// All source files and native code may not be transmitted, reproduced, distributed, 
// or commercially exploited in any way without the express written consent of Sybex Inc.

//MOST THINGS THAT CHANGE

//CHAPTER TITLE
var TestChapter:String = "Chapter 10";

var user_Correct:Array = new Array("ABE","AD","B","C","E","B","A","A","D","C","B","D","AC","C","B","B","B","B","C","A");

total = user_Correct.length;
_root.countdown = false;
// set to false to make the timer count up //
_root.hour = 0;
// number of hours at start//
_root.minute = 0;
// number of minutes at start//
//DON'T FORGET THE QUESTIONS AT THE END
//END OF MOST THINGS THAT CHANGE
//
//
//The following is used in the timer mc for adjusting the clock.
_root.delay = false;
_root.wait = 60;
//wait in seconds
_root.lastTime = Math.floor(getTimer()/1000);
i = 1;
totalCorrect = 0;
totalWrong = 0;
QCounter.QTotal.text = total;
Test_Title.text = TestChapter;
var finalCorrect:Number;
var userResponse:Array = new Array(total);
var markResponse:Array = new Array(total);
user_responseA = "";
user_responseB = "";
user_responseC = "";
user_responseD = "";
user_responseE = "";
user_responseF = "";
user_responseG = "";
user_responseH = "";
user_responseI = "";
user_responseJ = "";
user_responseK = "";
user_responseL = "";
user_responseM = "";
user_responseN = "";
_root.review = false;

function initialize() {
	_root.review = false;
	for (j=0; j<total; j++) {
		userResponse[j] = "";
		markResponse[j] = "";
	}
	
}

function showMatch() {
	set("user_response"+i, user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN);
	userResponse[i-1] = user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN;
}

// display multiple choice user_response answer function
function display() {
	set("user_response"+i, user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN);
	userResponse[i-1] = user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN;

	//**NEW
	response.text = userResponse[i-1];
	
}

//radio button function
function answer(choice) {
	set("user_response"+i, choice);
	userResponse[i-1] = choice;
	
	//**NEW
	response.text = userResponse[i-1];	
}

// marker button fuction
function mark(choice) {
	_root["mark"+i] = choice;
	markResponse[i-1] = choice;
}

// display fill in the blank by user.
function submit(userInput) {
	_root["user_response"+i] = userInput;
}

function reset() {
	_root["user_response"+i] = "";
}

function UnloadReview() {
	//ReviewLinks.unloadMovie();
}


function LayoutQuestion() {

	qname = "q"+(_root._currentframe-1);
	
	markname = "m"+(_root._currentframe-1);
	
	_root.loadQuestion(_root._currentframe-1);	
	
	_root.createEmptyMovieClip("container", 1);

	_root.attachMovie("Marker_mc", markname, 2, {_x:65.4, _y:55.4});
	
	if (_root.question_type == "2R") { this.attachMovie("2R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "3R") { this.attachMovie("3R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "3MC") { this.attachMovie("3MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "4R") { this.attachMovie("4R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "4MC") { this.attachMovie("4MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "5R") { this.attachMovie("5R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "5MC") { this.attachMovie("5MC", qname, 1, {_x:24, _y:165}); }	
	if (_root.question_type == "6R") { this.attachMovie("6R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "6MC") { this.attachMovie("6MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "7R") { this.attachMovie("7R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "7MC") { this.attachMovie("7MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "8R") { this.attachMovie("8R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "8MC") { this.attachMovie("8MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "9R") { this.attachMovie("9R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "9MC") { this.attachMovie("9MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "10R") { this.attachMovie("10R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "10MC") { this.attachMovie("10MC", qname, 1, {_x:24, _y:165}); }


	if (_root.review == false) { _root.attachMovie("show_answer", "show_answer1", 3, {_x:72, _y:418}); }
	if (_root.review == true)  { _root.attachMovie("show_review", "show_review1", 3, {_x:72, _y:418}); }
        if (_root.figure_flag == "True") { _root.attachMovie("show_figure", "show_figure1", 6, {_x:72, _y:418}); }
        if (_root.figure_flag == "False") { _root.createEmptyMovieClip("container", 6); }        

	question_scroll._visible = (question_text.maxscroll > 1);
	question_scroll.setSize(85,16); 
	
