Wireless Networks and Security Quiz
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

When were Wireless Local Area Networks (WLAN) first created?

  • 1970 (correct)
  • 2000
  • 1980
  • 1990
  • What is the main means of communication in a Wireless Network?

  • Electromagnetic waves (correct)
  • Sound waves
  • Microwaves
  • Infrared waves
  • Which type of network connects devices within a relatively small area and maintains random network configurations?

  • Mobile device network
  • WMAN (Wireless Metropolitan Area Network)
  • WLAN (Wireless Local Area Network)
  • WPAN (Wireless Personal Area Network) (correct)
  • What is the main standardization body for wireless networking?

    <p>IEEE</p> Signup and view all the answers

    Which type of network may span an entire city or college campus?

    <p>WMAN (Wireless Metropolitan Area Network)</p> Signup and view all the answers

    What was the first model of WLAN's topology?

    <p>Star topology</p> Signup and view all the answers

    What is an example of a Wireless Local Area Network (WLAN)?

    <p>Wi-Fi</p> Signup and view all the answers

    What is the function of APs in an ESS?

    <p>Connecting BSSs</p> Signup and view all the answers

    Which encryption method is recommended for better performance in WPA?

    <p>TKIP</p> Signup and view all the answers

    What is the purpose of WIPS in wireless security?

    <p>Preventing wireless intrusion</p> Signup and view all the answers

    What is the primary focus of MAC spoofing?

    <p>Changing device identity</p> Signup and view all the answers

    Which measure is recommended to improve wireless security?

    <p>Using WPA2 instead of WEP</p> Signup and view all the answers

    What is the purpose of signal hiding in wireless security?

    <p>Concealing the presence of a wireless network</p> Signup and view all the answers

    What is the role of EAP in authentication?

    <p>Facilitating authentication using credentials</p> Signup and view all the answers

    Which protocol architecture is associated with IEEE 802.11?

    <p>Network components and architectural model</p> Signup and view all the answers

    What is the primary function of IEEE 802.11 services?

    <p>Offering wireless security measures</p> Signup and view all the answers

    What are the key security requirements in wireless environments?

    <p>Confidentiality, integrity, availability, authenticity, and accountability</p> Signup and view all the answers

    What is the function of an Access Point (AP) in wireless networks?

    <p>Acts as a wireless hub for wireless clients to connect to</p> Signup and view all the answers

    What mode of operation enables rapid deployment in the absence of infrastructure in wireless networks?

    <p>Ad-hoc mode</p> Signup and view all the answers

    What are the key factors contributing to wireless security risks?

    <p>Channel susceptibility to eavesdropping, mobility risks, limited resources, and accessibility of certain devices left unattended</p> Signup and view all the answers

    Which components facilitate points of attack in wireless networking?

    <p>Wireless clients, access points, and the transmission medium</p> Signup and view all the answers

    What are examples of wireless network threats?

    <p>Accidental and malicious associations, ad-hoc networks, identity theft, man-in-the-middle attacks</p> Signup and view all the answers

    What is a proactive measure to prevent exploitation of wireless networks?

    <p>WLAN monitoring/IPS</p> Signup and view all the answers

    Which security algorithm is considered deprecated and vulnerable to attacks like ARP Spoofing and Firesheep?

    <p>WEP</p> Signup and view all the answers

    Which encryption type was introduced as a replacement for WEP in 2004 and includes TKIP and AES?

    <p>WPA</p> Signup and view all the answers

    Which type of wireless network is vulnerable to attacks and data interception?

    <p>Unsecured wireless networks</p> Signup and view all the answers

    What additional security measure can help protect wireless networks?

    <p>MAC address filtering</p> Signup and view all the answers

    Which technology uses integrated circuits and antennas to quickly identify items when scanned?

    <p>RFID tags</p> Signup and view all the answers

    Which type of RFID tag requires a varying power supply?

    <p>Active</p> Signup and view all the answers

    What is a characteristic of RFID solutions?

    <p>They do not require line-of-sight access</p> Signup and view all the answers

    Study Notes

    Wireless Networks and Security

    • GSM (2G) and 3G networks are used for various wireless applications such as laptops, cell phones, GPS, and biotechnology.
    • Wireless networks facilitate mobility and enable connections without physical links.
    • Security is essential in wireless networks to prevent unauthorized access and data theft.
    • Security approaches include WEP, WPA, and WPA2, with WEP being a deprecated algorithm.
    • WEP encryption uses 40/64 bit or 104/128 bit keys and can be vulnerable to attacks like ARP Spoofing and Firesheep.
    • WPA/WPA2 encryption includes TKIP and AES, with the option for key renewal.
    • Unsecured wireless networks are vulnerable to attacks and data interception.
    • WEP, introduced in 1997, is a deprecated security algorithm with known vulnerabilities.
    • WPA, released in 2004, replaced WEP and introduced TKIP and AES encryption.
    • WPA2, an upgrade to WPA, is backward compatible and includes additional security measures.
    • Unencrypted or exploitable wireless networks can lead to unauthorized access and malicious activities.
    • Additional security measures include MAC address filtering, router firewall, and changing default settings.

    Title: Radio Frequency Identification (RFID)

    • RFID tags use integrated circuits and antennas to quickly identify items when scanned.
    • RFID tags come in three types: passive, active, and semi-passive, with varying power supplies and capabilities.
    • RFID solutions do not require line-of-sight access and can trigger security alarms if removed from their location.
    • Automatic scanning and data logging is possible with RFID, and each tag can have a unique product code.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge of wireless networks and security with this quiz. Explore topics such as GSM and 3G networks, encryption methods like WEP, WPA, and WPA2, vulnerabilities, and security measures. Gain a deeper understanding of the importance of securing wireless networks and the potential risks of unsecured connections.

    More Like This

    Use Quizgecko on...
    Browser
    Browser