Chapter 6
Which two statements characterize wireless network security? (Choose two.) Wireless networks offer the same security features as wired networks offer. Wireless guest mode provides open access to a protected LAN. With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. An attacker needs physical access to at least one network device to launch an attack.
-With SSID broadcast disabled, an attacker must know the SSID to connect. -Using the default IP address on an access point makes hacking easier.
What are three advantages of wireless over wired LAN technology? (Choose three.) -lower on-going costs -longer transmission distance -ease of installation -ease of expansion -higher level of security
-lower on-going costs -ease of installation -ease of expansion
Which type of network technology is used for low-speed communication between peripheral devices? Bluetooth Ethernet 802.11 channels
Bluetooth
Which type of networking technology is used to share an Internet connection wirelessly between two mobile devices? Ethernet Bluetooth cellular satellite
Bluetooth
Which type of device provides an Internet connection through the use of a phone jack? -cable modem -DSL modem -satellite modem -Wi-Fi AP
DSL modem
What type of device is commonly connected to the Ethernet ports on a home wireless router? -DSL modem -cable modem -wireless antenna -LAN device
LAN device
(QUESTION IS ON ANSWER SIDE) ------- C
Refer to the exhibit. Which router port connects to the modem provided by the service provider?
A user wants to connect to a wireless network at a shopping center. What wireless network setting tells the user the name of the network? -domain name -SSID -passphrase -hostname
SSID
What is CSMA/CA on a network? -an access method that is used by wireless technology to avoid duplicate SSIDs -an access method that is used by any technology that has excessive collisions -an access method that is used by wired Ethernet technology to avoid collisions -an access method that is used by wireless technology to avoid collisions
an access method that is used by wireless technology to avoid collisions
What are two types of wired high-speed Internet connections? (Choose two.) cable satellite cellular DSL dial-up
cable DSL
What wireless router configuration would stop outsiders from using your home network? -IP address -encryption -router location -network name
encryption
What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet? -MAC address filtering -guest SSID -encryption -authentication
guest SSID
What type of authentication do most access points use by default? -open -PSK -WEP -EAP
open
What purpose would a home user have for implementing Wi-Fi? -to hear various radio stations -to connect a keyboard to a PC -to connect wireless headphones to a mobile device -to create a wireless network usable by other devices
to create a wireless network usable by other devices
True or False? Most mobile devices have the ability to connect to a Wi-Fi network. true false
true
When is a client considered to be "authenticated" when using MAC address filtering to control network access to a wireless network? -when the client gives the access point the correct secret key -when the client sends the MAC address to the access point -when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client -when the access point sends the MAC address to the server and receives notification that the MAC address is a valid one
when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client