Page229

  1. Which of the following authentication protocols uses a three-way authentication handshake?
    A. CHAP
    B. EAP
    C. Kerberos
    D. PAP

  2. Restricting Bluetooth device discovery relies on the secrecy of what?
    A. MAC Address
    B. Symmetric Key
    C. Private Key
    D. Public Key

  3. Which wireless security protocol is also known as the RSN (Robust Security Network), and implements the full 802.11i standard?
    A. AES
    B. WEP
    C. WPA
    D. WPA2

  4. What is the correct order of TCP/IP encapsulation?
    A. Data, segments, packets, frames, bits
    B. Data, frames, segments, packets, bits
    C. Data, frames, packets, segments, bits
    D. Data, packets, segments, frames, bits

  5. Which transmission mode is supported by both HDLC and SDLC?
    A. Asynchronous Balanced Mode (ABM)
    B. Asynchronous Response Mode (ARM)
    C. Normal Balanced Mode (NBM)
    D. Normal Response Mode (NRM)

  6. What is the most secure type of EAP?
    A. EAP-TLS
    B. EAP-TTLS
    C. LEAP
    D. PEAP

  7. What WAN Protocol has no error recovery, relying on higher-level protocols to provide reliability?
    A. ATM
    B. Frame Relay
    C. SMDS
    D. X.25

  8. What frequencies are used by ZigBee in the United States?
    A. 784 MHz and 2.4 MHz
    B. 868 MHz and 2.4 MHz
    C. 915 MHz and 2.4 MHz
    D. 2.4 MHz and 6 MHz

  9. Accessing an IPv6 network via an IPv4 network is called what?
    A. CIDR
    B. NAT
    C. Translation
    D. Tunneling