A Mod 12 WLAN Concepts HW

¡Supera tus tareas y exámenes ahora con Quizwiz!

If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)

1 11 6

How many channels are available for the 2.4 GHz band in Europe?

13

How many channels are available for the 5 GHz band?

24

How many address fields are in the 802.11 wireless frame?

4

What UDP ports and IP protocols in the frame header are used by CAPWAP for IPv6? (Choose three.)

5246 5247 136

What UDP ports and IP protocols in the frame header are used by CAPWAP for IPv4? (Choose three.)

5246 5247 17

Which 802.11 standards exclusively use the 5 GHz radio frequency?

802.11a 802.11ac

Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?

802.11n

Which of the following encryption methods uses CCMP to recognize if the encrypted and non-encrypted bits have been altered?

AES

What is the term for an AP that does not send a beacon, but waits for clients to send probes?

Active

Which wireless topology mode is used by two devices to connect in a peer-to-peer network?

Ad hoc

Which of the following is a standalone device, like a home router, where the entire WLAN configuration resides on the device?

Autonomous AP

Which of the following is an IEEE 802.15 WPAN standard that uses a device-pairing process to communicate?

Bluetooth

Which of the following modulation techniques spreads a signal over a larger frequency band?

DSSS

Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?

ESS

What are the best ways to secure WLANs? (Choose two.)

Encryption Authentication

Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

Ethernet switch access point

Which of the following modulation techniques rapidly switches a signal among frequency channels?

FHSS

A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks.

False

DTLS is enabled by default on the control and data CAPWAP tunnels.

False

Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection.

False

When you need to expand the coverage of a small network, the best solution is to use a range extender.

False

What IP versions does CAPWAP support?

IPv4 by default, but can configure IPv6

Which standards organization is responsible for allocating radio frequencies?

ITU-R

Which of the following statements are true about modes of operation for a FlexConnect AP? (Choose two.)

In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally.

Which statement describes an autonomous access point?

It is a standalone access point.

Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?

MIMO

What type of attack is an "evil twin AP" attack?

MITM

Which of the following modulation techniques is used in the new 802.11ax standard?

OFDMA

Which of the following antennas provide 360 degrees of coverage?

Omnidirectional

Which of the following authentication methods does not use a password shared between the wireless client and the AP?

Open

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the AP?

Packet acknowledgments and retransmissions MAC layer data encryption and decryption Frame queueing and packet prioritization

What is the term for an AP that openly advertises its service periodically?

Passive

Which encryption method is used by the original 802.11 specification?

RC4

Which of the following is most likely NOT the source of a wireless DoS attack?

Rogue AP

Which of the following components are integrated in a wireless home router?

Router Switch Access Point

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

SSID

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the WLC?

Termination of 802.11 traffic on a wired interface Authentication Frame translation to other protocols

An ESS is created when two or more BSSs need to be joined to support roaming clients.

True

Which protocol and port numbers are used by both IPv4 and IPv6 CAPWAP tunnels? (Choose two.)

UDP 5246 and 5247

Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies?

WLAN

Which method of wireless authentication is currently considered to be the strongest?

WPA2

Which of the following authentication methods has the user enter a pre-shared password? (Choose two)

WPA2 Personal WPA Personal

Which of the following wireless networks typically uses lower powered transmitters for short ranges?

WPAN

Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth?

ad hoc mode

What Wi-Fi management frame is regularly broadcast by APs to announce their presence?

beacon

In the context of mobile devices, what does the term tethering involve?

connecting a mobile device to another mobile device or computer to share a network connection

Which characteristic describes a wireless client operating in active mode?

must know the SSID to connect to an AP

Which type of telecommunication technology is used to provide Internet access to vessels at sea?

satellite


Conjuntos de estudio relacionados

COMS 371 - Week 4 (The Birmingham School)

View Set

Chapter 14: Preparing a Family for Childbirth and Parenting

View Set

Ch. 3 Preparing the Speech: A Process Outline

View Set

Pro - and anti social behaviour of the individual

View Set

Finance--Ch. 3 -- Time Value of Money

View Set