Chapter 8 Wireless Networks 2
100) The fact that smart phones can connect to corporate LANs is often advantageous economically for ________. A) cellular users who pay by the minute B) cellular users who pay a flat fee for unlimited service C) Both A and B D) Neither A nor B
Answer: A
101) Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network. A) True. B) False.
Answer: A
102) Some smart phones can act as wireless access points. A) True. B) False.
Answer: A
12) 802.11i is attractive compared with WPA because ________. A) 802.11i offers stronger security B) 802.11i offers quality of service C) many older devices can be upgraded to 802.11i D) 802.11i was standardized by the Wi-Fi Alliance E) All of the above.
Answer: A
14) 802.11i offers stronger security than WPA. A) True. B) False.
Answer: A
15) What is the strongest security protocol for 802.11 today? A) 802.11i. B) 802.11s. C) 802.11X. D) WPA. E) WEP.
Answer: A
2) Breaking into WLANs is ________. A) drive-by hacking B) war driving
Answer: A
20) WPA has been partially cracked. A) True. B) False.
Answer: A
21) In what mode of 802.11i operation is a central authentication server used? A) 802.1X mode. B) PSK mode. C) Both A and B D) Neither A nor B
Answer: A
26) 802.1X needs security between the authenticator and the computer in 802.11 wireless access. A) True. B) False.
Answer: A
30) The most popular standard for extended 802.1X security is PEAP. A) True. B) False.
Answer: A
34) A notebook computer configured to act like a real access point is a(n) ________. A) evil twin access point B) rogue access point C) Both A and B
Answer: A
38) An evil twin access point can launch attacks against the corporate network. A) True. B) False.
Answer: A
4) A rogue access point is an unauthorized access point. A) True. B) False.
Answer: A
41) Initial WLAN planning begins with drawing circles on building architecture drawings. A) True. B) False.
Answer: A
47) As much as possible, WLAN management software should be able to work automatically, taking as many actions as possible without user intervention. A) True. B) False.
Answer: A
48) I wish to have a wireless LAN to serve my house. I will use ________. A) 802.11 B) Bluetooth C) Either A or B
Answer: A
50) Bluetooth is used for cable replacement. A) True. B) False.
Answer: A
53) Bluetooth does not use access points. A) True. B) False.
Answer: A
54) ________ uses access points. A) 802.11 B) Bluetooth C) Both A and B D) Neither A nor B
Answer: A
56) Bluetooth offers a rated speed today of about ________. A) 3 Mbps B) 11 Mbps C) 22 Mbps D) 54 Mbps E) 100 Mbps
Answer: A
58) The normal maximum distance for Bluetooth propagation is ________. A) 10 meters B) 30 meters C) 50 meters D) 100 meters
Answer: A
59) Which of the following gives longer battery life? A) Bluetooth. B) 802.11.
Answer: A
61) Application profiles are attractive because they allow devices to work with one another automatically at the application layer. A) True. B) False.
Answer: A
63) If a pair of Bluetooth devices switch to 802.11 radio transmission, they can transmit at tens of megabits per second. A) True. B) False.
Answer: A
64) Bluetooth is faster than ZigBee. A) True. B) False.
Answer: A
69) Which of the following tends to have faster speeds? A) Wireless LANs. B) Wireless WANs. C) They generally have about the same speed.
Answer: A
71) Most wireless WANs operate in a single metropolitan area. A) True. B) False.
Answer: A
72) A ________ serves a city and its suburbs. A) MAN B) PAN C) Both A and B D) Neither A nor B
Answer: A
73) In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) Both A and B D) Neither A nor B
Answer: A
76) Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater speed D) reduced latency E) All of the above.
Answer: A
77) Cellular technology provides channel reuse, in different cells in the network. A) True. B) False.
Answer: A
80) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with CDMA cellular technology. A) True. B) False.
Answer: A
82) When a cellular customer moves from one city to another, this is ________. A) roaming B) a handoff C) Both A and B D) Neither A nor B
Answer: A
86) Mobile phones that do far more than traditional telephones (such as providing web access) are called ________. A) smart phones B) cellsites C) codecs
Answer: A
88) 1G cellular technology uses analog transmission. A) True. B) False.
