Hybrid Wireless Topologies and Implementation Models Quiz

GracefulMossAgate avatar
GracefulMossAgate
·
·
Download

Start Quiz

Study Flashcards

49 Questions

Which frequency range is commonly used for wireless transmissions with data rates up to 54 Mbps?

2.4 GHz

What is a wireless access point (WAP)?

A device that broadcasts signals to wireless receivers

What are some characteristics of wireless networks compared to wired networks?

The number of devices being networked may change frequently

Which encryption protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

Advanced Encryption Standard (AES)

Which wireless security mechanism is recommended to spot rogue access points?

Wireless IDS

Which of the following is a Bluetooth attack that exploits the OBEX connection to grab emails and text?

Bluesnarf

What is the new security mechanism in Bluetooth 2.1?

Secure Simple Pairing (SSP)

Who can understand or modify the messages of UserD to the server www.example.com, in the following scenarios?

UserC

Which security objective ensures that communication cannot be read by unauthorized parties?

Confidentiality

Which set of protocols is used to secure wireless networks?

Wi-Fi Protected Access (WPA)

Which wireless architecture allows any station to send and receive data from any other station?

Mesh multipoint

Which encryption protocol is considered too weak and vulnerable to attacks?

WEP

What are the reasons for the weakness of WEP?

No key management defined in the protocol

Which authentication method is used in WPA2?

EAP-based authentication

What is the main difference between WEP and WPA2?

WEP uses AES-based encryption, while WPA2 uses TKIP encryption

Which wireless modulation technology manipulates the medium signal to carry data?

Quadrature amplitude modulation (QAM)

Which IEEE 802.11 standard supports data rates up to 54Mbps and is backwards compatible with 802.11b?

802.11g

Which wireless standard is an open standard for short-range wireless communication between devices, with a transmission rate of up to 1Mbps?

Bluetooth

What is the basic building block of a wireless network that provides connection between clients and other networks?

Wireless access point (WAP)

Which wireless standard supports data rates up to 600Mbps and includes security improvements?

802.11n

What is the range of Bluetooth for short-range wireless communication between devices?

Up to 33 feet

Which wireless standard is used for devices in geographically dispersed facilities with a range of up to 30 miles?

WiMAX

Which wireless personal area network (WPAN) standard is used for monitoring and control devices?

ZigBee

What is the basic building block of a wireless network that provides connection between clients and other networks?

Wireless access point

Which wireless topology is also known as the hub-and-spoke model?

Star

Which encryption protocol is used in Wi-Fi Protected Access II (WPA2)?

AES-CCMP

Which wireless security mechanism is recommended to restrict access based on the unique identifier of a device's network interface?

MAC filtering

Which Bluetooth attack allows an attacker to send commands to a vulnerable phone?

BlueBug

Which wireless network implementation mode provides a temporary and spontaneous connection between devices?

Ad hoc

Which wireless modulation technology is commonly used in modern WLANs?

IEEE 802.11

Which Bluetooth security mechanism is recommended to enhance security in Bluetooth 2.1?

Secure Simple Pairing (SSP)

Which security mechanism was introduced to resolve the issues with Wired Equivalent Privacy (WEP)?

WPA

Which encryption method is used in Wi-Fi Protected Access (WPA)?

TKIP

What is the main difference between WPA and WPA2?

WPA2 uses AES encryption, while WPA uses TKIP encryption

What is the purpose of the Robust Security Network (RSN) in IEEE 802.11i?

To derive keys used for confidentiality and integrity

What is the recommended authentication protocol in WPA2?

Extensible Authentication Protocol (EAP)

What is the purpose of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) in WPA2?

To enhance confidentiality and integrity of wireless LAN protocols

Which wireless technology became popular in the 1990s and connected computers wirelessly?

Wi-Fi

Which frequency range is commonly used for wireless transmissions with data rates up to 54 Mbps?

2.4 GHz

What is the main security concern regarding Bluetooth technology?

Uncontrolled signal

Which wireless security protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

WPA3

What is the basic building block of a wireless network that provides connection between clients and other networks?

Wireless access point (WAP)

What are some characteristics of wireless networks compared to wired networks?

Number of devices being networked may change frequently

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 1?

None of the above

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 2?

None of the above

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 3?

UserE

Who can understand or modify the messages of UserD to the server www.example.com, when UserD creates a VPN connection with the VPN provider?

UserC

Which wireless security protocol is considered weak and vulnerable to attacks?

WEP

Which wireless architecture provides point-to-multipoint connectivity and allows a station to move between adjacent BSSs without losing connectivity?

Mesh multipoint

Test your knowledge of hybrid wireless topologies and implementation models with this quiz. Learn about the combination of star and mesh topologies, ad hoc approaches, and permanent connection points.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser