1. (p. 425) Which of the following is the most popular wireless networking standard?
A. IEEE 802.4
B. IEEE 802.16
C. IEEE 802.11
D. IEEE 802.3
A. IEEE 802.4
B. IEEE 802.16
C. IEEE 802.11
D. IEEE 802.3
2. (p. 427) Which of the following are wireless network modes? (Select all that apply.)
A. Wireless B
B. infrastructure
C. ad hoc
D. extended
A. Wireless B
B. infrastructure
C. ad hoc
D. extended
3. (p. 428) What type of unit is formed by one or more wireless nodes communicating in ad hoc mode?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
4. (p. 428) What type of unit is formed by a single WAP servicing a given area?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
5. (p. 428) What type of unit is formed by two or more WAPs servicing a given area?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
6. (p. 429) What is the term for the name attached to an infrastructure mode wireless network serviced by a single WAP and including at least one wireless node?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)
7. (p. 429) What is used as the BSSID for a BSS?
A. the MAC address of the WAP
B. a randomly generated value
C. a user-supplied name
D. the name of the manufacturer
A. the MAC address of the WAP
B. a randomly generated value
C. a user-supplied name
D. the name of the manufacturer
8. (p. 429) What do wireless nodes in an IBSS use in place of the BSSID value in each packet?
A. the MAC address of the WAP
B. a randomly generated value
C. a user-supplied name
D. the name of the manufacturer
A. the MAC address of the WAP
B. a randomly generated value
C. a user-supplied name
D. the name of the manufacturer
9. (p. 430) What is the term or terms for the second level of naming in a Wi-Fi network that can be applied in either ad hoc mode or infrastructure mode? (Select all that apply.)
A. network name
B. supplicant
C. Service Set Identifier (SSID)
D. Extended Service Set Identifier (ESSID)
E. Both A, C, and D
A. network name
B. supplicant
C. Service Set Identifier (SSID)
D. Extended Service Set Identifier (ESSID)
E. Both A, C, and D
10. (p. 429) Which status term applies to whether your wireless device is connected?
A. mode
B. link state
C. signal strength
D. access
A. mode
B. link state
C. signal strength
D. access
11. (p. 427) Which term applies to how well your wireless device is connecting to other devices?
A. mode
B. link state
C. signal strength
D. access
A. mode
B. link state
C. signal strength
D. access
12. (p. 430) Which of the following is the broadcasting method used by later implementations of 802.11 networks?
A. BSS
B. FHSS
C. DESSS
D. OFDM
A. BSS
B. FHSS
C. DESSS
D. OFDM
13. (p. 430) Which of the following is used to describe a portion of available spectrum?
A. channel
B. frame
C. frequency
D. interframe space
A. channel
B. frame
C. frequency
D. interframe space
14. (p. 430) How many channels were defined by the 802.11 standard?
A. 8
B. 14
C. 16
D. 32
A. 8
B. 14
C. 16
D. 32
15. (p. 430) Which of the channels defined by the 802.11 standard may be used in the United States?
A. 1 through 11
B. 8 through 24
C. 2 through 32
D. 16 through 32
A. 1 through 11
B. 8 through 24
C. 2 through 32
D. 16 through 32
16. (p. 431) Which of the following choices are collision avoidance methods defined by the 802.11 standard? (Select all that apply.)
A. CSMA/CA
B. Point Coordination Function (PCF)
C. Distributed Coordination Function (DCF)
D. CSMA/CD
E. Both B and C
A. CSMA/CA
B. Point Coordination Function (PCF)
C. Distributed Coordination Function (DCF)
D. CSMA/CD
E. Both B and C
17. (p. 431) What is the term used to explain what happens when packets are sent out on a network by two devices simultaneously, corrupting both packets?
A. channeling
B. collision
C. transmit beamforming
D. interframe space
A. channeling
B. collision
C. transmit beamforming
D. interframe space
18. (p. 431) This term describes the predetermined silence period that is added to the length of a packet to determine the waiting period for a network device after it has detected traffic on the media.
A. interframe gap
B. wait time
C. PCF
D. link state
A. interframe gap
B. wait time
C. PCF
D. link state
19. (p. 433) Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is downward compatible with an earlier, popular Wi-Fi standard?