Answer: A
89) Which of the following was limited to 10 kbps? A) 2G. B) 3G. C) 4G. D) None of the above.
Answer: A
96) Which 4G technology do most carriers intend to use? A) LTE. B) WiMAX. C) Both A and B D) Neither A nor B
Answer: A
1) To drive around a city looking for working access points that are unprotected is ________. A) drive-by hacking B) war driving
Answer: B
11) WPA was created by the Internet Engineering Task Force. A) True. B) False.
Answer: B
13) Which of the above offers stronger security? A) WPA. B) 802.11i. C) Both A and B offer equally strong security.
Answer: B
17) 802.11i and WPA are different names for the same standard. A) True. B) False.
Answer: B
19) 802.11i uses WEP as its encryption method. A) True. B) False.
Answer: B
22) A central authentication server is used in 802.11i PSK mode. A) True. B) False.
Answer: B
24) 802.1X needs security between the authenticator and the computer in ________. A) Ethernet B) 802.11i C) Both A and B D) Neither A nor B
Answer: B
25) 802.1X needs security between the authenticator and the computer in Ethernet. A) True. B) False.
Answer: B
27) The security in 802.1X is sufficient for its direct use in 802.11 WLANs. A) True. B) False.
Answer: B
28) Which of the following is NOT a security extension to EAP? A) EAP-TTLS. B) MS-EAP. C) PEAP.
Answer: B
3) An unauthorized internal access point is a(n) ________. A) evil twin access point B) rogue access point C) Both A and B
Answer: B
31) In 802.11i ________, hosts must know a shared key. A) 802.1X mode B) PSK mode C) Both A and B D) Neither A nor B
Answer: B
32) PSK mode automatically prevents the use of weak keys. A) True. B) False.
Answer: B
35) A notebook computer configured to act like a real access point is a rogue access point. A) True. B) False.
Answer: B
36) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s). A) one B) two C) four D) sixteen
Answer: B
39) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs. B) VPNs. C) PEAP. D) IPsec. E) SSL/TLS.
Answer: B
42) Centralized access point management ________. A) increases management costs but provides better control B) reduces management costs
Answer: B
43) Centralized access point management raises management costs. A) True. B) False.
Answer: B
49) Bluetooth is for ________. A) large WLANs B) cable replacement C) Both A and B D) Neither A nor B
Answer: B
51) Which of the following was created for PANs? A) 802.11. B) Bluetooth. C) Both A and B D) Neither A nor B
Answer: B
55) Bluetooth uses ________. A) access points B) peer-to-peer connections between devices C) Both A and B D) Neither A nor B
Answer: B
57) Bluetooth offers very high transmission speeds. A) True. B) False.
Answer: B
6) What security protocol originally came with 802.11 equipment? A) WPA. B) WEP. C) Both A and B D) Neither A nor B
Answer: B
65) 802.11 is faster than UWB. A) True. B) False.
Answer: B
7) How long does it take an attacker to crack WEP today with readily available software? A) About ten seconds. B) About ten minutes. C) About ten hours. D) About ten days. E) WEP cannot be cracked with readily available software.
Answer: B
70) Wireless WANs tend to have faster speeds than Wireless LANs. A) True. B) False.
Answer: B
74) In cellular technology, a cellsite is a small geographical area. A) True. B) False.
Answer: B
78) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________. A) traditional cellular technology B) CDMA C) Both A and B D) Neither A nor B
Answer: B
79) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology. A) True. B) False.
Answer: B
8) WEP is so strong that it cannot be cracked with readily available software. A) True. B) False.
Answer: B
81) When a cellular customer moves from one cell in a city to another cell in the same city, this is ________. A) cell switching B) a handoff C) cell hopping D) roaming E) cell reuse
Answer: B
83) Which of the following is true? A) "Roaming" means the same thing in cellular and 802.11 networks. B) "Handoff" means the same thing in cellular and 802.11 networks. C) Both A and B are true.
Answer: B
84) "Handoff" means the same thing in cellular and 802.11 networks. A) True. B) False.
Answer: B
87) ________ cellular technology uses digital transmission. A) 1G B) 2G C) Both A and B D) Neither A nor B
Answer: B
9) WEP is a strong core security protocol. A) True. B) False.
