Chapter 20 | Wireless Networking
24. The maximum distance between infrared devices is ______________.
1 meter
21. Products that adhere to the 802.11b standard provide a maximum of ______________ channels in the 2.4 GHz band.
14
19. The 802.11g standard is backward-compatible with ______________.
802.11b
20. Like 802.11g, ______________ WAPs can run in the 2.4-GHz ISM band, supporting earlier, slower 802.11b/g devices.
802.11n
16. What is the theoretical maximum range of the 802.11a wireless networking standard? A. 150 feet B. 200 feet C. 250 feet D. 300 feet
A. 150 feet
18. At what frequency range do the 802.11b- and 802.11g-based wireless technologies operate? A. 2.4 GHz B. 3.4 GHz C. 4.4 GHz D. 5.4 GHz
A. 2.4 GHz
21. What frequencies does 802.11n use? A. 2.4 and 5 GHz B. 11 and 54 MHz C. 5 and 24 GHz D. 2.4 and 11 MHz
A. 2.4 and 5 GHz
4. What wireless network mode can quickly be used to share files and printers without a WAP? A. Ad hoc B. Infrastructure C. Multiple access D. WAN
A. Ad hoc
28. What WAP settings should be adjusted in an environment with overlapping Wi-Fi signals? A. Channel and frequency B. SSID and MAC filtering C. Default user name and password D. Encryption protocols
A. Channel and frequency
12. Which standard or protocol provides a security improvement that WPA addresses over WEP? A. EAP B. IrDA C. SWAP D. TCP/IP
A. EAP
9. Most WAPs support filtering, in which data packets that do not contain the appropriate address are rejected. What kind of address is filtered? A. MAC B. SSID C. WEP D. WPA
A. MAC
20. What 802.11n feature increases its range and speed? A. MIMO B. CSMA/CA C. SSID D. WPA-PSK
A. MIMO
24. What type of wireless network is very small and designed for "quick-and-dirty" jobs? A. PAN B. WAN C. LAN D. MAN
A. PAN
32. What process needs to be undertaken to enable Bluetooth devices to create a secure connection? A. Pairing B. Duplicating C. Searching D. Finding
A. Pairing
2. Which feature allows you to plug a single Ethernet cable into the WAP to provide both power and a network connection? A. PoE B. SID C. ESSI D. PoW
A. PoE
11. WPA2 uses the ______________ to provide a secure wireless environment.
Advanced Encryption Standard (AES)
31. What is the gain from a typical WAP? A. 1 dB B. 2 dB C. 10 dB D. 12 dB
B. 2 dB
17. At what frequency range does the 802.11a-based wireless technology operate? A. 7 GHz B. 5 GHz C. 3 GHz D. 1 GHz
B. 5 GHz
15. Which wireless networking standard supports data throughput of up to 11 Mbps? A. 802.11a B. 802.11b C. 802.11c D. 802.11g
B. 802.11b
3. What method do wireless networks use to determine if other nodes are currently broadcasting? A. CSMA/CD B. CSMA/CA C. Dipole antennae D. MIMO
B. CSMA/CA
7. What method enables you to limit access to your wireless network based on the physical, hard-wired address of the units' wireless NIC? A. OFDM B. MAC address filtering C. SSID broadcasting D. NTFS Permissions
B. MAC address filtering
8. What is another name for the Service Set Identifier parameter? A. Network address B. Network name C. Network path D. Network protocol
B. Network name
1. What centrally connects wireless network nodes in the same way that a hub connects wired Ethernet PCs? A. EAP B. WAP C. WEP D. WPA
B. WAP
34. What should you open up to troubleshoot a suspected hardware problem? A. BIOS B. Windows Device Manager C. Windows update D. Task Manager
B. Windows Device Manager
35. What should you check first when troubleshooting wireless connectivity issues? A. Wireless configuration utility B. Wireless NIC link light C. Encryption settings D. Dipole gain
B. Wireless NIC link light
27. ______________ is designed to create small wireless networks preconfigured to do very specific jobs.
Bluetooth
25. What is the maximum distance of a Class 3 Bluetooth device? A. 100 meters B. 10 meters C. 1 meter D. 5 meters
C. 1 meter
11. How many bits does WEP encryption use to scramble data packets? A. 20 B. 30 C. 40 D. 50
C. 40
19. What is the speed at which the 802.11g wireless technology transfers data? A. 11 Mbps B. 20 Mbps C. 54 Mbps D. 64 Mbps
C. 54 Mbps
10. Which standard or protocol represents a security improvement in WPA2 over WEP and WPA? A. EAP B. IrDA C. AES D. TCP/IP
C. AES
30. What is the standard straight-wire omnidirectional wireless antenna called? A. Omnipole B. Unipole C. Dipole D. Bipole
C. Dipole
6. Where is the location for an omni-directional antenna in your home or office? A. On the roof B. Adjacent to the outside wall C. Near the center D. In a basement
C. Near the center
29. What is the first step in choosing an optimal location for an access point? A. Software upgrades B. Market research C. Site survey D. Interference control
C. Site survey
27. What WPA/WPA2 encryption version uses a RADIUS server for secure authentication? A. WPA/WPA2-PSK B. SSIDv3 C. WPA/WPA2-Enterprise D. SSIDv4
