CWSP post-chapter Questions and Answers
The IEEE 802.11-2012 standard mandates this encryption for robust security network associations and the optional use of which other encryption?
CCMP, TKIP
What wireless security solutions are defined by Wi-Fi Protected Access?
Passphrase authenticatio...
CWSP post-chapter Questions and
Answers
The IEEE 802.11-2012 standard mandates this encryption for robust security network
associations and the optional use of which other encryption? - answer CCMP, TKIP
What wireless security solutions are defined by Wi-Fi Protected Access? - answer
Passphrase authentication, TKIP/ARC4
Which wireless security standards and certifications call for the use of CCMP/AES
encryption? - answer 802.11-2012, WPA2
A robust security network (RSN) requires the use of which security mechanisms? -
answer CCMP/AES, 802.1X
The Wi-Fi Alliance is responsible for which of the following certification programs? -
answer WPA2, WMM
Which sublayer of the OSI model's Data-Link layer is used for communication between
802.11 radios? - answer MAC
What encryption methods are defined by the IEEE 802.11-2012 standard? - answer
TKIP, CCMP, WEP
Which organization is responsible for the creation of documents known as Requests for
Comments? - answer IETF
Which of the following is not a standard or amendment created by the IEEE? - answer
802.11X, 802.1x, 802.11N
TKIP can be used with which of the following? - answer By default, WPA-Personal
and WPA-Enterprise use TKIP for encryption. WPA-2 Personal, WPA-2 Enterprise, and
802.11-2012 (RSN) mandate the use of CCMP, but TKIP is optional. TKIP is essentially
being phased out because the IEEE and Wi-Fi Alliance mandate the use of only CCMP
encryption for 802.11n and 802.11ac data rates.
What is simply a means of representing information in a different way? - answer
Code
What wireless security components are mandatory under WPA version 2 - answer
802.1X/EAP, CCMP/AES
, An AP advertising an 802.1X/EAP employee SSID along with a guest SSID is
considered to be operating what type of network device? - answer Access. Core
devices perform high-speed switching as part of the backbone of the network.
Distribution devices route traffic between VLANs and subnets. Access devices provide
connectivity directly to the wireless end user. The OSI network layer and session layer
are not involved with wireless communications.
The science of concealing plaintext and then revealing it is known as ___________, and
the science of decrypting the ciphertext without knowledge of the key or cipher is known
as ____________. - answer cryptography, cryptanalysis
What is the chronological order in which the following security standards and
certifications were defined? - answer WEP was defined in the original 802.11
standard. WPA was considered a partial preview of the 802.11i amendment. WPA-2
was defined as somewhat of a mirror of 802.11i. 802.11i was incorporated into the
revised 802.11-2007 standard, which was later revised as the 802.11-2012 standard.
The 802.11 legacy standard defines which wireless security solution? - answer 64-bit
static WEP. The original 802.11 standard ratified in 1997 defined the use of a 64-bit or
128-bit static encryption solution called Wired Equivalent Privacy (WEP). Dynamic WEP
was never defined under any wireless security standard. The use of 802.1X/EAP,
TKIP/ARC4, and CCMP/AES is defined under the current 802.11-2012 standard.
These qualifications for interoperability are usually based on key components and
functions that are defined in the IEEE 802.11-2012 standard and various 802.11
amendments. - answer Wi-Fi CERTIFIED
what can be used with a wireless network to segment or restrict access to parts of the
network? - answer VLANs, Firewall, RBAC
802.1X/EAP is mandatory in an enterprise environment: T/F? - answer TRUE: WPA
Enterprise, WPA-2 Enterprise.
Monitoring potentially malicious wireless activity on the network is handled by
_____________, whereas intrusion remediation and mitigation is handled by
__________________________. - answer WIDS, WIPS
Before an 802.11 client STA can pass traffic through the AP, what must occur? - answer
Association and Authentication. In order for a client to connect to the WLAN and pass
data, the client must authenticate and associate to the AP. The other three choices
could occur, but do not have to.
What is contained in a WEP-encrypted frame? - answer IV in cleartext format, Key
identifier
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Pogba119. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.