Ch. 12 - WLAN Concepts

¡Supera tus tareas y exámenes ahora con Quizwiz!

C. 4

How many address fields are in the 802.11 wireless frame? A. 2 B. 3 C. 4 D. 5

D. 24

How many channels are available for the 5 GHz band? A. 11 B. 13 C. 14 D. 24

C. connecting a mobile device to another mobile device or computer to share a network connection

In the context of mobile devices, what does the term tethering involve? A. connecting a mobile device to a hands-free headset B. connecting a mobile device to a 4G cellular network C. connecting a mobile device to another mobile device or computer to share a network connection D. connecting a mobile device to a USB port on a computer in order to charge the mobile device

False

True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks. True False

True

True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients. True False

False

True or False: When you need to expand the coverage of a small network, the best solution is to use a range extender. True False

C. IPv4 by default, but can configure IPv6

What IP versions does CAPWAP support? A. IPv4 only B. IPv6 only C. IPv4 by default, but can configure IPv6 D. IPv6 by default, but can configure IPv4

A. 17, C. 5246, & D. 5247

What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.) A. 17 B. 136 C. 5246 D. 5247 E. 802.11

B. 136, C. 5246, & D. 5247

What UDP ports and IP protocols are used by CAPWAP for IPv6? (Choose three.) A. 17 B. 136 C. 5246 D. 5247 E. 802.11

B. beacon

What Wi-Fi management frame is regularly broadcast by APs to announce their presence? A. association B. beacon C. authentication D. probe

A. Authentication & C. Encryption

What are the best ways to secure WLANs? (Choose two.) A. Authentication B. SSID cloaking C. Encryption D. MAC address filtering

A. Active

What is the term for an AP that does not send a beacon, but waits for clients to send probes? A. Active B. Infrastructure C. Ad hoc D. Passive

D. Passive

What is the term for an AP that openly advertises its service periodically? A. Active B. Infrastructure C. Ad hoc D. Passive

B. MITM

What type of attack is an "evil twin AP" attack? A. DoS B. MITM C. Wireless intruder D. Radio interference

A. 802.11a & D. 802.11ac

Which 802.11 standards exclusively use the 5 GHz radio frequency? (Choose 2) A. 802.11a B. 802.11g C. 802.11n D. 802.11ac E. 802.11ax

C. 802.11n

Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges? A. 802.11b B. 802.11g C. 802.11n D. 802.11a

B. must know the SSID to connect to an AP

Which characteristic describes a wireless client operating in active mode? A. broadcasts probes that request the SSID B. must know the SSID to connect to an AP C. ability to dynamically change channels D. must be configured for security before attaching to an AP

D. MIMO

Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did? A. WPS B. SPS C. MITM D. MIMO

D. WPA2

Which method of wireless authentication is currently considered to be the strongest? A. open B. WEP C. WPA D. WPA2 E. shared key

E. Open

Which of the following authentication methods does not use a password shared between the wireless client and the AP? A. WEP B. WPA C. WPA2 D. WPA3 E. Open

B. WPA Personal & D. WPA2 Personal

Which of the following authentication methods has the user enter a pre-shared password? (Choose two) A. Open B. WPA Personal C. WPA Enterprise D. WPA2 Personal E. WPA2 Enterprise

A. Access point, B. Switch, & C. Router

Which of the following components are integrated in a wireless home router? (Choose three.) A. Access point B. Switch C. Router D. Range extender

C. AES

Which of the following encryption methods uses CCMP to recognize if the encrypted and non-encrypted bits have been altered? A. RC4 B. TKIP C. AES

B. Autonomous AP

Which of the following is a standalone device, like a home router, where the entire WLAN configuration resides on the device? A. Range extender B. Autonomous AP C. Controller-based AP D. USB Wireless NIC

C. Rogue AP

Which of the following is most likely NOT the source of a wireless DoS attack? A. Radio interference B. Improperly configured devices C. Rogue AP D. Malicious user

D. OFDMA

Which of the following modulation techniques is used in the new 802.11ax standard? A. DSSS B. FHSS C. OFDM D. OFDMA

B. FHSS

Which of the following modulation techniques rapidly switches a signal among frequency channels? A. DSSS B. FHSS C. OFDM D. OFDMA

