Featured Post

Step Wise Project Planning

Planning is the most difficult process in project management. The framework described is called the Stepwise method to help to distinguis...

  1. Home

Certified Ethical Hacker Exam 312-50 Assessment Test - Part 11


 

Review Questions


1. Which of the following security solutions uses the same key for both encryption and

authentication?

A. WPA

B. WPA2

C. WEP

D. 802.11i


2. What does WEP stands for?

A. Wireless Encryption Protocol

B. Wired Equivalent Privacy

C. Wireless Encryption Privacy

D. Wired Encryption Protocol


3. What makes WEP crackable?

A. Same key used for encryption and authentication

B. Length of the key

C. Weakness of IV

D. RC4


4. Which form of encryption does WPA use?

A. AES

B. TKIP

C. LEAP

D. Shared key


5. Which form of authentication does WPA2 use?

A. Passphrase only

B. 802.1x/EAP/RADIUS

C. Passphrase or 802.1x/EAP/RADIUS

D. AES


6. 802.11i is most similar to which wireless security standard?

A. WPA2

B. WPA

C. TKIP

D. AES


7. Which of the following is a Layer 3 security solution for WLANs?

A. MAC filter

B. WEP

C. WPA

D. VPN


8. A device that sends deauth frames is performing which type of attack against the WLAN?

A. Denial of service

B. Cracking

C. Sniffing

D. MAC spoofing


9. What is the most dangerous type of attack against a WLAN?

A. WEP cracking

B. Rogue access point

C. Eavesdropping

D. MAC spoofing


10. 802.11i is implemented at which layer of the OSI model?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 7


11. Which of the following is the best option for securing a home wireless network?

A. WEP

B. Shared-key authentication

C. WPA-Personal

D. WPA-Enterprise


12. You just installed a new wireless access point for your home office. Which of the following

steps should you take immediately to secure your WLAN?

A. Spoof your clients MAC address.

B. Change the Admin password on the AP.

C. Change the channel on the AP to Channel 11.

D. Set the SSID to SECURE.


13. What can be done on a wireless laptop to increase security when connecting to any

WLAN? (Choose two.)

A. Install and configure personal firewall software.

B. Disable auto-connect features.

C. Use WEP.

D. Use MAC filtering.


14. What is an SSID used for on a WLAN?

A. To secure the WLAN

B. To manage the WLAN settings

C. To identify the WLAN

D. To configure the WLAN AP


15. What is the best way to enforce a “no wireless” policy?

A. Install a personal firewall.

B. Disable WLAN client adapters.

C. Use a WIDS/WIPS.

D. Only connect to open APs.


16. Which of the following is a program used to spoof a MAC address?

A. MAC Again

B. Big MAC

C. TMAC

D. WZC


17. Which of the following are Layer 7 application-secure protocols used to secure data on

WLAN hotspots?

A. HTTPS

B. HTTP

C. FTP

D. VPN


18. Which type of frame is used by a WIPS to prevent WLAN users from connecting to rogue

access points?

A. Disconnect

B. Deauthentication

C. Disable

D. Reject


19. WPA passphrases can consist of which of the following character sets?

A. Only a–z and A–Z

B. Only a–z

C. Only a–z, A–Z, and 0–9

D. Only 0–9


20. Which of the following is a countermeasure to using WEP?

A. Use a strong WEP key of at least 20 characters.

B. Use a WEP key that does not repeat any of the same characters.

C. Use WPA instead of WEP.

D. Implement a preshared key with WEP.


Answers to Review Questions


1. C. WEP uses the same key for encryption and authentication.

2. B. WEP is an acronym for Wired Equivalent Privacy.

3. C. WEP is crackable because of the lack of sophistication in using the IV when deploying RC4.

4. B. WPA uses TKIP.

5. C. WPA2 uses either a passphrase in personal mode or 802.1x/EAP/RADIUS in

enterprise mode.

6. A. 802.11i is almost the same as WPA2.

7. D. A VPN is a Layer 3 security solution for WLANs.

8. A. A DoS can be performed by a device sending constant deauth frames.

9. B. A rogue AP is the most dangerous attack against a WLAN because it gives a hacker an

open door into the network.

10. B. 802.11i is a Layer 2 technology.

11. C. WPA-Personal has the strongest authentication and encryption usable on a home net-

work. WPA-Enterprise requires a RADIUS server, which most home users would not have

the ability to set up and configure.

12. B. You should immediately change the Admin password on an AP’s web interface when

installing a new AP.

13. A, B. Installing and configuring personal firewall software and disabling auto-connect fea-

tures are two ways to increase the security of WLAN connections.

14. C. A Service Set Identifier (SSID) is used to identify the WLAN to wireless users.

15. C. Using a wireless intrusion detection system or protection system is the best way to

enforce a “no wireless” policy.

16. C. TMAC is a program used to spoof a MAC address.

17. A. HTTPS is a secure version of HTTP commonly used to secure data on WLAN hotspots.

18. B. Deauthentication frames are used by a WIPS to prevent users from connecting to rogue APs.

19. C. WPA passphrases can be alphanumeric and include a–z, A–Z, and 0–9.

20. C. Using WPA is a countermeasure to the weakness of WEP.

Previous
Next Post »