Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

Which of the following principles provides reliable information?
A)Accounting
B)Authentication
C)Confidentiality
D)Integrity
2

Which of the following security principles is ensured by digital certificates?
A)Authentication
B)Availability
C)Confidentiality
D)Integrity
3

The ____ protocol operates in the 2.4 GHz band and uses DSSS.
A)802.11a
B)802.11b
C)802.11g
D)802.16
4

The 802.11a protocol operates in the 5 GHZ spectrum using the ____ encoding scheme.
A)DSSS
B)FHSS
C)OFDM
D)TLS
5

Which of the following reasons does NOT make wireless systems popular as a target?
A)The attacker's anonymity is not threatened.
B)The easy access gained to wireless systems.
C)The high cost of equipment required for access.
D)The lack of default security on wireless systems.
6

Which of the following tools is NOT a wireless sniffer?
A)AiroPeek
B)Ethereal
C)Trillian
D)WildPackets
7

Which of the following statements about instant messaging (IM) is true?
A)All IM programs support encryption.
B)IM cannot be used to send files as attachments.
C)IM identifies a specific user with each IP address.
D)The file sharing utility has a built-in virus scanner.
8

Which of the following attacks works on the principle of predictable initialization vectors?
A)Alert message truncation attack
B)Denial-of-Service attack
C)PKCS #1 attack
D)Plaintext attack
9

WEP uses ____ to encrypt data as it is transmitted through air.
A)RC2
B)RC4
C)RC5
D)RC6
10

Which of the following protocols uses a two-way authentication mechanism and can operate only on CISCO equipment?
A)EAP-MD5
B)EAP-TLS
C)EAP-TTLS
D)LEAP







Security+ and BeyondOnline Learning Center

Home > Chapter 12 > Multiple Choice Quiz