A. 802.11g
B. 802.11b
C. 802.n
D. 802.11a
A. 802.11g
B. 802.11b
C. 802.n
D. 802.11a
20. (p. 433) Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies?
A. 802.11g
B. 802.11b
C. 802.n
D. 802.11a
A. 802.11g
B. 802.11b
C. 802.n
D. 802.11a
21. (p. 434) Which of the following is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?
A. 802.1X
B. WEP
C. MAC address filtering
D. WPA
A. 802.1X
B. WEP
C. MAC address filtering
D. WPA
22. (p. 435) Which standard includes secure authentication using a RADIUS server and password encryption using EAP?
A. IEEE 802.1X
B. WEP
C. MAC address filtering
D. WPA
A. IEEE 802.1X
B. WEP
C. MAC address filtering
D. WPA
23. (p. 436) This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)
24. (p. 437) This encryption standard uses a 128-bit block cipher that is more difficult to crack than the 128-bit TKIP wrapper of the previous standard.
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)
25. (p. 441) What is the gain of the typical WAP antenna?
A. 11 dB
B. 54 dB
C. 2 dB
D. 10 dB
A. 11 dB
B. 54 dB
C. 2 dB
D. 10 dB
26. (p. 442) When configuring a WAP, set this to something unique and easily identified, and follow up by giving this same name on all wireless hosts that should connect to this network.
A. MAC address
B. SSID
C. user name
D. password
A. MAC address
B. SSID
C. user name
D. password
27. (p. 444) Which settings should be modified when you have overlapping Wi-Fi signals? (Select all that apply.)
A. WPA2
B. beacon
C. channel
D. frequency
E. both C and D
A. WPA2
B. beacon
C. channel
D. frequency
E. both C and D
28. (p. 447) What method of extending a wireless network creates an Extended Service Set?
A. installing a wireless bridge
B. adding a WAP
C. creating an IBSS
D. installing a router
A. installing a wireless bridge
B. adding a WAP
C. creating an IBSS
D. installing a router
29. (p. 447) Which of the following describes a type of wireless bridge that can only communicate with a single other bridge, and therefore is used to connect just two wireless network segments?
A. dipole
B. omnidirectional
C. point-to-multipoint
D. point-to-point
A. dipole
B. omnidirectional
C. point-to-multipoint
D. point-to-point
30. (p. 449) When troubleshooting a potential wireless hardware problem, open this Windows utility to see if there is an error or conflict with the wireless adapter.
A. My Network Places
B. Device Manager
C. Network Access Server (NAS)
D. Task Manager
A. My Network Places
B. Device Manager
C. Network Access Server (NAS)
D. Task Manager
31. (p. 430) Most WAPs use one of the following channels by default EXCEPT:
A. 1
B. 9
C. 6
D. 11
A. 1
B. 9
C. 6
D. 11
32. (p. 436) Which of the following are weaknesses in WEP that allow it to be easily cracked? (Select all that apply.)
A. size of the encryption key
B. use of AES
C. use of 802.1X
D. faulty implementation of the RC4 protocol
E. both A and D
A. size of the encryption key
B. use of AES
C. use of 802.1X
D. faulty implementation of the RC4 protocol
E. both A and D
33. (p. 447) If you are installing a new WAP, and it is near another WAP, what is one way to reduce interference?
A. Different ESSIDs should be assigned.
B. The new WAP should be switched to 5.0 GHz.
C. Separate channels should be used.
D. The existing WAP should be switched to mixed mode.
A. Different ESSIDs should be assigned.
B. The new WAP should be switched to 5.0 GHz.
C. Separate channels should be used.
D. The existing WAP should be switched to mixed mode.
34. (p. 432) All of the following items can cause interference to wireless networks in the 2.4-GHz range EXCEPT:
A. older wireless phones
B. other WAPS
C. microwave ovens
D. FM radios
A. older wireless phones
B. other WAPS
C. microwave ovens
D. FM radios
35. (p. 436) Which of the following key sizes does WEP use? (Select all that apply.)
A. 128 bits
B. 104 bits
C. 40 bits
D. 64 bits
E. Both B and C
A. 128 bits
B. 104 bits
C. 40 bits
D. 64 bits
E. Both B and C
No comments:
Post a Comment