A. DSSS

Which of the following modulation techniques spreads a signal over a larger frequency band? A. DSSS B FHSS C. OFDM D. OFDMA

False

True or False: DTLS is enabled by default on the control and data CAPWAP tunnels. True False

False

True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection. True False

C. Omnidirectional

Which of the following antennas provide 360 degrees of coverage? A. Wireless NIC B. Directional C. Omnidirectional D. MIMO

D. RC4

Which encryption method is used by the original 802.11 specification? A. AES B. TKIP C. AES or TKIP D. RC4

B. ITU-R

Which standards organization is responsible for allocating radio frequencies? A. IEEE B. ITU-R C. Wi-Fi Alliance

B. 13

How many channels are available for the 2.4 GHz band in Europe? A. 11 B. 13 C. 14 D. 24

A. 11, B. 1, & D. 6

If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.) A. 11 B. 1 C. 8 D. 6 E. 5 F. 3

D. Bluetooth

Which of the following is an IEEE 802.15 WPAN standard that uses a device-pairing process to communicate? A. Cellular B. WiMAX C. Wi-Fi D. Bluetooth

B. Packet acknowledgments and retransmissions, C. Beacons and probe responses, E. MAC layer data encryption and decryption, & G. Frame translation to other protocols

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the AP? (Choose four.) A. Authentication B. Packet acknowledgments and retransmissions C. Beacons and probe responses D. Association and re-association of roaming clients E. MAC layer data encryption and decryption F. Termination of 802.11 traffic on a wired interface G. Frame translation to other protocols H. Frame queueing and packet prioritization

A. Authentication, D. Association and re-association of roaming clients, F. Termination of 802.11 traffic on a wired interface, & G. Frame translation to other protocols

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the WLC? (Choose four.) A. Authentication B. Packet acknowledgments and retransmissions C. Beacons and probe responses D. Association and re-association of roaming clients E. MAC layer data encryption and decryption F. Termination of 802.11 traffic on a wired interface G. Frame translation to other protocols H. Frame queueing and packet prioritization

B. In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. & C. In connect mode, the WLC is reachable and performs all its CAPWAP functions.

Which of the following statements are true about modes of operation for a FlexConnect AP? (Choose two.) A. In connect mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. B. In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. C. In connect mode, the WLC is reachable and performs all its CAPWAP functions. D. In standalone mode, the WLC is reachable and performs all its CAPWAP functions

B. WLAN

Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies? A. WPAN B. WLAN C. WMAN D. WWAN

A. WPAN

Which of the following wireless networks typically uses lower powered transmitters for short ranges? A. WPAN B. WLAN C. WMAN D. WWAN

B. SSID

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured? A. BESS B. SSID C. ad hoc D. ESS

B. UDP & C. 5246 and 5247

Which protocol and port numbers are used by both IPv4 and IPv6 CAPWAP tunnels? (Choose two.) A. ICMP B. UDP C. 5246 and 5247 D. 17 and 163 E. TCP

C. It is a standalone access point.

Which statement describes an autonomous access point? A. It is used for networks that require a large number of access points. B. It is server-dependent. C. It is a standalone access point. D. It is managed by a WLAN controller.

B. Ethernet switch & C. access point

Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) A. RADIUS authentication server B. Ethernet switch C. access point D. WLAN controller E. repeater

D. satellite

Which type of telecommunication technology is used to provide Internet access to vessels at sea? A. WiMax B. municipal WiFi C. cellular D. satellite

E. ESS

Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet? A. ad hoc WLAN B. BSS C. WiFi Direct D. IBISS E. ESS

B. ad hoc mode

Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth? A. hotspot B. ad hoc mode C. mixed mode D. infrastructure mode

A. Ad hoc

Which wireless topology mode is used by two devices to connect in a peer-to-peer network? A. Ad hoc B. Infrastructure C. Tethering


Conjuntos de estudio relacionados

Arthrex Orthobiologics Onboarding

View Set

FINANCE final exam ch 10 test bank

View Set

Statistics for Psychology Lecture 7

View Set

02.01 Brief CPR (Cardiopulmonary Resuscitation) Overview

View Set