Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 14 Q&A

1:

List three categories of WLANs.

A1:

Answer: Types of WLANs include peer-to-peer, LAN, and hotspots.

2:

Which IEEE standards define WLANs?

  1. IEEE 802.3

  2. IEEE 802.5

  3. IEEE 802.11

  4. IEEE 802.10

A2:

Answer: c. IEEE 802.11 is the IEEE standard that defines WLANs.

3:

The IEEE 802.11 standard specifies the over-the-air interface between what two entities?

A3:

Answer: The IEEE 802.11 standard specifies the over-the-air interface between a wireless client and a base station.

4:

What are the correct parameters for the 802.11b standard?

  1. 2.4 GHz, 11 Mbps, and wireless office

  2. 5 GHz, 11 Mbps, and wireless office

  3. 2.4 GHz, 54 Mbps, and wireless office

  4. 5 GHz, 54 Mbps, and wireless office

A4:

Answer: a. The correct parameters for the 802.11b standard are as follows: 2.4 GHz, 11 Mbps, and wireless office.

5:

What are the correct parameters for the 802.11a standard?

  1. 2.4 GHz, 11 Mbps, and wireless office

  2. 5 GHz, 54 Mbps, and wireless office

  3. 2.4 GHz, 54 Mbps, and wireless office

  4. 5 GHz, 54 Mbps, and home entertainment

A5:

Answer: d. The correct parameters for the 802.11a standard are as follows: 5 GHz, 54 Mbps, and home entertainment.

6:

What does the acronym SSID stand for?

A6:

Answer: SSID stands for Service Set Identifier.

7:

List the three main security goals of the WEP protocol.

A7:

Answer: The three main security goals of the WEP protocol are as follows:

  • Confidentiality

  • Access control

  • Data integrity

8:

List the three components of the WEP protocol.

A8:

Answer: The three components of the WEP protocol are as follows:

  • Authentication framework

  • Authentication algorithm

  • Data privacy or encryption algorithm

9:

What is war-chalking?

A9:

Answer: War-chalking is the act of creating a language for indicating free Internet access. It can be best described as marking a series of well-defined symbols on sidewalks, walls, pillars, and other structures to indicate nearby wireless access.

10:

Security weaknesses in the IEEE 802.11 standard are addressed in which of the following?

  1. IEEE 802.11a

  2. IEEE 802.11b

  3. IEEE 802.11j

  4. IEEE 802.11iA10:

Answer: d. Security weaknesses in the IEEE 802.11 standard are addressed in IEEE 802.11i.


/ 196