1. WEP is designed to offer security comparable to which of the following?
- A) Bluetooth
- B) Wired networks
- C) IrDA
- D) IPv6
Show Answer
2. Which of the following operates at 5 GHz?
- A) 802.11a
- B) 802.11b
- C) 802.11g
- D) 802.11i
Show Answer
3. Which of the following specifies security standards for wireless?
- A) 802.11a
- B) 802.11b
- C) 802.11g
- D) 802.11i
Show Answer
4. Which of the following options shows the protocols in order from strongest to weakest?
- A) WPA, WEP, WPA2, Open
- B) WEP, WPA2, WPA, Open
- C) Open, WPA, WPA2, WEP
- D) WPA2, WPA, WEP, Open
Show Answer
5. Which of the following is designed to locate wireless access points?
- A) Site survey
- B) Traffic analysis
- C) Pattern recognition
- D) Cracking
Show Answer
6. What is a client-to-client wireless connection called?
- A) Infrastructure
- B) Client-server
- C) Peer-to-peer
- D) Ad hoc
Show Answer
7. When a wireless client is attached to an access point, it is known as which of the following?
- A) Infrastructure
- B) Client-server
- C) Peer-to-peer
- D) Ad hoc
Show Answer
8. Bluesnarfing is used to perform what type of attack?
- A) Send spam text messages.
- B) Read information from a device.
- C) Deposit malware on a system.
- D) Distribute files onto a system.
Show Answer
9. Monitor mode is used by wireless cards to do what?
- A) Capture traffic from an associated wireless access point.
- B) Capture information from ad hoc networks.
- C) Capture information about wireless networks.
- D) Capture traffic from access points.
Show Answer
10. A honeyspot is designed to do what?
- A) Look for patterns of known attacks.
- B) Look for deviations from known traffic patterns.
- C) Attract victims to connect to it.
- D) Analyze attacks patterns.
Show Answer
11. An SSID is used to do which of the following?
- A) Identify a network.
- B) Identify clients.
- C) Prioritize traffic.
- D) Mask a network.
Show Answer
12. AirPcap is used to do which of the following?
- A) Assist in the sniffing of wireless traffic.
- B) Allow network traffic to be analyzed.
- C) Allow the identification of wireless networks.
- D) Attack a victim.
Show Answer
13. What is a rogue access point?
- A) An access point not managed by a company
- B) An unmanaged access point
- C) A second access point
- D) A honeypot device
Show Answer
14. Bluejacking is a means of which of the following?
- A) Tracking a device
- B) Breaking into a device
- C) Sending unsolicited messages
- D) Crashing a device
Show Answer
15. The wardriving process involves which of the following?
- A) Locating wireless networks
- B) Breaking into wireless networks
- C) Sniffing traffic
- D) Performing spectrum analysis
Show Answer
16. Warchalking is used to do which of the following?
- A) Discover wireless networks.
- B) Hack wireless networks.
- C) Make others aware of a wireless network.
- D) Analyze a wireless network.
Show Answer
17. A closed network is typically which of the following?
- A) Public network
- B) Private network
- C) Hot spot
- D) Kiosk location
Show Answer
18. Which feature makes WPA easy to defeat?
- A) AES encryption
- B) WPS support
- C) TKIP support
- D) RC4 support
Show Answer
19. What is a PSK?
- A) The password for the network
- B) The certificate for the network
- C) A key entered into each client
- D) A distributed password for each user
Show Answer
20. Which of the following is a device used to perform a DoS on a wireless network?
- A) WPA jammer
- B) WPA2 jammer
- C) WEP jammer
- D) Wi-Fi jammer