Page413
- What are the names of the OSI model, in order from bottom to top?
A. Physical, Data Link, Transport, Network, Session, Presentation, Application
B. Physical, Network, Data Link, Transport, Session, Presentation, Application
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Physical, Data Link, Network, Transport, Presentation, Session, Application
Correct Answer and Explanation: C. Answer C is correct; the OSI model from bottom to top is: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Remember "Please Do Not Throw Sausage Pizza Away" as a useful mnemonic to remember this.
Incorrect Answers and Explanations: A, B, and D. Answers A, B, and D are incorrect. All are in the wrong order.
- Which of the following authentication protocols uses a three-way authentication handshake?
A. CHAP
B. EAP
C. Kerberos
D. PAP
Correct Answer and Explanation: A. Answer A is correct; CHAP (Challenge Handshake Authentication Protocol) uses a three-way authentication handshake.
Incorrect Answers and Explanations: B, C, and D. Answers B, C, and D are incorrect. EAP is the Extensible Authentication Protocol, an authentication framework describing multiple authentication methods. Kerberos is a Single Sign-On system that uses tickets. PAP is the Password Authentication Protocol, which is simpler (and has fewer steps) than CHAP.
- Restricting Bluetooth device discovery relies on the secrecy of what?
A. MAC Address
B. Symmetric Key
C. Private Key
D. Public Key
Correct Answer and Explanation: A. Answer A is correct; Restricting Bluetooth device discovery relies on the secrecy of the 48-bit Bluetooth MAC address.
Incorrect Answers and Explanations: B, C, and D. Answers B, C, and D are incorrect. While E0 is a symmetric cipher, it not used to restrict discovery (it is used to encrypt data). Public or Private keys are also not used for Bluetooth discovery.
- Which wireless security protocol is also known as the RSN (Robust Security Network), and implements the full 802.11i standard?
A. AES
B. WEP
C. WPA
D. WPA2
Correct Answer and Explanation: D. Answer D is correct; WPA2 (Wi-Fi Protected Access 2) implements AES and CCMP (Counter Mode CBC MAC Protocol), as defined by 802.11i.
Incorrect Answers and Explanations: A, B, and C. Answers A, B, and C are incorrect. AES is part of WPA2, which also includes CCMP, so it is a weaker answer than WPA2. WEP is Wired Equivalent Privacy, an older and insecure security protocol that should no longer be used. WPA is less secure than WPA2, using RC4 and TKIP.
- What is the correct order of TCP/IP encapsulation?
A. Data, segments, packets, frames, bits
B. Data, frames, segments, packets, bits
C. Data, frames, packets, segments, bits
D. Data, packets, segments, frames, bits
Correct Answer and Explanation: A. Answer A is correct: The correct order of TCP/IP encapsulation is data, segments, packets, frames, bits.
Incorrect Answers and Explanations: B, C, and D. Answers B, C, and D are all incorrect. They list the incorrect order of TCP/IP encapsulation.