You are on page 1of 4

WIRELESS AND MOBILE SECURITY

QUIZ 3 UC3F1511IT (ISS) MSB- CT094-3.5-3-WMSS


-------------------------------------------------------Submit
the
answers
to
cwspsubmission@gmail.com

the

following

e-mail

address

1. The IEEE 802.11 - 2007 standard mandates encryption for robust security
network associations and the optional use of encryption.
A. WEP, AES
B. IPsec, AES
C. MPPE, TKIP
D. TKIP, WEP
E. CCMP, TKIP
2. What wireless security solutions are defined by Wi - Fi Protected Access?
(Choose all that apply.)
A. Passphrase authentication
B. LEAP
C. TKIP/RC4
D. Dynamic WEP
E. CCMP/AES
3. Which wireless security standards and certifications call for the use of
CCMP/AES encryption? (Choose all that apply.)
A. WPA
B. 802.11 - 2007
C. 802.1X
D. WPA2
E. 802.11 legacy
4. A robust security network (RSN) requires the use of which security
mechanisms? (Choose all that apply.)
A. 802.11x
B. WEP
C. IPSec
D. CCMP/AES
E. CKIP
F. 802.1X
5. The Wi - Fi Alliance is responsible for which of the following certification
programs? (Choose all that apply.)
A. WPA2
B. WEP

C. 802.11 - 2007
D. WMM
E. PSK
6. Which sublayer of the OSI model s Data - Link layer is used for
communication between 802.11 radios?
A. LLC
B. WPA
C. MAC
D. FSK
7. What encryption methods are defined by the IEEE 802.11 - 2007
standard? (Choose all that apply.)
A. 3DES
B. WPA - 2
C. SSL
D. TKIP
E. CCMP
F. WEP
8. Which organization is responsible for the creation of documents known as
Requests for Comments?
A. IEEE
B. ISO
C. IETF
D. Wi - Fi Alliance
E. RFC Consortium
9. Which of the following is not a standard or amendment created by the
IEEE? (Choose all that apply.)
A. 802.11X
B. 802.1x
C. 802.3af
D. 802.11N
E. 802.11g
10. TKIP can be used with which of the following? (Choose all that apply.)
A. WEP
B. WPA - Personal
C. WPA - Enterprise
D. WPA - 2 Personal
E. WPA - 2 Enterprise
F. 802.11 - 2007 (RSN)
11. Which of the following is simply a way of representing information in a
different way?

A. Cryptography
B. Steganography
C. Encryption
D. Cipher
E. Code
12. What wireless security components are mandatory under WPA version 2?
(Choose all that apply.)
A. 802.1X/EAP
B. PEAP
C. TKIP/RC4
D. Dynamic WEP
E. CCMP/AES
13. The 802.11i ratified security amendment can now be found in which
clause of the 802.11 2007 standard?
A. Clause 8
B. Clause 14
C. Clause 15
D. Clause 17
E. Clause 33
14. The science of concealing plaintext and then revealing it is known as ,
and the science of decrypting the ciphertext without knowledge of the key or
cipher is known as.
A. encryption, decryption
B. cryptanalysis, cryptology
C. cryptology, cryptanalysis
D. cryptography, cryptanalysis
E. cryptography, steganography
15. What is the chronological order in which the following security standards
and certifications were defined?
1. 802.11 - 2007
2. 802.11i
3. WEP
4. WPA 2
5. WPA
A. 3, 5, 2, 4, 1
B. 3, 2, 5, 4, 1
C. 3, 5, 2, 1, 4
D. 1, 3, 2, 5, 4
E. 1, 3, 5, 4, 2
16. The 802.11 legacy standard defines which wireless security solution?

A. Dynamic WEP
B. 802.1X/EAP
C. 64 - bit static WEP
D. Temporal Key Integrity Protocol
E. CCMP/AES
17. These qualifications for interoperability are usually based on key
components and functions that are defined in the IEEE 802.11 - 2007
standard and various 802.11 amendments.
A. Request for comments
B. Wi - Fi Alliance
C. Federal Information Processing Standards
D. Internet Engineering Task Force
E. Wi - Fi CERTIFIED
18. Which of the following can be used with a wireless network to segment
or restrict access to parts of the network? (Choose all that apply.)
A. VLANs
B. WPA - 2
C. Firewall
D. 802.11i
E. RBAC
19. 802.1X/EAP is mandatory in which of the following? (Choose all that
apply.)
A. WPA SOHO
B. WPA Enterprise
C. WPA - 2 SOHO
D. WPA - 2 Enterprise
E. WPA2 PSK
20. The objective of delivering management frames in a secure manner is
defined by which
802.11 amendment?
A. 802.11r - 2008
B. 802.11w - 2009
C. 802.11n - 2009
D. 802.11x - 2009
E. 802.11k - 2008

You might also like