
Q3) A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.
A) WLAN concentrator
B) AP concentrator
C) wireless intrusion prevention system (WIPS)
D) RF fingerprinter
Q4) How does the nearest sensor method work?
Q5) ____________________ measures the distance between three or more APs rather than the angles between them.
Q6) What are the disadvantages of using a WIDS?
Q7) Global positioning systems (GPS) are widely used in 802.11 WLANs.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21977
Sample Questions
Q1) A(n) ____ provides a visual image of the attacks that may occur against an asset.
A) asset tree
B) attack tree
C) asset modeling
D) asset identification
Q2) A(n) ____________________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
Q3) ____________________ means that one person's work serves as a complementary check on another person's actions.
Q4) A(n) ____ is defined as any item that has a positive economic value.
A) risk
B) asset
C) threat
D) vulnerability
Q5) What are some of the factors to consider when determining the relative value of an asset?
Q6) The ALE is calculated by multiplying the SLE by the ____________________.
Q7) What are the characteristics of a policy?
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21978
Sample Questions
Q1) IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.
A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
Q2) Briefly describe traffic filtering.
Q3) A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
A)True
B)False
Q4) ____ allows computers and network equipment to gather data about network performance.
A) FTP
B) SNMP
C) SFTP
D) L2TP
Q5) Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 14