Lesson 1 quiz: Risky business

Wireless Security
Lunchtime Learning
  By Lisa Phifer

Wireless Security Lunchtime Learning

Return to Lesson 1: How to counter wireless threats and vulnerabilities
Move to Lesson 2: How to build a secure wireless infrastructure
Return to Wireless Security Lunchtime Learning
Test your retention of the material taught in Lesson 1 of Wireless Security Lunchtime Learning.

1.) Which of the following vulnerabilities is unique to 802.11 wireless LANs?
a. Forged deauthenticate frames
b. RF jamming
c. TCP SYN floods
d. Data sniffing

2.) 802.11 wired equivalent privacy was intended to meet which security need?
a. Confidentiality
b. Integrity
c. Availability
d. Access control

3.) Which of the following transmissions is protected against replay and forgery?
a. 802.11 control frame
b. 802.11 management frame
c. 802.11 data frame, protected by WEP
d. 802.11 data frame, protected by WPA

4.) Which statement about 802.11 shared key authentication is false?
a. Shared key authentication is required by 802.1X.
b. Real users and attackers with a shared WEP key have the same rights.
c. Users cannot determine whether the access point is an imposter.
d. A lost device with the key compromises security for the entire WLAN.

5.) WPA-Enterprise prevents unauthorized users from transmitting 802.11 frames.
a. True
b. False

>> Move to Lesson 2: How to build a secure wireless infrastructure

This was first published in April 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: