1. In 802.11i ________, hosts must know a shared initial key. A. 802.1X mode B.
ID: 3758748 • Letter: 1
Question
1. In 802.11i ________, hosts must know a shared initial key.
A. 802.1X mode
B. PSK mode
C. both A and B
D. neither A nor B
2. Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
A. classic Bluetooth
B. high-speed Bluetooth
C. enterprise Bluetooth
D. none of the above
3. In which frequency band does NFC operate?
A. 2.4 GHz
B. 5 GHz
C. both A and B
D. neither A nor B
4. Which offers stronger security?
A. WPA
B. 802.11i
C. Both A and B offer equally strong security.
5. If a firm has many access points, it should use ________ mode in 802.11i.
A. PSK
B. 802.1X
C. IPsec
D. PEAP
6. A rogue access point is created by ________.
A. an employee
B. an external attacker
C. the IT security department
D. an evil twin
7. For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication.
A. always use the same preshared key each time it is connected
B. always use the same session key each time it is connected
C. both A and B
D. neither A nor B
8. An unauthorized internal access point is a(n) ________ access point.
A. evil twin
B. rogue
C. shadow
D. counterfeit
9. To drive around a city looking for working access points that are unprotected is ________.
A. drive-by hacking
B. war driving
10. A radio that has a power of 8 mW represents a ratio of about ________ dBm.
A. 2
B. 8
C. 9
D. 10
11. An 8/1 increase in power corresponds to approximately ________ decibels.
A. 3
B. 6
C. 20
D. none of the above
12. 1 Watt represents a dBm value of about ________.
A. 10
B. 20
C. 30
D. We cannot say because only one power is given.
13. Managed access points should ________.
A. allow access point power to be adjusted remotely
B. provide constant transmission quality monitoring
C. both A and B
D. neither A nor B
14. In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
A. 8
B. 12
C. 20
D. 128
15. Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A. Bluetooth input profile
B. Bluetooth I/O profile
C. human interface device profile
D. none of the above
16. Near-field communication has a maximum transmission distance of about ________.
A. 400 cm/200 in
B. 40 cm/20 in
C. 4 cm/2 in
D. The devices must be physically touching.
17. Which of the following is usually set up by a hacker outside the building?
A. a rogue access point
B. an evil twin access point
C. both A and B
D. neither A nor B
18. After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.
A. the preshared key
B. an 802.1X key
C. WPS keys
D. different session keys
19. Bluetooth is standardized by the ________.
A. 802.11 Working Group
B. Wi-Fi Alliance
C. Bluetooth Special Interest Group
D. none of the above
20. Part of WPS weakness is caused by ________.
A. 802.1X mode
B. WPA2 preshared key mode
C. dividing the 8 digit PIN into two 4 digit halves
D. IPsec
21. I wish to have a wireless LAN to serve my house. I will use ________.
A. 802.11
B. Bluetooth
C. either A or B
22. Passive RFID chips are powered by ________.
A. a battery
B. the sun
C. body temperature
D. the scanning unit
23. Breaking into WLANs from outside the premises is ________.
A. drive-by hacking
B. war driving
24. What is the strongest security protocol for 802.11 today?
A. 802.11i
B. 802.11s
C. 802.11X
D. WPA
25. In ________, the authenticator is the ________.
A. 802.1X, wireless access point
B. 802.11i, switch
C. 802.11i, wireless access point
D. 802.1X, central authentication server
A. 802.1X mode
B. PSK mode
C. both A and B
D. neither A nor B
2. Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
A. classic Bluetooth
B. high-speed Bluetooth
C. enterprise Bluetooth
D. none of the above
3. In which frequency band does NFC operate?
A. 2.4 GHz
B. 5 GHz
C. both A and B
D. neither A nor B
4. Which offers stronger security?
A. WPA
B. 802.11i
C. Both A and B offer equally strong security.
5. If a firm has many access points, it should use ________ mode in 802.11i.
A. PSK
B. 802.1X
C. IPsec
D. PEAP
6. A rogue access point is created by ________.
A. an employee
B. an external attacker
C. the IT security department
D. an evil twin
7. For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication.
A. always use the same preshared key each time it is connected
B. always use the same session key each time it is connected
C. both A and B
D. neither A nor B
8. An unauthorized internal access point is a(n) ________ access point.
A. evil twin
B. rogue
C. shadow
D. counterfeit
9. To drive around a city looking for working access points that are unprotected is ________.
A. drive-by hacking
B. war driving
10. A radio that has a power of 8 mW represents a ratio of about ________ dBm.
A. 2
B. 8
C. 9
D. 10
11. An 8/1 increase in power corresponds to approximately ________ decibels.
A. 3
B. 6
C. 20
D. none of the above
12. 1 Watt represents a dBm value of about ________.