C. WPA/WPA2-Enterprise
14. Which standard has a security flaw that allows a hacker to guess an eight-digit code? A. WPA B. WEP C. WPS D. WPA2
C. WPS
3. Wireless devices operate using the ______________ networking scheme.
CSMA/CA
22. What is the maximum capacity for data transfer between infrared devices? A. 1 Mbps B. 2 Mbps C. 3 Mbps D. 4 Mbps
D. 4 Mbps
23. What wireless technology is often used to connect headsets to smartphones? A. WPA-Enterprise B. WPA-PSK C. AES D. Bluetooth
D. Bluetooth
26. What enables you to connect to the Internet through a network-aware smartphone, tablet, or other mobile device? A. 802.11b B. 802.11n C. MAC filtering D. Cellular wireless network
D. Cellular wireless network
5. What is a wireless service area that has been extended by adding more WAPs? A. EWAP B. SID C. BSS D. EBSS
D. EBSS
33. Where should you look for firmware updates on older WAPs? A. CMOS B. Device Manager C. Windows update D. Manufacturer's Web site
D. Manufacturer's Web site
13. Which protocol does WPA use to provide a new encryption key for every sent packet? A. SSH B. WEP C. SSL D. TKIP
D. TKIP
A service area that is extended by adding WAPs is called a(n) _____________.
Extended Basic Service Set (EBSS)
4. Two or more wireless nodes communicating in ad hoc mode form what's called a(n) ______________.
Independent Basic Service Set (IBSS)
22. Communication through infrared devices is implemented via the ______________ protocol.
IrDA (Infrared Data Association)
8. ______________ is a handy way of creating a type of "accepted users" list to limit access to your wireless network.
MAC address filtering
28. The IEEE organization has made first-generation Bluetooth the basis for its 802.15 standard for wireless ______________.
Personal Area Networks (PANs)
2. With ______________, you only need to plug a single Ethernet cable into the WAP to provide both power and a network connection.
Power over Ethernet (PoE)
7. Changing the default ______________ for a WAP is the first step in setting up a new wireless network.
Service Set Identifier (SSID)
13. WPA uses the ______________, which provides a new encryption key for every sent packet.
Temporal Key Integrity Protocol (TKIP)
14. The developers of Wi-Fi created ______________ a standard included on most WAPs and clients to make it easier for end users to configure secure connections.
Wi-Fi Protected Setup (WPS)
23. Infrared is designed to make a point-to-point connection between two devices only in ______________ mode.
ad hoc
9. To protect wireless systems, tell the WAP not to _______________ the SSID.
broadcast
29. A(n) ______________ enables you to connect to the Internet through a network-aware smartphone, tablet, or other mobile device.
cellular wireless network
31. Devices such as ______________ and ______________ also use the 2.4-GHz frequency and can cause a great deal of interference.
cordless phones, microwaves
33. The standard straight-wire antennas that provide most omni-directional function are called ______________ antennas.
dipole
32. With ______________ 802.11n WAPs, you can choose which band to put 802.11n traffic on, either 2.4 GHz or 5 GHz.
dual-band
15. WPS has a security flaw that allows a hacker to repeatedly guess the ______________ -digit numeric code.
eight
34. An antenna strengthens and focuses the radio frequency (RF) output from a WAP. The ratio of increase called ______________ is measured in decibels (dB).
gain
26. A(n) ______________ enables Ethernet network communication using IrDA.
infrared access point
5. Wireless networks running in ______________ mode use one or more wireless access points to connect the wireless network nodes to a wired network segment.
infrastructure
10. When adjusting the radio power levels of your wireless antenna, decrease the radio power until you can get reception at the furthest point ______________ the target network space.
inside
25. IrDA links are direct ______________ and are susceptible to interference.
line-of-sight
30. Communication will fail if the encryption level, key, and ______________ do not match on the wireless client node.
passphrase
35. Antennas and the signals that they transmit have an electromagnetic property called ______________.
polarization
18. Today's wireless world is dominated by ______________ technologies, in particular the 802.11 (Wi-Fi) standards.
radio frequency (RF)
17. You can install multiple WAPs to permit "______________" between one WAP's coverage area and another's.
roaming
16. The IEEE 802.11 wireless Ethernet standard defines methods by which devices may communicate using ______________ radio waves.
spread-spectrum
1. Wireless access points can act as ______________ and Internet routers.
switches