DOC PREVIEW
EIU MIS 4850 - Security+ Certification Questions

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Page 1 of 2Security+ Certification QuestionsChapter 2: Wireless SecurityQUESTION NO: 1Which of the following do attackers most often use to identify the presence of an 801.11b network?a) War drivingb) Direct inward dialingc) War dialingd) Packet drivingQUESTION NO: 2What is the maximum data transmission rate of IEEE (Institute of Electrical and Electronics Engineers) 802.11b?a) 10 Mbps (Megabits per second)b) 10.5 Mbps (Megabits per second)c) 11 Mbps (Megabits per second)d) 12 Mbps (Megabits per second)QUESTION NO: 3Which of the following can be used to prevent intruders from using access points on a wireless network?a) ESP (Encapsulating Security Payload)b) WEP (Wired Equivalent Privacy)c) TLS (Transport Layer Security)d) SSL (Secure Sockets Layer)QUESTION NO: 4Which of the following provides privacy, data integrity and authentication for handled devices ina wireless network environment?a) WEP (Wired Equivalent Privacy)b) WAP (Wireless Application Protocol)c) WSET (Wireless Secure Electronic Transaction)d) WTLS (Wireless Transport Layer Security)QUESTION NO: 5Between which of the following does WTLS (Wireless Transport Layer Security) provides security services?a) A Web server.b) A mobile device.c) A client PC.d) A Wireless network interface card.e) A WAP (Wireless Application Protocol) gatewayMIS 4850 Systems SecurityPage 2 of 2QUESTION NO: 6Which of the following provides a WLAN (Wireless Local Area Network) with the level of security associated with a LAN (Local Area Network)?a) WEP (Wired Equivalent Privacy)b) ISSE (Information Systems Security Engineering)c) ISDN (Integrated Services Digital Network)d) VPN (Virtual Private Network)QUESTION NO: 7What should be done to secure the wireless network environment that uses access points as repeaters?a) Ensure that employees use complex passwords.b) Ensure that employees are only using issued wireless cards in their systems.c) Ensure that WEP (Wired Equivalent Privacy) is being used.d) Ensure that everyone is using adhoc mode.QUESTION NO: 8In a wireless network that uses WEP (Wired Equivalent Privacy) to provide wireless security, which of the following may authenticate to an access point?a) Only the administrator.b) Anyone can authenticate.c) Only users within the company.d) Only users with the correct WEP (Wired Equivalent Privacy) key.QUESTION NO: 9What is the purpose of WEP (Wired Equivalent Privacy)?a) To provide a WLAN (Wireless Local Area Network) with the same level of security as a wiredLAN (Local Area Network).b) To provide a collision preventive method of media access for a WLAN (Wireless Local Area Network).c) To provide a WLAN (Wireless Local Area Network) with a wider access area that that of a wired LAN (Local Area Network).d) To allow radio frequencies to penetrate walls.MIS 4850 Systems


View Full Document
Download Security+ Certification Questions
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security+ Certification Questions and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security+ Certification Questions 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?