	//**NEW
	response.text = userResponse[i-1];
}

function loadQuestion(inNum:Number) {
	var cur:Number = inNum;
	//This corrects for the first frame holding all functions
	//QUESTIONS AND ANSWERS CAN ACCEPT HTML FORMATTING!!!
	//EACH QUESTION SHOULD BE FORMATTED SIMILAR TO THE FOLLOWING.

	switch (cur) {
case 1 :
_root.question = "Which security methods do 802.11g access points support? (Choose three.)";
_root.answerA = "WPA Enterprise";
_root.answerB = "WEP";
_root.answerC = "PPTP";
_root.answerD = "RBAC";
_root.answerE = "MAC filters";
_root.answerF = "IPSec";
_root.correct = "ABE";
_root.explanation = "WPA Enterprise, WEP, and MAC filtering can all be used to secure 802.11g access points. PPTP is a Layer 3 security solution that consists of both tunneling and encryption. IPSec is a Layer3 VPN encryption mechanism. RBAC stands for role-based access control and is a way of restricting access to only authorized users.";
_root.figure_flag = "False";
_root.question_type = "6MC";
break;

case 2 :
_root.question = "Both ___________ and ___________ are wireless LAN security methods that support shared key security. (Choose two.)";
_root.answerA = "WPA2 Personal";
_root.answerB = "WPA2 Enterprise";
_root.answerC = "802.1X/EAP";
_root.answerD = "WEP";
_root.answerE = "WPA Enterprise";
_root.correct = "AD";
_root.explanation = "Both WPA2 Personal and WEP support shared key security. The WPA2 Personal algorithm creates a 256-bit preshared key. WEP can be used with either a 64-bit or 128-bit key. WPA Enterprise, 802.1X/EAP, and WPA2 Enterprise all use the 802.1X process to create a key.";
_root.figure_flag = "False";
_root.question_type = "5MC";
break;

