Printed from www.StudyDroid.com

CompTIA Security+ Study Guide: Exam SY0-301, Fifth Edition, Chapter 12
0x4b4d

Front Back

1. Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA?
WEP
WTLS
WAP
WOP


1. C. Wireless Application Protocol (WAP) is an open international standard for applications that use wireless communication.


2. Which protocol operates on 2.4GHz and has a bandwidth of 1 Mbps or 2 Mbps?
802.11
802.11a
802.11b
802.11g


2. A. 802.11 operates on 2.4GHZ. This standard allows for bandwidths of 1 Mbps or 2 Mbps.


3. You're outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network?
WAP
WTLS
WPA2
IR


3. C. Wi-Fi Protected Access 2 (WPA2) was intended to provide security that's equivalent to the security on a wired network and implements elements of the 802.11i standard.


4. Which of the following is a primary vulnerability of a wireless environment?
Decryption software
IP spoofing
A gap in the WAP
Site survey


4. D. A site survey is the process of monitoring a wireless network using a computer, wireless controller, and analysis software. Site surveys are easily accomplished and hard to detect.


5. Which of the following is synonymous with MAC filtering?
TKIP
Network lock
EAP-TTLS
MAC secure


5. B. The term network lock is synonymous with MAC filtering.


6. Which of the following 802.11 standards is often referenced as WPA2?
802.11a
802.11b
802.11i
802.11n


6. C. The WPA2 standard is also known as 802.11i.


7. Which of the following 802.11 standards provides for bandwidths of up to 300 Mbps?
802.11n
802.11i
802.11g
802.11b


7. A. The 802.11n standard provides for bandwidths of up to 300Mbps.


8. An IV attack is usually associated with which of the following wireless protocols?
WEP
WAP
WPA
WPA2


8. A. An IV attack is usually associated with the WEP wireless protocol.


9. Which type of encryption does CCMP use?
EAP
DES
AES
IV


9. C. CCMP uses 128-bit AES encryption.


10. Which encryption technology is associated with WPA?
TKIP
CCMP
WEP
LDAP


10. A. The encryption technology associated with WPA is TKIP.


11. Which of the following is not one of the three transmission technologies used to communicate in the 802.11 standard?
DSSS
FHSS
VITA
OFDM


11. C. The three technologies available for use with the 802.11 standard are DSSS (direct-sequence spread spectrum), FHSS (frequency-hopping spread spectrum), and OFDM (orthogonal frequency division multiplexing). VITA (Volunteer Income Tax Assistance) is not a wireless transmission technology.


12. What is the size of the initialization vector (IV) that WEP uses for encryption?
6-bit
24-bit
56-bit
128-bit


12. B. The initialization vector (IV) that WEP uses for encryption is 24-bit.


13. Which of the following is a script language WAP-enabled devices can respond to?
WXML
Winsock
WIScript
WMLScript


13. D. WAP-enabled devices can respond to scripts using an environment called WMLScript.


14. Which of the following authentication levels with WAP requires both ends of the connection to authenticate to confirm validity?
Relaxed
Two-way
Server
Anonymous


14. B. Two-way authentication requires both ends of the connection to authenticate to confirm validity.


15. Which of the following manages the session information and connection between wireless devices?
WSP
WPD
WPT
WMD


15. A. WSP (Wireless Session Protocol) manages the session information and connection between wireless devices.


16. Which of the following provides services similar to TCP and UDP for WAP?
WTLS
WDP
WTP
WFMD


16. C. The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP.


17. Which of the following authentication levels with WAP allows virtually anyone to connect to the wireless portal?
Relaxed
Two-way
Server
Anonymous


17. D. Anonymous authentication allows virtually anyone to connect to the wireless portal.


18. If the interconnection between the WAP server and the Internet isn't encrypted, packets between the devices may be intercepted. What is this vulnerability known as?
Packet sniffing
Minding the gap
Middle man
Broken promise


18. A. If the interconnection between the WAP server and the Internet isn't encrypted, packets between the devices may be intercepted and this is known as packet sniffing.


19. WAP uses a smaller version of HTML for Internet displays. This is known as:
DSL
HSL
WML
OFML


19. C. WAP uses a smaller version of HTML called Wireless Markup Language (WML) for Internet displays.


20. What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet?
128-bit
64-bit
56-bit
12-bit


20. A. TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet.


Wireless Application Protocol (WAP)


equivalent to TCP/IP for wireless devices


WTLS


Wireless Transport Layer Security
Security layer of WAP


802.11a


Wireless LAN Standard
5GHz band
54 Mbps
OFDM


802.11b


Wireless LAN Standard
2.4GHz band
11Mbps
DSSS


802.11g


Wireless LAN Standard
2.4GHz band
54 Mbps



802.11n


Wireless LAN Standard
5GHz band
300Mbps


802.11i


Wireless LAN Security standards
WAP2


Site Survey


listening in on wireless signals.


WEP


Wired Equivalent Privacy
Uses RC4 and 24-bit Initialization Vector (IV)


WPA


WiFi Protected Access
Incomplete implementation of 802.11i
Uses TKIP with 128-bit RC4


WPA2


Wifi Protected Access 2
Full Implementation of 802.11i
Uses CCMP with 128-bit AES and 48-bit initalization vector


EAP


extensible authentication protocol
framework for authentication



PEAP


Protected Extensible Authentication Protocol
Replacement for LEAP
Native Windows support


LEAP


Lightweight Extensible Authentication Protocol
Proprietary to Cisco, weak.


802.11


Wireless transmission standard
2.4 GHz band
1 or 2 Mbps
FHSS or DSSS


FHSS


Frequency hopping spread spectrum
hops transmission over predefined frequencies
synchronized between sender and receiver


DSSS


Direct sequence spread spectrum
higher frequency transmission contains redundant data


OFDM


Orthogonal frequency division multiplexing
breaks data into sub-signals and transmits simultaneously on different frequencies


WML


Wireless MArkup Language
Smaller version of HTTP used in WAP


WMLScript


Scripting language similar to Javascript used in WAP


WAP Authentication


Anonymous = anyone
Server authentication = workstation authenticates to server
Two-way = both ends authenticate with each other


WSP


Wireless Session Protocol
manages session information and connection between devices


WTP


Wireless Transaction Protocol
Similar to TCP and UDP for WAP


WDP


Wireless Datagram Protocol
provides a common interface between devices


MAC Filtering


AKA Network Lock
Whitelisting MAC addresses for connection to access point


War Driving


driving around looking for exploitable access points


War Chalking


Leaving marks on buildings to indicate available access points


Bluejacking


spam over bluetooth


Bluesnarfing


gaining unauthorized access through bluetooth