Page 1 of 2Security+ Certification QuestionsChapter 2: Wireless SecurityQUESTION NO: 1Which of the following do attackers most often use to identify the presence of an 801.11b network?a) War drivingb) Direct inward dialingc) War dialingd) Packet drivingQUESTION NO: 2What is the maximum data transmission rate of IEEE (Institute of Electrical and Electronics Engineers) 802.11b?a) 10 Mbps (Megabits per second)b) 10.5 Mbps (Megabits per second)c) 11 Mbps (Megabits per second)d) 12 Mbps (Megabits per second)QUESTION NO: 3Which of the following can be used to prevent intruders from using access points on a wireless network?a) ESP (Encapsulating Security Payload)b) WEP (Wired Equivalent Privacy)c) TLS (Transport Layer Security)d) SSL (Secure Sockets Layer)QUESTION NO: 4Which of the following provides privacy, data integrity and authentication for handled devices ina wireless network environment?a) WEP (Wired Equivalent Privacy)b) WAP (Wireless Application Protocol)c) WSET (Wireless Secure Electronic Transaction)d) WTLS (Wireless Transport Layer Security)QUESTION NO: 5Between which of the following does WTLS (Wireless Transport Layer Security) provides security services?a) A Web server.b) A mobile device.c) A client PC.d) A Wireless network interface card.e) A WAP (Wireless Application Protocol) gatewayMIS 4850 Systems SecurityPage 2 of 2QUESTION NO: 6Which of the following provides a WLAN (Wireless Local Area Network) with the level of security associated with a LAN (Local Area Network)?a) WEP (Wired Equivalent Privacy)b) ISSE (Information Systems Security Engineering)c) ISDN (Integrated Services Digital Network)d) VPN (Virtual Private Network)QUESTION NO: 7What should be done to secure the wireless network environment that uses access points as repeaters?a) Ensure that employees use complex passwords.b) Ensure that employees are only using issued wireless cards in their systems.c) Ensure that WEP (Wired Equivalent Privacy) is being used.d) Ensure that everyone is using adhoc mode.QUESTION NO: 8In a wireless network that uses WEP (Wired Equivalent Privacy) to provide wireless security, which of the following may authenticate to an access point?a) Only the administrator.b) Anyone can authenticate.c) Only users within the company.d) Only users with the correct WEP (Wired Equivalent Privacy) key.QUESTION NO: 9What is the purpose of WEP (Wired Equivalent Privacy)?a) To provide a WLAN (Wireless Local Area Network) with the same level of security as a wiredLAN (Local Area Network).b) To provide a collision preventive method of media access for a WLAN (Wireless Local Area Network).c) To provide a WLAN (Wireless Local Area Network) with a wider access area that that of a wired LAN (Local Area Network).d) To allow radio frequencies to penetrate walls.MIS 4850 Systems
View Full Document