You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?
A. TKIP
B. WPA
C. WPA 2
D. WEP
A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?
A. None, adding a wireless access point is a common task and not a security risk.
B. An unauthorized WAP is one way for hackers to get into a network.
C. This circumvents network intrusion detection.
D. It is likely to increase network traffic and slow down network performance.
Which of the following types of network is described in the statement below? "It represents a wireless network that connects two or more wireless LANs in the same geographical area. These networks are used as backbone services as well as point-to- point and point-to-multipoint links, which are implemented using high-speed connections such as T1, T3, etc."
A. WPAN
B. WMAN
C. WLAN
D. WWAN
Which of the following authentication methods is used by wireless LANs and follows the IEEE 802.11 standard?
A. Shared key authentication
B. Digest authentications
C. Integrated Windows authentication
D. Operating system authentication
E. External authentication
F. Password file authentication
Which of the following can be a reason of low throughput in an 802.11g wireless network?
A. Low access point output power
B. High access point output power
C. The degree of closeness of the clients to the access points
D. A large number of associated client devices
How many unlicensed UNII-1 band channels are available for wireless LANs?
A. 4
B. 11
C. 14
D. 9
In which of the following layers of the OSI model do wireless repeaters work?
A. Layer 7
B. Layer 1
C. Layer 1 and Layer 2
D. Layer 2
Which of the following standards of IEEE defines the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) method used in Ethernet networks?
A. 802.7
B. 802.2
C. 802.12
D. 802.8
E. 802.3
F. 802.1
Which of the following security options is required to connect to a workplace network?
A. Wired Equivalent Privacy 2 (WEP2)
B. Wired Equivalent Privacy (WEP)
C. 802.1x authentication
D. Wi-Fi Protected Access
Which of the following statements is true about the role-based access control (RBAC) model?
A. In this model, the permissions are uniquely assigned to each user account.
B. In this model, the same permission is assigned to each user account.
C. In this model, a user can access resources according to his role in the organization.
D. In this model, the users can access resources according to their seniority.