Home
11.
Which of the following is simply a means of representing information in a different way?
  • A.
    Cryptography
  • B.
    Steganography
  • C.
    Encryption
  • D.
    Cipher
  • E.
    Code
  • Answer & Explanation
  • Report
Answer : [E]
Explanation :
A code is simply a way of representing information in a different way, such as ASCII or Morse code.
Report
Name Email  
12.
What wireless security components are mandatory under WPA version 2? (Choose all that apply.)
  • A.
    802.1X/EAP
  • B.
    PEAP
  • C.
    TKIP/ARC4
  • D.
    Dynamic WEP
  • E.
    CCMP/AES
  • Answer & Explanation
  • Report
Answer : [A, E]
Explanation :
Wi-Fi Protected Access (WPA) version 2 mirrors the 802.11i security amendment, mandating CCMP/AES dynamic encryption key management. TKIP/ARC4 dynamic encryption key management is optional. 802.1X/EAP authentication is required in the enterprise and passphrase authentication in a SOHO environment. PEAP can be used for 802.1X/EAP authentication but is not specifically defined by WPA. Dynamic WEP is not defined for encryption.
Report
Name Email  
13.
An AP advertising an 802.1X/EAP employee SSID along with a guest SSID is considered to be operating what type of network device?
  • A.
    Core
  • B.
    Distribution
  • C.
    Access
  • D.
    Network layer
  • E.
    Session layer
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Core devices perform high-speed switching as part of the backbone of the network. Distribution devices route traffic between VLANs and subnets. Access devices provide connectivity directly to the wireless end user. The OSI network layer and session layer are not involved with wireless communications.
Report
Name Email  
14.
The science of concealing plaintext and then revealing it is known as ___________, and the science of decrypting the ciphertext without knowledge of the key or cipher is known as ____________.
  • A.
    encryption, decryption
  • B.
    cryptanalysis, cryptology
  • C.
    cryptology, cryptanalysis
  • D.
    cryptography, cryptanalysis
  • F.
    cryptography, steganography
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Cryptography is the science of concealing the plaintext and then revealing it. Cryptanalysis is the science of decrypting the ciphertext without knowledge of the key or cipher. Cryptology is the practice or science that includes the techniques to encrypt and decrypt information. Steganography strives to hide the fact that there is a message by concealing it.
Report
Name Email  
15.
What is the chronological order in which the following security standards and certifications were defined?
1. 802.11-2012
2. 802.11i
3. WEP
4. WPA-2
5. WPA
  • A.
    3, 5, 2, 4, 1
  • B.
    3, 2, 5, 4, 1
  • C.
    3, 5, 2, 1, 4
  • D.
    1, 3, 2, 5, 4
  • F.
    1, 3, 5, 4, 2
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
WEP was defined in the original 802.11 standard. WPA was considered a partial preview of the 802.11i amendment. WPA-2 was defined as somewhat of a mirror of 802.11i. 802.11i was incorporated into the revised 802.11-2007 standard, which was later revised as the 802.11-2012 standard.
Report
Name Email