Site MapHelpFeedbackSelf-Assessment Quiz
Self-Assessment Quiz
(See related pages)

Wireless Security

1
Why does WTLS support short key lengths?
A)Security is not necessary in mobile phones.
B)The algorithm doesn't gain any security with longer keys.
C)Longer keys cannot be used with the WTLS protocol.
D)WTLS has to support devices with low processor power and limited RAM.
2
Why should wireless have strong two-way authentication?
A)So that only the executives can use the wireless system.
B)Because wireless is especially susceptible to a man-in-the-middle attack.
C)Because you want to know when you are being attacked.
D)Strong authentication is needed so that all virus definitions are checked on the client computer.
3
Why is 802.11 wireless more of a security problem than any other type of network?
A)It has more readily readable frames.
B)It provides access to the physical layer of Ethernet without needing physical access to the building.
C)It is the only network that allows sniffing of the traffic.
D)It draws too much power and the other servers reboot.
4
Bluebugging can give an attacker what?
A)All of your contacts
B)The ability to send "shock" photos
C)Total control over a mobile phone
D)A virus
5
How does 802.11n improve network speed?
A)Wider bandwidth
B)Higher frequency
C)Multiple-input Multiple-output (MIMO)
D)Both A and C
6
WTLS ensures integrity through what device?
A)Public key encryption
B)Message authentication codes
C)Source IP
D)Digital signatures
7
WEP has used an implementation of which of the following encryption algorithms?
A)SHA
B)ElGamal
C)RC4
D)Triple-DES
8
How are the security parameters of WTLS chosen between two endpoints?
A)Only one option exists for every parameter.
B)The client dictates all parameters to the server.
C)The user codes the parameters through DTMF tones.
D)The WTLS handshake determines what parameters to use.
9
What is bluejacking?
A)Stealing a person's mobile phone
B)Sending an unsolicited message via Bluetooth
C)Breaking a WEP key
D)Leaving your Bluetooth in discoverable mode
10
Why is it important to scan your own organization for wireless?
A)It can detect rogue access points.
B)It checks the installed encryption.
C)It finds vulnerable mobile phones.
D)It checks for wireless coverage.
11
While the SSID provides some measure of authentication, why is it not very effective?
A)It is dictated by the manufacturer of the access point.
B)It is encrypted.
C)It is broadcast in every beacon frame.
D)SSID is not an authentication function.
12
The 802.1X protocol is a new protocol for Ethernet:
A)Authentication
B)Speed
C)Wireless
D)Cabling
13
What is the best way to avoid problems with Bluetooth?
A)Keep personal info off your phone
B)Keep Bluetooth discoverability off
C)Buy a new phone often
D)Encryption
14
Why is attacking wireless networks so popular?
A)There are more wireless networks than wired.
B)They all run Windows.
C)It's easy.
D)It's more difficult and more prestigious than other network attacks.
15
What two key lengths do most implementations of WEP support?
A)64 and 56
B)104 and 40
C)512 and 256
D)1024 and 2048







Conklin Computer Security, 3EOnline Learning Center

Home > Chapter 12 > Self-Assessment Quiz