Wireless Security Lunchtime Learning Entrance Exam

Wireless Security
Lunchtime Learning
  By Lisa Phifer

Wireless Security Lunchtime Learning

Return to Wireless Security Lunchtime Learning
Move to Lesson 1: How to counter wireless threats and vulnerabilities
Assess your knowledge of wireless LAN security with this 10-question multiple choice entrance exam.

1.) Which of the following statements is false?
a. Extended service set identifier (SSID) is a wireless LAN's name.
b. SSID is sent in AP beacons so that stations can find the right WLAN.
c. SSID is sent in probe requests so that stations can find the right WLAN.
d. Omitting SSID from beacons prevents attackers from finding a WLAN.

2.) Which of the following is not a fast handoff option included in 802.11i?
a. 802.1X key delivery
b. Key caching
c. Pre-authentication

3.) Which of the following is not an alternative for controlling WLAN access?
c. EAP-MD5

4.) When a wireless intrusion detection system (WIDS) floods a rogue access point with deauthenticate messages, it is usually trying to:
a. Locate the rogue so that it can be removed
b. Prevent unauthorized stations from communicating with the rogue
c. Prevent the rogue from communicating with the wired network
d. Inhibit communication between the rogue and legitimate stations

5.) Which of the following can be used to compromise a WPA-protected WLAN?
a. KisMAC
b. Airsnort
c. Airsnarf
d. Airpwn

6.) Rogue access points that are not connected to your corporate network pose no business risk.
a. True
b. False

7.) 802.1X Port Access Control can be used for wireless LAN authentication by companies with limited IT staff.
a. True
b. False

8.) Which is the most effective method of keeping wireless visitor traffic from infiltrating your company network?
a. Secure your WLAN with WPA-PSK
b. Split your WLAN into "guest" and "employee" SSIDs
c. Use 802.1X to return VLAN tags, then block untagged traffic

9.) Wireless interference from external sources can be avoided by:
a. Coating your walls with RF-reflective paint
b. Placing APs in the middle of your facility
c. Using directional antennas to focus wireless transmissions
d. Reassigning channels used by your APs

10.) Which of the following statements is true?
a. Given 802.11i, companies no longer need VPNs to protect wireless.
b. WPA2 requires purchasing all new wireless hardware.
c. An embedded WIDS cannot monitor the air full-time.
d. A WIDS may help with compliance reporting.

>> Move to Lesson 1: How to counter wireless threats and vulnerabilities

This was first published in April 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: