Saturday, 21 April 2018

Which of the following is the most popular wireless networking standard?

1. (p. 425) Which of the following is the most popular wireless networking standard?
A. IEEE 802.4
B. IEEE 802.16
C. IEEE 802.11
D. IEEE 802.3

2. (p. 427) Which of the following are wireless network modes? (Select all that apply.)
A. Wireless B
B. infrastructure
C. ad hoc
D. extended

3. (p. 428) What type of unit is formed by one or more wireless nodes communicating in ad hoc mode?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)

4. (p. 428) What type of unit is formed by a single WAP servicing a given area?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)

5. (p. 428) What type of unit is formed by two or more WAPs servicing a given area?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)

6. (p. 429) What is the term for the name attached to an infrastructure mode wireless network serviced by a single WAP and including at least one wireless node?
A. Basic Service Set (BSS)
B. Independent Basic Service Set (IBSS)
C. Basic Service Set Identifier (BSSID)
D. Extended Service Set (ESS)

7. (p. 429) What is used as the BSSID for a BSS?
A. the MAC address of the WAP
B. a randomly generated value
C. a user-supplied name
D. the name of the manufacturer

8. (p. 429) What do wireless nodes in an IBSS use in place of the BSSID value in each packet?
A. the MAC address of the WAP
B. a randomly generated value
C. a user-supplied name
D. the name of the manufacturer

9. (p. 430) What is the term or terms for the second level of naming in a Wi-Fi network that can be applied in either ad hoc mode or infrastructure mode? (Select all that apply.)
A. network name
B. supplicant
C. Service Set Identifier (SSID)
D. Extended Service Set Identifier (ESSID)
E. Both A, C, and D

10. (p. 429) Which status term applies to whether your wireless device is connected?
A. mode
B. link state
C. signal strength
D. access

11. (p. 427) Which term applies to how well your wireless device is connecting to other devices?
A. mode
B. link state
C. signal strength
D. access

12. (p. 430) Which of the following is the broadcasting method used by later implementations of 802.11 networks?
A. BSS
B. FHSS
C. DESSS
D. OFDM

13. (p. 430) Which of the following is used to describe a portion of available spectrum?
A. channel
B. frame
C. frequency
D. interframe space

14. (p. 430) How many channels were defined by the 802.11 standard?
A. 8
B. 14
C. 16
D. 32

15. (p. 430) Which of the channels defined by the 802.11 standard may be used in the United States?
A. 1 through 11
B. 8 through 24
C. 2 through 32
D. 16 through 32

16. (p. 431) Which of the following choices are collision avoidance methods defined by the 802.11 standard? (Select all that apply.)
A. CSMA/CA
B. Point Coordination Function (PCF)
C. Distributed Coordination Function (DCF)
D. CSMA/CD
E. Both B and C

17. (p. 431) What is the term used to explain what happens when packets are sent out on a network by two devices simultaneously, corrupting both packets?
A. channeling
B. collision
C. transmit beamforming
D. interframe space

18. (p. 431) This term describes the predetermined silence period that is added to the length of a packet to determine the waiting period for a network device after it has detected traffic on the media.
A. interframe gap
B. wait time
C. PCF
D. link state

19. (p. 433) Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is downward compatible with an earlier, popular Wi-Fi standard?
A. 802.11g
B. 802.11b
C. 802.n
D. 802.11a

20. (p. 433) Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies?
A. 802.11g
B. 802.11b
C. 802.n
D. 802.11a

21. (p. 434) Which of the following is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?
A. 802.1X
B. WEP
C. MAC address filtering
D. WPA

22. (p. 435) Which standard includes secure authentication using a RADIUS server and password encryption using EAP?
A. IEEE 802.1X
B. WEP
C. MAC address filtering
D. WPA

23. (p. 436) This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)

24. (p. 437) This encryption standard uses a 128-bit block cipher that is more difficult to crack than the 128-bit TKIP wrapper of the previous standard.
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)

25. (p. 441) What is the gain of the typical WAP antenna?
A. 11 dB
B. 54 dB
C. 2 dB
D. 10 dB

26. (p. 442) When configuring a WAP, set this to something unique and easily identified, and follow up by giving this same name on all wireless hosts that should connect to this network.
A. MAC address
B. SSID
C. user name
D. password

27. (p. 444) Which settings should be modified when you have overlapping Wi-Fi signals? (Select all that apply.)
A. WPA2
B. beacon
C. channel
D. frequency
E. both C and D

28. (p. 447) What method of extending a wireless network creates an Extended Service Set?
A. installing a wireless bridge
B. adding a WAP
C. creating an IBSS
D. installing a router

29. (p. 447) Which of the following describes a type of wireless bridge that can only communicate with a single other bridge, and therefore is used to connect just two wireless network segments?
A. dipole
B. omnidirectional
C. point-to-multipoint
D. point-to-point

30. (p. 449) When troubleshooting a potential wireless hardware problem, open this Windows utility to see if there is an error or conflict with the wireless adapter.
A. My Network Places
B. Device Manager
C. Network Access Server (NAS)
D. Task Manager

31. (p. 430) Most WAPs use one of the following channels by default EXCEPT:
A. 1
B. 9
C. 6
D. 11

32. (p. 436) Which of the following are weaknesses in WEP that allow it to be easily cracked? (Select all that apply.)
A. size of the encryption key
B. use of AES
C. use of 802.1X
D. faulty implementation of the RC4 protocol
E. both A and D

33. (p. 447) If you are installing a new WAP, and it is near another WAP, what is one way to reduce interference?
A. Different ESSIDs should be assigned.
B. The new WAP should be switched to 5.0 GHz.
C. Separate channels should be used.
D. The existing WAP should be switched to mixed mode.

34. (p. 432) All of the following items can cause interference to wireless networks in the 2.4-GHz range EXCEPT:
A. older wireless phones
B. other WAPS
C. microwave ovens
D. FM radios


35. (p. 436) Which of the following key sizes does WEP use? (Select all that apply.)
A. 128 bits
B. 104 bits
C. 40 bits
D. 64 bits
E. Both B and C

No comments:

Post a Comment