Lesson 2 Quiz Answers

1.) The correct answer is: c. Wi-Fi Protected Access Version 2 (WPA2)
VLANs do not provide encryption; WEP and WPA use the RC4 cipher to encrypt data. The Advanced Encryption Standard (AES) used by WPA2 is much stronger -- and more efficient.

<< Back to quiz

2.) The correct answer is: e. All of the above
WPA uses all of these measures: TKIP and MIC to protect data, and either PSK (WPA-Personal) or 802.1X (WPA-Enterprise) to control WLAN access by authenticated stations or users.

<< Back to quiz

3.) The correct answer is: b. Wi-Fi Protected Access (WPA)
The WPA draft of the 802.11i standard applies only to Infrastructure Mode WLANs, where stations communicate through an AP. The final 802.11i standard (WPA2) includes support for Ad Hoc Mode too.

<< Back to quiz

4.) The correct answer is: d. Mobile VPN
PPTP, IPsec and SSL tunnels are disconnected whenever a station roams from one network to another and gets a new IP address. Mobile VPNs work in varied ways, but are generally designed to enable session persistence when roaming between WLANs, WWANs and other networks.

<< Back to quiz

5.) The correct answer is: d. All of the above
VLANs divide any LAN into logical workgroups, independent of physical location. The three scenarios listed above are the most common reasons for applying VLAN tags to wireless traffic.

>> Move to Lesson 3: How to implement secure access

<< Return to Lesson 2 quiz

This was last published in February 2006

Dig Deeper on Wireless network security



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.








  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...