Review Questions
1. Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA?
A. WEP
B. WTLS
C. WAP
D. WOP
2. Which protocol operates on 2.4GHz and has a bandwidth of 1 Mbps or 2 Mbps?
A. 802.11
B. 802.11a
C. 802.11b
D. 802.11g
3. You’re outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network?
A. WAP
B. WTLS
C. WPA2
D. IR
4. Which of the following is a primary vulnerability of a wireless environment?
A. Decryption software
B. IP spoofing
C. A gap in the WAP
D. Site survey
5. Which of ...
Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.