A. 10
B. 20
C. 30
D. We cannot say because only one power is given.
13. Managed access points should ________.
A. allow access point power to be adjusted remotely
B. provide constant transmission quality monitoring
C. both A and B
D. neither A nor B
14. In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
A. 8
B. 12
C. 20
D. 128
15. Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A. Bluetooth input profile
B. Bluetooth I/O profile
C. human interface device profile
D. none of the above
16. Near-field communication has a maximum transmission distance of about ________.
A. 400 cm/200 in
B. 40 cm/20 in
C. 4 cm/2 in
D. The devices must be physically touching.
17. Which of the following is usually set up by a hacker outside the building?
A. a rogue access point
B. an evil twin access point
C. both A and B
D. neither A nor B
18. After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.
A. the preshared key
B. an 802.1X key
C. WPS keys
D. different session keys
19. Bluetooth is standardized by the ________.
A. 802.11 Working Group
B. Wi-Fi Alliance
C. Bluetooth Special Interest Group
D. none of the above
20. Part of WPS weakness is caused by ________.
A. 802.1X mode
B. WPA2 preshared key mode
C. dividing the 8 digit PIN into two 4 digit halves
D. IPsec
21. I wish to have a wireless LAN to serve my house. I will use ________.
A. 802.11
B. Bluetooth
C. either A or B
22. Passive RFID chips are powered by ________.
A. a battery
B. the sun
C. body temperature
D. the scanning unit
23. Breaking into WLANs from outside the premises is ________.
A. drive-by hacking
B. war driving
24. What is the strongest security protocol for 802.11 today?
A. 802.11i
B. 802.11s
C. 802.11X
D. WPA
25. In ________, the authenticator is the ________.
A. 802.1X, wireless access point
B. 802.11i, switch
C. 802.11i, wireless access point
D. 802.1X, central authentication server
Explanation / Answer
1.
In 802.11i PSK mode, hosts must know a shared initial key.
The correct option is B.
The 802.11i has a pre-shared key mode, which is designed for home and small office networks.
2.
The form of Bluetooth that has a typical transmission speed of about 24Mbps is high-speed Bluetooth.
The correct option is B.
The high-speed Bluetooth technology has a transmission speed of 24Mbps. This technology achieves faster throughput by making the use of secondary radio already present in the device.
3.
The frequency band that is operated by NFC is neither A or B
The correct option is D
The NFC operates in 13.56MHz. NFC is similar to Bluetooth but operates at slower speeds than Bluetooth.
4.
The stronger security is offered by 802.11i.
The correct option is B.
The 802.11i offers stronger security than WPA because WPA shares the shared key without the use of authentication server while 802.11i shares the shared key and requires a authentication server.
5.
If a firm has many access points, it should use 802.1X mode in 802.11i.
The correct option is B
When a firm has many access points, it should use 802.11i initial authentication mode 802.1X mode. This mode is called Enterprise mode. 802.1X authenticator is not an Ethernet switch but is an access point. Here, the communication is between access point and wireless supplicant.
6.
A rogue access point is created by an external attacker.
The correct option is B
It is a wireless access point installed on a secured network without authorization from a local network administrator by a malicious attacker
7.
For post authentication communication with an access point, the client in 802.11i PSK mode will be neither A nor B for subsequent communication.
The correct option is B
8.
An unauthorized internal access point is a(an) rogue access point.
The correct option is B
A rogue access point is a wireless access point that is installed on a wired enterprise network and this access point is not authorized from a local network administrator.
9.
To drive around a city looking for working access points that are unprotected is war driving.
The correct option is B
War driving is an act in which the wireless networks are searched by a person using a laptop/ smartphone. Through this act, the connections to wireless local area networks are exploited while driving around a city.
10.
A radio that has a power of 8MW represents a ratio of about 9 dBm
The correct option is C
11.
An 8/1 increase in power corresponds to approximately none of the above decibels
The correct option is D)
12.
1 Watt represents a dBm value of about 30dBm
The correct option is C
13
Managed access points should allow access point power to be adjusted remotely and provide constant transmission quality monitoring.
Thus, correct option is C
Managed access points provide wireless connectivity that is flexible, scalable and reliable.
14
In 802.11i PSK mode, the pass phrase should be at least 20 characters long.
The correct option is C
The paraphrases must be at least 8 characters long, however the characters which are recommended are at least 20 characters and contains numbers and special characters. According to IEEE 802.11i standard, the strong PSKs are entered as 63 character long hexadecimal strings.
15.
The Bluetooth profile used with a Bluetooth keyboard by the desktop is human interface device profile.
The correct option is C
16.
Near field communication has a maximum transmission distance of about 4cm/2in
The correct option is C
17
The point set up by a hacker outside the building is an evil twin access point.
The correct option is B
The evil twin access point is a Wi-fi access point that is established to eavesdrop on wireless communication. It is the copy of a legitimate access point and used to steal information by making the clients to hook to the fake network.
18.
After two wireless clients authenticate themselves via PSK to an access point, they will use different session keys to communicate with the access point.
The correct option is D
19.
Bluetooth is standardized by the Bluetooth Special Interest Group.
The correct option is C
The Bluetooth Special Interest Group is a cooperation / organization to define the new rules related to Bluetooth technology.
20.
Part of WPS weakness is caused by dividing the 8-digit PIN into two 4 digit halves.
The correct option is C
Since, the PIN number is sent in 2 halves, where the first half has 4 digits and second half has 4 digits. These halves are verified independently and it is a kind of weakness in the chain of Wi-Fi security
21.
If you wish to have a wireless LAN to serve the house, you will use either 802.11 or Bluetooth.
The correct option is C
22.
Passive RFID chips are powered by the scanning unit.
The correct option is D
The passive RFID tag has two main components-the tag’s antennae and the IC. It has no internal power source and it is not powered by battery.
23.
Breaking into WLANs from outside the premises is drive by hacking.
The correct option is A
The drive by hacking occurs when a hacker tricks into installing malicious software on the computer
24.
The strongest security protocol for 802.11 today is 802.11i
The correct option is A
The 802.11i uses new encryption key protocols known as Temporal Key Integrity Protocol and Advanced Encryption Standard.
25.
In 802.11X, the authenticator is the wireless access point.
The correct option is C
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.