Name:     ID: 
 
    Email: 

CNG 131 Chapter 08

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

A number of standard-setting bodies are working on the problem of wireless security.
 

 2. 

In 1990, the 802.11 working group finalized its first standard, which defined two types of transmission at the Physical (PHY) layer.
 

 3. 

The 802.11b standard developed MAC bridging functionality.
 

 4. 

Wireless devices don't need to be able to communicate with data sources over a network.
 

 5. 

There are no differences between the WAP 1.x and the OSI Model.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

An optional security protocol for wireless local area networks as defined by the 802.11b standard is called:
a.
WAP
c.
WEP
b.
WAL
d.
None of the above
 

 7. 

A process and application that allows users to send and receive messages in real time is called:
a.
Wireless Fidelity
c.
IEEE
b.
Instant Messaging
d.
802.11
 

 8. 

Wi-Fi is short for:
a.
Wireless Fidelity
c.
Working Fixture
b.
Wired Fidelity
d.
Wide Area Fidelity
 

 9. 

An open, global specification designed to deliver information and services to users of handheld digital devices is called:
a.
WAL
c.
WIM
b.
WECA
d.
WAP
 

 10. 

What corresponds to the HTML layer, but is designed only to specify lightweight formats, leaving other decisions to the device vendors?
a.
WAP
c.
WSP
b.
WAL
d.
WTP
 

 11. 

What is the term that describes the brief instant when data is not encrypted during the conversion process between the wireless session protocol and HTTP?
a.
war driving
c.
WAP gap
b.
WIM
d.
WAP gateway
 

 12. 

What allows the use of plug-and-play modules to extend the features o the client's wireless applications?
a.
WAP stack
c.
external functionality interface
b.
multimedia messaging service
d.
WAP push
 

 13. 

A tamper-resistant device, that facilitates the storage of digital signatures and advanced cryptography such as a smart card, is known as a(n):
a.
wireless network interface card
c.
WAP gateway
b.
wireless identify module
d.
wireless transaction protocol
 

 14. 

A protocol designed to provide authentication, data encryption, and privacy for WAP 1.x users is called:
a.
WTLS protocol
c.
wireless transaction protocol
b.
wireless session protocol
d.
None of the above
 

 15. 

How long is the WEP IV?
a.
8 bits
c.
24 bits
b.
16 bits
d.
32 bits
 

 16. 

The act of driving around using a laptop computer equipped with a wireless card and antenna, using sniffing software to located wireless networks is called:
a.
war gateway
c.
war hacking
b.
war driving
d.
hack driving
 

 17. 

An item(s) to consider in conducting a wireless site survey is (are):
a.
conduct a needs assessment of users
c.
verify access point locations
b.
do a walk-through of the site
d.
All of the above
 

 18. 

A quasi form of Instant Messaging provided by most cell phone carriers is called:
a.
wireless datagram protocol
c.
simple messaging service
b.
IEEE
d.
WAP gap
 

 19. 

An IEEE group that is responsible for creating standards of operability related to wireless clients and their network access points is called:
a.
WAP Forum
c.
WECA
b.
802.11
d.
Wi-Fi
 

 20. 

What is the group has the responsibility of fixing the security flaws in WEP?
a.
802.11a
c.
802.11h
b.
802.11b
d.
802.11i
 

 21. 

What is the group has the responsibility of creating a standard that will allow for better roaming between multivendor access points?
a.
802.11c
c.
802.11g
b.
802.11f
d.
802.11h
 

 22. 

What certification brand name was created by WECA for 802.11b compatible devices?
a.
wireless access point
c.
wireless identity module
b.
Wi-Fi
d.
None of the above
 

 23. 

What is the name of the wireless industry association that has developed wireless equipment testing and certification standards for 802.11b-compatible devices?
a.
WAP Forum
c.
WECA
b.
WAL
d.
WIM
 

 24. 

What is a device called that is used to connect a wireless client to the wired network?
a.
wireless access point
c.
wireless application protocol
b.
wireless network interface cards
d.
wireless application layer
 

 25. 

What is the device called that plugs into a laptop computer that sends and receives radio data transmissions?
a.
WAP gateway
c.
wireless access point
b.
wireless network interface card
d.
None of the above
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
802.11h
e.
802.11d
b.
802.11a
f.
802.11b
c.
802.11f
g.
802.11c
d.
802.11j
h.
802.11e
 

 26. 

Folded into 802.11d.
 

 27. 

European implementation requests in the 6 GHz band.
 

 28. 

Disbanded 802.11 group.
 

 29. 

Determine requirements of 802.11 outside the United States.
 

 30. 

Working to add QoS to wireless MAC layer.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
Wireless Session Protocol
e.
Wireless Transaction Protocol
b.
wireless access point
f.
Wireless Application Layer
c.
Wireless Datagram Protocol
g.
Wired Equivalent Privacy
d.
Wireless Identity Module
h.
WAP gateway
 

 31. 

Tamper-resistant device that facilitates storage of digital signatures.
 

 32. 

Used to connect a wireless client to the wired network.
 

 33. 

WAP stack layer providing reliable or unreliable data transactions.
 

 34. 

Specify lightweight formatting standards for WAP-enabled devices.
 

 35. 

WAP stack layer providing operability between a great variety of mobile networks.
 



 
Submit          Reset Help