Total No. of Questions = 20

1. WEP is designed to offer security comparable to which of the following?

  • A) Bluetooth
  • B) Wired networks
  • C) IrDA
  • D) IPv6

Show Answer

The Correct Answer is:- B

2. Which of the following operates at 5 GHz?

  • A) 802.11a
  • B) 802.11b
  • C) 802.11g
  • D) 802.11i

Show Answer

The Correct Answer is:- A

3. Which of the following specifies security standards for wireless?

  • A) 802.11a
  • B) 802.11b
  • C) 802.11g
  • D) 802.11i

Show Answer

The Correct Answer is:- D

4. Which of the following options shows the protocols in order from strongest to weakest?

  • A) WPA, WEP, WPA2, Open
  • B) WEP, WPA2, WPA, Open
  • C) Open, WPA, WPA2, WEP
  • D) WPA2, WPA, WEP, Open

Show Answer

The Correct Answer is:- D

5. Which of the following is designed to locate wireless access points?

  • A) Site survey
  • B) Traffic analysis
  • C) Pattern recognition
  • D) Cracking

Show Answer

The Correct Answer is:- A

6. What is a client-to-client wireless connection called?

  • A) Infrastructure
  • B) Client-server
  • C) Peer-to-peer
  • D) Ad hoc

Show Answer

The Correct Answer is:- D

7. When a wireless client is attached to an access point, it is known as which of the following?

  • A) Infrastructure
  • B) Client-server
  • C) Peer-to-peer
  • D) Ad hoc

Show Answer

The Correct Answer is:- A

8. Bluesnarfing is used to perform what type of attack?

  • A) Send spam text messages.
  • B) Read information from a device.
  • C) Deposit malware on a system.
  • D) Distribute files onto a system.

Show Answer

The Correct Answer is:- B

9. Monitor mode is used by wireless cards to do what?

  • A) Capture traffic from an associated wireless access point.
  • B) Capture information from ad hoc networks.
  • C) Capture information about wireless networks.
  • D) Capture traffic from access points.

Show Answer

The Correct Answer is:- C

10. A honeyspot is designed to do what?

  • A) Look for patterns of known attacks.
  • B) Look for deviations from known traffic patterns.
  • C) Attract victims to connect to it.
  • D) Analyze attacks patterns.

Show Answer

The Correct Answer is:- C

11. An SSID is used to do which of the following?

  • A) Identify a network.
  • B) Identify clients.
  • C) Prioritize traffic.
  • D) Mask a network.

Show Answer

The Correct Answer is:- A

12. AirPcap is used to do which of the following?

  • A) Assist in the sniffing of wireless traffic.
  • B) Allow network traffic to be analyzed.
  • C) Allow the identification of wireless networks.
  • D) Attack a victim.

Show Answer

The Correct Answer is:- A

13. What is a rogue access point?

  • A) An access point not managed by a company
  • B) An unmanaged access point
  • C) A second access point
  • D) A honeypot device

Show Answer

The Correct Answer is:- A

14. Bluejacking is a means of which of the following?

  • A) Tracking a device
  • B) Breaking into a device
  • C) Sending unsolicited messages
  • D) Crashing a device

Show Answer

The Correct Answer is:- C

15. The wardriving process involves which of the following?

  • A) Locating wireless networks
  • B) Breaking into wireless networks
  • C) Sniffing traffic
  • D) Performing spectrum analysis

Show Answer

The Correct Answer is:- A

16. Warchalking is used to do which of the following?

  • A) Discover wireless networks.
  • B) Hack wireless networks.
  • C) Make others aware of a wireless network.
  • D) Analyze a wireless network.

Show Answer

The Correct Answer is:- C

17. A closed network is typically which of the following?

  • A) Public network
  • B) Private network
  • C) Hot spot
  • D) Kiosk location

Show Answer

The Correct Answer is:- B

18. Which feature makes WPA easy to defeat?

  • A) AES encryption
  • B) WPS support
  • C) TKIP support
  • D) RC4 support

Show Answer

The Correct Answer is:- B

19. What is a PSK?

  • A) The password for the network
  • B) The certificate for the network
  • C) A key entered into each client
  • D) A distributed password for each user

Show Answer

The Correct Answer is:- C

20. Which of the following is a device used to perform a DoS on a wireless network?

  • A) WPA jammer
  • B) WPA2 jammer
  • C) WEP jammer
  • D) Wi-Fi jammer

Show Answer

The Correct Answer is:- D