CompTIA Network+ Exam N10-007 Wireless Networking Quiz
Bluetooth
A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called: • 802.11 • NFC • Bluetooth • Z-Wave
TKIP
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: • PEAP • TKIP • CCMP • WPA2
CSMA/CA
A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: • CWDM • CSMA/CD • CDMA • CSMA/CA
WLAN
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is known as: • MAN • WLAN • LAN • VLAN
Geofencing
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: • Geofencing • Quarantine network • Geolocation • GPS tagging
SSID
A unique WLAN identifier is commonly referred to as: • EUI • SSID • OUI • CNAME
Denial of Service (DoS) attack
A wireless disassociation attack is a type of: • Downgrade attack • Brute-force attack • Denial of Service (DoS) attack • Cryptographic attack
Infrastructure mode
A wireless networking topology consisting of at least one Access Point (AP) is referred to as: • IEEE 802.3at • Infrastructure mode • IEEE 802.3af • Ad hoc mode • Peer-to-peer mode
Ad hoc mode
A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called: • IEEE 802.3af • Star topology • Ad hoc mode • IEEE 802.3at • Infrastructure mode
SNR
A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: • BRI • SNR • RFI • SVC
True
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). • True • False
5.0 GHz 2.4 GHz
Frequency bands used by 802.11 networks include: (Select 2 answers) • 5.0 GHz • 5.4 GHz • 2.0 GHz • 2.4 GHz
IEEE 802.11n standard
In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the: • IEEE 802.11a standard • IEEE 802.11b standard • IEEE 802.11g standard • IEEE 802.11n standard • IEEE 802.11ac standard
War driving
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: • War chalking • Spoofing • War driving • Insider threat
Makes a WLAN harder to discover
Disabling SSID broadcast: • Is one of the measures used in the process of securing wireless networks • Makes a WLAN harder to discover • Blocks access to a WAP • Prevents wireless clients from accessing the network
True
Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards. • True • False
True
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. • True • False
20 MHz
The IEEE 802.11a standard specifies a channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz
160 MHz
The IEEE 802.11ac standard specifies a maximum channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz • 160 MHz
802.11b
The IEEE 802.11g standard is backwards compatible with: • 802.11n • 802.11a • 802.11b • 802.11ac
20 MHz
The IEEE 802.11g standard specifies a channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz
802.11g 802.11b 802.11a
The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) • 802.11g • 802.11ac • 802.11b • 802.11a
20 MHz 40 MHz
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) • 20 MHz • 22 MHz • 40 MHz • 80 MHz • 160 MHz
Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps
The characteristic features of the IEEE 802.11n wireless standard include: (Select all that apply) • Multiple Input / Multiple Output (MIMO) • Maximum data signaling rate of 54 Mbps • 2.4 GHz frequency band • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • 5.0 GHz frequency band • Multi-User Multiple Input / Multiple Output (MU-MIMO) • Maximum data signaling rate of up to 600 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed)
Wireless site survey
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: • Penetration testing • Wireless site survey • Vulnerability scanning • End user awareness and training
True
The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID) appears as a legitimate access point to connecting hosts. • True • False
Suitable for large corporate Requires RADIUS authentication server
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) • Suitable for large corporate networks • Does not require an authentication server • Suitable for all types of wireless LANs • Requires RADIUS authentication server
PSK
Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? • AES • PSK • RC4 • IKE
True
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. • True • False
True
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. • True • False
High signal latency Interference (weather dependent) Relatively high cost in comparison to terrestrial
What are the characteristic features of satellite Internet connections? (Select 3 answers) • High signal latency • Lack of signal interference • Cheaper in comparison to terrestrial links • Interference (weather dependent) • Low signal latency • Relatively high cost in comparison to terrestrial links
Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range
What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • Maximum data signaling rate of 54 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • 2.4 GHz frequency range • Maximum data signaling rate of 11 Mbps • 5.0 GHz frequency range
CCMP
What is the name of an AES-based encryption mode implemented in WPA2? • CCMP • ECB • CBC • TKIP
IEEE 802.11
Which IEEE standard provides the implementation basis for most modern WLANs? • IEEE 802.11 • IEEE 802.1x • IEEE 802.3 • IEEE 802.1q
Power level controls
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? • SSID broadcast • Power level controls • Maximum Transmission Unit (MTU) • Quality of Service (QoS)
Wireless LAN controller
Which network device enables centralized management of WAPs? • VPN concentrator • Load balancer • Multilayer switch • Wireless LAN controller
EAP-TLS
Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? • EAP-TLS • PEAP • EAP-TTLS • EAP-FAST
Yagi antenna Dish antenna Parabolic antenna
Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) • Yagi antenna • Omnidirectional antenna • Dish antenna • Non-directional antenna • Parabolic antenna • Dipole antenna
Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers) • Maximum data signaling rate of 54 Mbps • 5.0 GHz frequency band • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • 2.4 GHz frequency band • Maximum data signaling rate of 11 Mbps • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
TDMA
Which of the answers listed below refers to a channel access method used in 2G GSM networks? • CSMA/CA • TDMA • CSMA/CD • CDMA
22 MHz
Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? • 20 MHz • 22 MHz • 40 MHz • 80 MHz
Omnidirectional antenna
Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? • Omnidirectional antenna • Dish antenna • Unidirectional antenna • Yagi antenna
IR
Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls? • NFC • 802.3 • IR • Z-Wave
Z-Wave
Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? • FCoE • SDN • Z-Wave • SIEM
RC4
Which of the answers listed below refers to an encryption algorithm used in TKIP? • DES • 3DES • AES • RC4
1 6 11
Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? • 1 • 5 • 6 • 9 • 11
EAP-TLS
Which of the following EAP methods offers the highest level of security? • PEAP • EAP-FAST • EAP-TLS • EAP-TTLS
2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) • Maximum data signaling rate of 54 Mbps • 5.0 GHz frequency range • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • 2.4 GHz frequency range • Maximum data signaling rate of 11 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed)
CDMA
Which of the following answers refers to a channel access method used in 3G cellular networks? • CDMA • CSMA/CD • TDMA • CSMA/CA
ANT+
Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? • CAN • WTLS • UAV • ANT+
Multi-User MIMO (MU-MIMO
Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? • Multiple Input / Multiple Output (MIMO) • 40 MHz channel width • Multi-User MIMO (MU-MIMO) • Maximum data signaling rate of up to 600 Mbps
5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Multi-User Multiple Input / Multiple Output (MU-MIMO)
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) • Data signaling rate of up to 600 Mbps • 5.0 GHz frequency band • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • Maximum data signaling rate of up to 6.77 Gbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • Multi-User Multiple Input / Multiple Output (MU-MIMO) • 2.4 GHz frequency band
Dipole antenna Omnidirectional antenna
Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) • Unidirectional antenna • Dipole antenna • Yagi antenna • Omnidirectional antenna • Dish antenna
All of the above
Which of the following can be the source of RFI and cause disruptions in network connectivity? • Cordless phones • Fluorescent lights • Microwave ovens • Bluetooth devices • All of the above
WAP power level controls
Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? • Protocol analyzer • WAP power level controls • Logical network diagram • Network mapper
RFID
Which of the following wireless technologies enables identification and tracking of tags attached to objects? • WAF • RFID • GPS • WTLS
WPA2-PSK
Which of the following would be the best solution for securing a small network lacking an authentication server? • WPA-PSK • WPA2-Enterprise • WPA2-PSK • WPA-Enterprise
NFC
Which type of technology enables contactless payment transactions? • NFC • SDN • PED • WAP
True
Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. • True • False
True
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. • True • False