WSEC Module 5 quiz/exam questions and answers



1. Each of the following is a reason to monitor a wireless network except

            a. predict when an attack may occur

            b. identify security threats

            c. verify compliance with federal regulations

            d. monitor scare wireless bandwidth


2. Managing a WLAN can be accomplished by using either a system specifically designed for wireless networks or

            a. Simple Network Management Protocol (SNMP)

            b. File Transfer Protocol (FTP)

            c. Wireless Management Protocol (WMP)

            d. Wired Equivalent Protocol (WEP)


3. Each of the following is a WLAN discovery tool to locate a wireless device except

            a. farthest sensor

            b. triangulation

            c. RF fingerprinting

            d. Received signal strength indication


4. An intrusion detection system is identical to a firewall. True or False?


5. A signature detection WIDS is susceptible to attacks if the matching attack signature is not in the database. True or False?


6.      A(n) _____ is an attack alert that turns out to be false. false positive


7. A(n) _____ attempts to uncover and prevent an attack before it harms the WLAN. wireless intrusion prevention system (WIPS)


8.  A WIPS that uses an existing access point to monitor the RF is known as a(n) _____ probe. integrated or embedded


9. One of the most important features of a WIPS is its ability to learn about the other _____ that are in the area and classify them. access point


10.  Explain the difference between triangulation and trilateration.

Triangulation measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device. Trilateration measures the distance between APs rather than the angles between them.


11.  How does RF fingerprinting work?

 RF fingerprinting uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself. A "fingerprint" of the wireless environment is first calculated by conducting a physical “walk-around” using a mobile spectrum analysis device. These measurements are later compared to deviations in the real-time environment to locate the client device.


12.  What is a desktop probe?

A desktop probe utilizes a standard desktop PC instead. An adapter is plugged into the desktop computer and it monitors the RF frequency in the area for transmissions.


13.  Describe an SNMP trap.

These monitors can be used to determining the “health” of a wireless LAN. A spike in a network’s bandwidth or a decrease in the time to respond to a request are signs that the network is running slow. These events are known as an SNMP trap. There are different actions that can be taken when an SNMP trap occurs. Generally an event alarm is issued and the proper personnel are notified.


14.  How can a WLAN management system be used to upgrade access point firmware?

 WLAN management systems provide the functionality of upgrading the firmware of access points. Firmware upgrade images can be imported and then applied to one AP, all APs, or groups of access points.