chapter 7 111
18) In what initial authentication mode of 802.11i is a central authentication server used? A) 802.1X B) PSK C) both A and B D) neither A nor B
A) 802.1X
4) In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server
A) access point
10) 802.11i 802.1X initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points
A) corporations with multiple access points
5) The protection of communication between a wireless client and the access point is ________. A) link security B) end-to-end security C) both A and B D) neither A nor B
A) link security
7) Which offers stronger security? A) WPA B) 802.11i C) both A and B offer equally strong security.
B) 802.11i
17) If a firm has many access points, it should use ________ initial authentication mode in 802.11i. A) PSK B) 802.1X C) IPsec D) WPA
B) 802.1X
12) In 802.11i ________, hosts must know a shared initial key. A) 802.1X initial authentication mode B) PSK initial authentication mode C) both A and B D) neither A nor B
B) PSK initial authentication mode
13) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) pairwise session C) 802.1X D) preshared
B) pairwise session
9) 802.11i PSK initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points
B) residences with a single access point
19) In 802.1x initial authentication mode, the authenticator is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above
B) wireless access point
16) In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 8 B) 12 C) 20 D) 128
C) 20
6) The Wi-Fi Alliance calls 802.11i ________. A) WEP B) WPA C) WPA2 D) none of the above
C) WPA2
15) Which of the following is a risk in 802.11i PSK mode? A) Unauthorized sharing of the pre-shared key. B) A weak passphrase may be selected. C) both A and B D) neither A nor B
C) both A and B
3) 802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B
C) both A and B
8) What is the strongest security protocol for 802.11 today? A) 802.11s B) 802.11X C) WPA D) 802.11i
D) 802.11i
11) Communication after authentication is protected most strongly if the ________ initial authentication is used. A) PSK B) 802.1X C) WPA D) It does not matter which initial authentication mode is used.
D) It does not matter which initial authentication mode is used.
14) After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) the preshared key B) an 802.1X key C) WPA keys D) different pairwise session keys
D) different pairwise session keys
2) If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________. A) still protected by a firewall B) still protected by encryption C) both A and B D) neither A nor B
D) neither A nor B
20) In 802.1x initial authentication mode, the VERIFIER is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above
D) none of the above
1) Nearly all public Wi-Fi hotspots encrypt your transmissions. `
False