case 3 :
_root.question = "Which security feature provides the strongest security for a home-based wireless network?";
_root.answerA = "SSID hiding";
_root.answerB = "Passphrase";
_root.answerC = "MAC filters";
_root.answerD = "128-bit WEP";
_root.correct = "B";
_root.explanation = "Passphrases are available for use with WPA Personal or WPA2 Personal and are capable of providing strong security for the home user or small office. SSID hiding should not be used for security because the SSID can be found in frames other than beacons. MAC filters are considered legacy solutions and can be easily spoofed using software downloadable from the Internet. 128-bit WEP can be cracked very quickly using software tools and is therefore not a secure solution.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 4 :
_root.question = "You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using an 802.11g hotspot access point at the airport. In order to provide a secure connection, you would enable your notebook computer to use ______________________________.";
_root.answerA = "Passphrase security";
_root.answerB = "WEP";
_root.answerC = "A VPN to the office network";
_root.answerD = "802.1X/EAP to the office network";
_root.correct = "C";
_root.explanation = "In order to provide a secure connection between your laptop and the office network, a Layer 3 VPN solution would be the best choice. Passphrase security and WEP require the access point to be configured and this typically is not the case in public hotspots. 802.1X/EAP is enterprise security and usually does not apply to public hotspots.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 5 :
_root.question = "A _______________ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.";
_root.answerA = "WEP";
_root.answerB = "IPSec";
_root.answerC = "SSID";
_root.answerD = "RF";
_root.answerE = "MAC";
_root.correct = "E";
_root.explanation = "A MAC filter is used to allow or deny wireless LAN devices access to wireless access point. WEP is a shared key security mechanism. IPSec encryption is used in Layer 3 VPNs. SSIDs are used as a network name and for segmentation. RF is radio frequency and cannot be filtered.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 6 :
_root.question = "The security amendment to the IEEE 802.11 standard requires ______________.";
_root.answerA = "WEP";
_root.answerB = "CCMP";
_root.answerC = "TKIP";
_root.answerD = "PPTP";
_root.answerE = "VPN";
_root.correct = "B";
_root.explanation = "The IEEE 802.11i amendment to the standard requires CCMP. WEP is an optional authentication/encryption method defined in the original 802.11 standard. TKIP is an enhancement to WEP that usually was accomplished as a firmware upgrade for older equipment. PPTP and VPN are both Layer 3 solutions and not defined in any IEEE wireless amendment.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 7 :
_root.question = "Which process is a VPN solution intended to provide for users connecting to a network?";
_root.answerA = "Secure Layer 3 transmissions over a public network infrastructure";
_root.answerB = "Secure Layer 2 transmissions over a public network infrastructure";
_root.answerC = "Secure Layer 3 transmissions over a corporate network infrastructure";
_root.answerD = "Secure Layer 2 transmissions over a corporate network infrastructure";
_root.correct = "A";
_root.explanation = "A virtual private network (VPN) is a Layer 3 security solution that provides secure data transmissions over a public network infrastructure such as the Internet. WEP, WPA, 802.1X/EAP, and WPA 2.0 are examples of Layer 2 security solutions.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 8 :
_root.question = "Which function does RBAC provide?";
_root.answerA = "Restricts access to authorized users";
_root.answerB = "Provides access to only network administrators";
_root.answerC = "Streamlines hardware installation";
_root.answerD = "Allows users to install software";
_root.correct = "A";
_root.explanation = "Role-based access control (RBAC) is a method used to restrict access only to authorized users. RBAC assigns permissions or access to roles to which users can be added.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 9 :
_root.question = "Hiding the Service Set Identifier of a wireless LAN will require a user to _____________ in order to gain access to the wireless network.";
_root.answerA = "Enter a username and password when prompted";
_root.answerB = "Call the help desk and ask for a new password";
_root.answerC = "Enable the SSID broadcast on the client device";
_root.answerD = "Know the SSID and enter it manually";
_root.correct = "D";
_root.explanation = "If the SSID of the wireless network is hidden, the user will need knowledge of the SSID in order to connect to the wireless network. The SSID broadcast is only enabled on an access point or wireless LAN controller/switch. Getting a new password from the help desk will not provide the SSID of the wireless network. Entering a username and password is user-based authentication.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 10 :
_root.question = "The Remote Authentication Dial In User Service (RADIUS) service requires users on a wireless network to perform what function?";
_root.answerA = "Access the corporate network using only the PSTN and a modem";
_root.answerB = "Call in to the help desk service and request a username and password";
_root.answerC = "Enter a username and password that will be centrally administered";
_root.answerD = "Request remote assistance to help solve a software problem on a computer";
_root.correct = "C";
_root.explanation = "RADIUS is a centralized authentication method that is used to authenticate users on a wireless network. Accessing a corporate network using a modem is a function of remote access services. Making a call to the help desk and requesting a username and password is not a function of RADIUS; however, the help desk may be able to assist with username and password issues. Requesting remote assistance to help solve a software problem is more related to troubleshooting and not a function of RADIUS.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 11 :
_root.question = "The IEEE 802.1X standard identifies the authenticator as another term for the _____________ in wireless networking.";
_root.answerA = "Client device";
_root.answerB = "Access point";
_root.answerC = "RADIUS server";
_root.answerD = "EAP server";
_root.correct = "B";
_root.explanation = "In 802.1X networking, the access point is also known as the authenticator. The supplicant is another term for the client device, and the authentication server can be a RADIUS or AAA authentication source.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 12 :
_root.question = "Which data encryption/authentication method is identified in the IEEE 802.11 standard?";
_root.answerA = "TKIP";
_root.answerB = "AES";
_root.answerC = "CCMP";
_root.answerD = "WEP";
_root.answerE = "EAP";
_root.correct = "D";
_root.explanation = "The original IEEE 802.11 standard identifies WEP as an optional authentication/encryption method. AES and CCMP are addressed in the 802.11i amendment to the standard. TKIP is an enhancement to WEP and not identified in the original standard. EAP provides an authentication process and is used with 802.1X networks.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 13 :
_root.question = "You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently set to channel 6. Which problem could be causing the alert? (Choose two.)";
_root.answerA = "Interference from a neighboring access point";
_root.answerB = "RF deauthentication storm";
_root.answerC = "RF denial-of-service (DoS) attack";
_root.answerD = "Misconfigured client workstation";
_root.answerE = "RF encryption attack";
_root.correct = "AC";
_root.explanation = "Higher levels of RF reported by an intrusion prevention system could mean an RF denial-of-service attack is underway or could be misrepresented as interference from a neighboring access point. A deauthentication storm or encryption attack would be identified differently in a wireless intrusion prevention system. A misconfigured client workstation would not cause this type of alert.";
_root.figure_flag = "False";
_root.question_type = "5MC";
break;

