02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Review Questions 369<br />

Review Questions<br />

1. WEP is designed to offer security comparable to which of the following?<br />

A. Bluetooth<br />

B. Wired networks<br />

C. IrDA<br />

D. IPv6<br />

2. Which of the following operates at 5 GHz?<br />

A. 802.11a<br />

B. 802.11b<br />

C. 802.11g<br />

D. 802.11i<br />

3. Which of the following specifies security standards for wireless?<br />

A. 802.11a<br />

B. 802.11b<br />

C. 802.11g<br />

D. 802.11i<br />

4. Which of the following options shows the protocols in order from strongest to weakest?<br />

A. WPA, WEP, WPA2, Open<br />

B. WEP, WPA2, WPA, Open<br />

C. Open, WPA, WPA2, WEP<br />

D. WPA2, WPA, WEP, Open<br />

5. Which of the following is designed to locate wireless access points?<br />

A. Site survey<br />

B. Traffic analysis<br />

C. Pattern recognition<br />

D. Cracking<br />

6. What is a client-to-client wireless connection called?<br />

A. Infrastructure<br />

B. Client-server<br />

C. Peer-to-peer<br />

D. Ad hoc

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!