True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
A
number of standard-setting bodies are working on the problem of wireless security.
|
|
2.
|
In
1990, the 802.11 working group finalized its first standard, which defined two types of transmission
at the Physical (PHY) layer.
|
|
3.
|
The
802.11b standard developed MAC bridging functionality.
|
|
4.
|
Wireless devices don't need to be able to communicate with data sources over a
network.
|
|
5.
|
There
are no differences between the WAP 1.x and the OSI Model.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
An
optional security protocol for wireless local area networks as defined by the 802.11b standard is
called: a. | WAP | c. | WEP | b. | WAL | d. | None of the above | | | | |
|
|
7.
|
A
process and application that allows users to send and receive messages in real time is
called: a. | Wireless
Fidelity | c. | IEEE | b. | Instant Messaging | d. | 802.11 | | | | |
|
|
8.
|
Wi-Fi
is short for: a. | Wireless
Fidelity | c. | Working
Fixture | b. | Wired Fidelity | d. | Wide Area Fidelity | | | | |
|
|
9.
|
An
open, global specification designed to deliver information and services to users of handheld digital
devices is called:
|
|
10.
|
What
corresponds to the HTML layer, but is designed only to specify lightweight formats, leaving other
decisions to the device vendors?
|
|
11.
|
What
is the term that describes the brief instant when data is not encrypted during the conversion process
between the wireless session protocol and HTTP? a. | war driving | c. | WAP gap | b. | WIM | d. | WAP
gateway | | | | |
|
|
12.
|
What
allows the use of plug-and-play modules to extend the features o the client's wireless
applications? a. | WAP
stack | c. | external
functionality interface | b. | multimedia messaging service | d. | WAP push | | | | |
|
|
13.
|
A
tamper-resistant device, that facilitates the storage of digital signatures and advanced cryptography
such as a smart card, is known as a(n): a. | wireless network interface card | c. | WAP gateway | b. | wireless
identify module | d. | wireless
transaction protocol | | | | |
|
|
14.
|
A
protocol designed to provide authentication, data encryption, and privacy for WAP 1.x users is
called: a. | WTLS
protocol | c. | wireless
transaction protocol | b. | wireless session protocol | d. | None of the above | | | | |
|
|
15.
|
How
long is the WEP IV? a. | 8 bits | c. | 24 bits | b. | 16
bits | d. | 32
bits | | | | |
|
|
16.
|
The
act of driving around using a laptop computer equipped with a wireless card and antenna, using
sniffing software to located wireless networks is called: a. | war
gateway | c. | war
hacking | b. | war driving | d. | hack driving | | | | |
|
|
17.
|
An
item(s) to consider in conducting a wireless site survey is (are): a. | conduct a needs
assessment of users | c. | verify access
point locations | b. | do a walk-through of the site | d. | All of the above | | | | |
|
|
18.
|
A
quasi form of Instant Messaging provided by most cell phone carriers is called: a. | wireless
datagram protocol | c. | simple messaging
service | b. | IEEE | d. | WAP gap | | | | |
|
|
19.
|
An
IEEE group that is responsible for creating standards of operability related to wireless clients and
their network access points is called: a. | WAP Forum | c. | WECA | b. | 802.11 | d. | Wi-Fi | | | | |
|
|
20.
|
What
is the group has the responsibility of fixing the security flaws in WEP? a. | 802.11a | c. | 802.11h | b. | 802.11b | d. | 802.11i | | | | |
|
|
21.
|
What
is the group has the responsibility of creating a standard that will allow for better roaming between
multivendor access points? a. | 802.11c | c. | 802.11g | b. | 802.11f | d. | 802.11h | | | | |
|
|
22.
|
What
certification brand name was created by WECA for 802.11b compatible devices? a. | wireless access
point | c. | wireless
identity module | b. | Wi-Fi | d. | None of the above | | | | |
|
|
23.
|
What
is the name of the wireless industry association that has developed wireless equipment testing and
certification standards for 802.11b-compatible devices? a. | WAP
Forum | c. | WECA | b. | WAL | d. | WIM | | | | |
|
|
24.
|
What
is a device called that is used to connect a wireless client to the wired network? a. | wireless access
point | c. | wireless
application protocol | b. | wireless network interface
cards | d. | wireless
application layer | | | | |
|
|
25.
|
What
is the device called that plugs into a laptop computer that sends and receives radio data
transmissions? a. | WAP
gateway | c. | wireless access
point | b. | wireless network interface card | d. | None of the above | | | | |
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | 802.11h | e. | 802.11d | b. | 802.11a | f. | 802.11b | c. | 802.11f | g. | 802.11c | d. | 802.11j | h. | 802.11e | | | | |
|
|
26.
|
Folded into 802.11d.
|
|
27.
|
European implementation requests in the 6 GHz band.
|
|
28.
|
Disbanded 802.11 group.
|
|
29.
|
Determine requirements of 802.11 outside the United States.
|
|
30.
|
Working to add QoS to wireless MAC layer.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | Wireless Session
Protocol | e. | Wireless
Transaction Protocol | b. | wireless access point | f. | Wireless Application Layer | c. | Wireless
Datagram Protocol | g. | Wired Equivalent
Privacy | d. | Wireless Identity Module | h. | WAP gateway | | | | |
|
|
31.
|
Tamper-resistant device that facilitates storage of digital signatures.
|
|
32.
|
Used
to connect a wireless client to the wired network.
|
|
33.
|
WAP
stack layer providing reliable or unreliable data transactions.
|
|
34.
|
Specify lightweight formatting standards for WAP-enabled devices.
|
|
35.
|
WAP
stack layer providing operability between a great variety of mobile networks.
|