Home
You may like this!
71.
WEP is designed to offer security comparable to which of the following?
  • A.
    Bluetooth
  • B.
    Wired networks
  • C.
    IrDA
  • D.
    IPv6
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
WEP is intended to offer security comparable to that experienced on traditional wired networks. In practice the security has been less than intended.
Report
Name Email  
72.
Which of the following operates at 5 GHz?
  • A.
    802.11a
  • B.
    802.11b
  • C.
    802.11g
  • D.
    802.11i
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
802.11a operates exclusively at the 5 GHz frequency range, whereas 802.11b and 802.11g operate at the 2.54 GHz range. The newer 802.11n standard can operate at both frequency ranges.
Report
Name Email  
73.
Which of the following specifies security standards for wireless?
  • A.
    802.11a
  • B.
    802.11b
  • C.
    802.11g
  • D.
    802.11i
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
802.11i specifies security standards for wireless and is not concerned with specifying new network standards for communication. WPA and WPA2 are designed to be compatible with this standard.
Report
Name Email  
74.
Which of the following options shows the protocols in order from strongest to weakest?
  • A.
    WPA, WEP, WPA2, Open
  • B.
    WEP, WPA2, WPA, Open
  • C.
    Open, WPA, WPA2, WEP
  • D.
    WPA2, WPA, WEP, Open
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
WEP is by far the weakest of the protocols here; WPA is the next stronger, and WPA2 is the strongest of the group. Open implies little or no protection at all.
Report
Name Email  
75.
Which of the following is designed to locate wireless access points?
  • A.
    Site survey
  • B.
    Traffic analysis
  • C.
    Pattern recognition
  • D.
    Cracking
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
The purpose of a site survey is to map out a site and locate access points and other wireless-enabled devices.
Report
Name Email