Chapter 1
- In which type of network can every computer communicate directly with the other
computers on the same network without going through an access point?
*a. Peer-to-peer network
- Extension to a wired network
- Multiple Access Points
- LAN-to-LAN Wireless network
- Which wireless standard was in use when Wi-Fi first became popular?
- 802.11a
- 802.11g
- 802.11n
*b. 802.11b
- Which Wi-Fi standard uses dual-band technology and support simultaneous
connections on both the 2.4 GHz and 5 GHz bands?
*a. 802.11ac
- 802.11g
- 802.11i
- 802.11n
- What is the common name for the WPAN defined by IEEE 802.15.1?
- RFID
- Wi-Fi
- Piconet
*c. Bluetooth
- Which IEEE standard includes 802.1x RSN, and CCMP security features?
- 802.11b
- 802.15
- 802.16
*b. 802.11i
- Which technology provides networking capabilities over existing CAT3 cable and
can share the same wire as a standard telephone line?(Ethical Hacking and Countermeasures, Secure Network Operating Systems and Infrastructures (CEH), 2e EC-Council) (Test Bank, Correct Answer Marked with*) 1 / 3
- CDPD
- FRS
- GPRS
*c. HPNA
- Which of the following is a names a particular WLAN and must be used by all
devices in the same WLAN?
- RADIUS
- BSS
- WPA2
*d. SSID
- In which technique does an attacker acquire a trusted address that allows the attacker
to communicate with the access point?
*a. MAC sniffing
- AP spoofing
- Authentication attack
- Disassociation attack
- What do APs use to broadcast the SSID so users can locate the network?
- BSS locators
- shared key
- ICMP broadcasts
*c. beacon frames
- In the functioning of TKIP, what value is used as a session-based WEP key in the
second phase?
*a. TTAK
- TSC
- LEAP
- MIC key
- / 3
Chapter 2
- Which technology uses an individual's unique physical traits to identify a valid user?
- AI
- Physical
- Body
*d. Biometric
- What is used to verify a user's identity and security clearance?
*a. Authentication
- Access
- Control
- Identification
- Which of the following contain a user's identity information and digital signature?
- RSA tokens
- Bio cards
- PIN
*b. Digital certificates
- Which of the following is a method to make traditional and memorized passwords
nonreusable?
- smart cards
- keyboard dynamics
- signature dynamics analyzer
*c. encrypted time stamp
- What procedure is used to translate information into code for secure transmission?
*a. Encryption
- Steganography
- Parsing
- Hashing
- Which security item is a physical object?
- PIN
- / 3