Answer: B
90) ________ cellular service typically provides speeds of 300 to 500 kbps. A) 2G B) 3G C) 4G D) None of the above.
Answer: B
98) By regulation, cellular systems must give almost the same throughput at different times during the day. A) True. B) False
Answer: B
99) By regulation, cellular systems must give almost the same throughput at different places in their service areas. A) True. B) False
Answer: B
18) 802.11i uses ________ as its encryption method. A) RC4 B) 802.11s C) AES-CCMP D) WPA
Answer: C
23) The Wi-Fi Alliance refers to 802.1X mode as ________ mode. A) AES B) PSK C) enterprise D) EAP
Answer: C
29) The most popular standard for extended 802.1X security is ________. A) EAP-TTLS B) MS-EAP C) PEAP
Answer: C
33) In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 6 B) 8 C) 20 D) 40 E) 128
Answer: C
40) In VPNs designed to frustrate evil twin attacks, the shared secret ________. A) is transmitted in the clear B) is transmitted with cryptographic protections C) is not transmitted D) Any of the above.
Answer: C
44) Which of the following can be used to centrally manage remote access points? A) Smart access points. B) WLAN switches. C) Both A and B D) Neither A nor B
Answer: C
45) Managed access points should ________. A) allow access point power to be adjusted remotely B) provide constant transmission quality monitoring C) Both A and B D) Neither A nor B
Answer: C
46) Managed access points should ________. A) identify rogue access points B) be able to push updates out to access points C) Both A and B D) Neither A nor B
Answer: C
52) Bluetooth is commonly used for ________. A) wireless mice B) wireless headphones C) Both A and B D) Neither A nor B
Answer: C
66) ________ normally is limited to about 10 meters. A) Bluetooth B) 802.11 C) Both A and B D) Neither A nor B
Answer: C
68) ________ is an approach for implementing multiple radio technologies in a single device at reduced cost. A) UWB B) ZigBee C) Software defined radio D) Agile radio E) Bluetooth
Answer: C
75) An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B D) Neither A nor B
Answer: C
92) What is the planned long-term speed of 3G service for mobile devices? A) 1 Mbps. B) 10 Mbps. C) 100 Mbps. D) 1 Gbps.
Answer: C
93) For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access? A) 1G. B) 2G. C) 3G. D) 4G.
Answer: C
95) Which of the following is one of the initial technologies being used by carriers for 4G service? A) LTE. B) WiMAX. C) Both A and B D) Neither A nor B
Answer: C
97) Which 4G technology will bring download speeds of 1 Gbps to stationary customers? A) LTE Advanced. B) 802.16m. C) Both A and B D) Neither A nor B
Answer: C
37) What damage can an evil twin access point do? A) Eavesdrop on communication. B) Steal important keys or other information transmitted by the client. C) Launch attacks against corporate servers. D) All of the above. E) Only A and B
Answer: D
5) What security protocol originally came with 802.11 equipment? A) 802.11e. B) 802.11i. C) WPA. D) WEP.
Answer: D
60) Bluetooth is designed to transmit ________. A) at high speeds B) over long distances C) Both A and B D) Neither A nor B
Answer: D
62) Which of the following uses application profiles? A) 802.11a. B) 802.11g. C) All 802.11 networks. D) Bluetooth. E) All of the above.
Answer: D
67) What technology could replace universal product code (bar code) tags on products? A) 802.11. B) Bluetooth. C) UWB. D) RFIDs.
Answer: D
85) Smart phones ________. A) provide telephone service B) support web service C) often have cameras D) All of the above.
Answer: D
91) What is the planned long-term speed of 3G service for stationary devices? A) 1 Mbps. B) 10 Mbps. C) 100 Mbps. D) 1 Gbps.
Answer: D
94) For high-definition video, what is the lowest generation of cellular service that provides acceptable speed? A) 1G. B) 2G. C) 3G. D) 4G.
Answer: D
10) Who created WPA? A) The Internet Engineering Task Force. B) ISO. C) The 802.1 Working Group. D) The 802.11 Working Group. E) The Wi-Fi Alliance.
Answer: E
16) What does the Wi-Fi Alliance call 802.11i? A) 802.1x. B) 802.11s. C) 802.11X. D) WPA. E) WPA2.
Answer: E