Page 794 - StudyBook.pdf
P. 794
778 Appendix • Self Test Appendix
Chapter 4:
Communication Security: Wireless
1. You have created a wireless network segment for your corporate network and are using WEP
for security.Which of the following terms best describes the APs and the clients who want to
connect to this wireless network?
A. Key Sharer and Key Requester
B. Applicants and Supplicants
C. Servers and Clients
D. Authenticators and Supplicants
E. All of the above
D. When using the 802.1x authentication standard Wired Equivalent Privacy (WEP) the APs
are called the authenticators and the clients who want to connect to them are called the suppli-
cants.Answers A, B, C and E are invalid.
2. What can be implemented in a wireless network to provide authentication, data and privacy
protection?
A. WTLS
B. WEP
C. WAP
D. WSET
Answer A is correct. In a wireless network WTLS (Wireless Transport Layer Security) can be
used to specifically provide authentication, data and privacy protection. Choices B, C and D are
incorrect.
3. You are tasked with creating a new wireless network for corporate users. However, your CEO
is very concerned about security and the integrity of the rest of the company’s network.You
assure your CEO that the new wireless network will be secure by suggesting you will place
the wireless network APs in a special area.Where will you place the wireless APs?
A. Your office
B. The CEO’s office
C. A DMZ
D. A secured server room
E. A fresnel zone
www.syngress.com