Review Questions

1. Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA?

A. WEP

B. WTLS

C. WAP

D. WOP

2. Which protocol operates on 2.4GHz and has a bandwidth of 1 Mbps or 2 Mbps?

A. 802.11

B. 802.11a

C. 802.11b

D. 802.11g

3. You’re outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network?

A. WAP

B. WTLS

C. WPA2

D. IR

4. Which of the following is a primary vulnerability of a wireless environment?

A. Decryption software

B. IP spoofing

C. A gap in the WAP

D. Site survey

5. Which of ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.