- Home
- Networking
- CWSP-205
6.
Which sublayer of the OSI model ’ s Data - Link layer is used for communication between
802.11 radios?
- A.LLC
- B.WPA
- C.MAC
- D.FSK
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The IEEE 802.11-2012 standard defines communication mechanisms at only the Physical layer and MAC sublayer of the Data-Link layer of the OSI model. The Logical Link Control (LLC) sublayer of the Data-Link layer is not defined by the 802.11-2012 standard. WPA is a security certification. FSK is a modulation method. |
7.
What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)
- A.3DES
- B.WPA-2
- C.SSL
- D.TKIP
- E.CCMP
- F.WEP
- Answer & Explanation
- Report
Answer : [D, E, F]
Explanation :
Explanation :
WPA-2 is a Wi-Fi Alliance certification and not an encryption method. The WPA-2 certification does mandate the use of CCMP encryption and TKIP is optional. The IEEE 802.11-2012 standard defines the use of both CCMP and TKIP dynamic encryption methods. Also defined by the IEEE is the use of static WEP encryption. |
8.
Which organization is responsible for the creation of documents known as Requests for
Comments?
- A.IEEE
- B.ISO
- C.IETF
- D.Wi-Fi Alliance
- E.RFC Consortium
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Requests for Comments are known as RFCs and are created by the Internet Engineering Task Force (IETF), which is guided and directed by the Internet Engineering Steering Group (IESG). |
9.
Which of the following is not a standard or amendment created by the IEEE? (Choose all
that apply.)
- A.802.11X
- B.802.1x
- C.802.3af
- D.802.11N
- E.802.11g
- Answer & Explanation
- Report
Answer : [A, B, D]
Explanation :
Explanation :
There is no 802.11X amendment. The x in 802.1x should be capitalized (802.1X), and the N in 802.11N should not be capitalized (802.11n). These are not trivial errors. Standards and amendments should be written and used with the proper capitalization. |
10.
TKIP can be used with which of the following? (Choose all that apply.)
- A.WEP
- B.WPA-Personal
- C.WPA-Enterprise
- D.WPA-2 Personal
- E.WPA-2 Enterprise
- F.802.11-2012 (RSN)
- Answer & Explanation
- Report
Answer : [B,C,D,E,F]
Explanation :
Explanation :
By default, WPA-Personal and WPA-Enterprise use TKIP for encryption. WPA-2 Personal, WPA-2 Enterprise, and 802.11-2012 (RSN) mandate the use of CCMP, but TKIP is optional. TKIP is essentially being phased out because the IEEE and Wi-Fi Alliance mandate the use of only CCMP encryption for 802.11n and 802.11ac data rates. |