case 14 :
_root.question = "The length of a WEP key is typically ______________ or ____________.";
_root.answerA = "5-bit, 10-bit";
_root.answerB = "13-bit, 26-bit";
_root.answerC = "64-bit, 128-bit";
_root.answerD = "128-bit, 256-bit";
_root.answerE = "192-bit, 256-bit";
_root.correct = "C";
_root.explanation = "WEP is typically 64-bit or 128-bt encryption. The numbers 5, 10, 13, and 26 are related to the number of characters the WEP key can be in either in ASCII or hexadecimal.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 15 :
_root.question = "Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?";
_root.answerA = "WEP";
_root.answerB = "PIN";
_root.answerC = "WPA";
_root.answerD = "PBC";
_root.answerE = "TKIP";
_root.correct = "B";
_root.explanation = "PIN-based security is mandatory for both access points and client devices in order to be considered Wi-Fi Protected Setup certified. PBC or push-button security is optional for client devices in this certification. WPA is a pre-802.11i certification that addresses TKIP and is used in either SOHO or enterprise-based wireless networks. Wi-Fi Protected Setup is not intended for enterprise WLAN deployments.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 16 :
_root.question = "A newly configured wireless intrusion prevention system will __________________.";
_root.answerA = "Require a network administrator to monitor for intrusions";
_root.answerB = "Automatically monitor the network for potential attacks";
_root.answerC = "Require an administrator to manually shut down a rogue access point";
_root.answerD = "Automatically notify a network administrator regarding a firmware upgrade";
_root.correct = "B";
_root.explanation = "A wireless intrusion prevention system will automatically monitor the network for signatures that match potential intrusion techniques. An intrusion prevention system has the capability to automatically shut down a rogue access point. An intrusion detection system requires a manual shutdown. A WIPS will not notify a network administrator of a recent firmware upgrade.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 17 :
_root.question = "You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation you could provide?";
_root.answerA = "Dont worry about securing the handsets because voice transmissions cannot be deciphered";
_root.answerB = "Carefully plan a strategy using WEP and VLANs";
_root.answerC = "Use a VPN solution with L2TP/IPSec";
_root.answerD = "Use a CCMP/AES Layer 2 solution";
_root.correct = "B";
_root.explanation = "If WEP must be used on a wireless network, the devices that use WEP should be separated using VLANs. This will protect the rest of the network from being compromised. Voice transmissions can be seen with the correct tools. CCMP/AES is available in newer devices that support the latest wireless security methods but is not available in older devices.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 18 :
_root.question = "A weakness with MAC filtering is that it allows an intruder to _____________________.";
_root.answerA = "Crack the encryption";
_root.answerB = "Spoof an address";
_root.answerC = "Cause an RF DoS attack";
_root.answerD = "Steal user authentication";
_root.correct = "B";
_root.explanation = "An intruder can spoof a MAC address in order to circumvent the MAC filter and gain access to the wireless network. Encryption cracking is a different form of intrusion that also could possibly allow an intruder to steal a users authentication credentials. An RF denial-of-service attack is caused by transmitting high energy RF to prevent access to the wireless network.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 19 :
_root.question = "What type of wireless network device is PIN-based security most commonly used with?";
_root.answerA = "SOHO brands that support WPA 2.0";
_root.answerB = "Enterprise brands that support WPA 2.0";
_root.answerC = "SOHO brands that support WPS";
_root.answerD = "Enterprise brands that support WPS";
_root.correct = "C";
_root.explanation = "PIN-based security is usually used with SOHO brand wireless devices that support Wi-Fi Protected Setup certification (WPS). The devices are typically used in small office/home office installations or by home-based users. WPA 2.0 solutions can use either passphrase or 802.1X/EAP.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 20 :
_root.question = "Layer 2 Tunneling Protocol commonly uses which encryption method?";
_root.answerA = "IPSec";
_root.answerB = "PPTP";
_root.answerC = "AES";
_root.answerD = "WEP";
_root.answerE = "MPPE";
_root.correct = "A";
_root.explanation = "Layer 2 Tunneling Protocol (L2TP) commonly uses IPSec for encryption. PPTP is another VPN method that uses MPPE 128-bit encryption. AES and WEP are used with Layer 2 802.11-based wireless networks.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

	}
		
	QCounter.QCurrent.text = cur;
}

initialize();


//Change the following question numbers to the indicated question type!
//1. 6MC
//2. 5MC
//3. 4R
//4. 4R
//5. 5R
//6. 5R
//7. 4R
//8. 4R
//9. 4R
//10. 4R
//11. 4R
//12. 5R
//13. 5MC
//14. 5R
//15. 5R
//16. 4R
//17. 4R
//18. 4R
//19. 4R
//20. 5R





//