Module 06 Wireless Networking

¡Supera tus tareas y exámenes ahora con Quizwiz!

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.

802.11g

Dwight is a fresher who has been hired as an assistant to the head network administrator. Which of the following 802.11 wireless standards should Dwight have an understanding of so that he can assist his senior in setting up a wireless standard that has a theoretical throughput of 600 Mbps?

802.11n

You are the proprietor of an export business. Currently, the wireless network in your office is using the WEP (Wired Equivalent Privacy) standard. It offers two forms of authentication: OSA (Open System Authentication) and SKA (Shared Key Authentication). However, neither of them is secure. Your requirement is of an authorization service that provides a central authentication point for wireless, mobile, and remote users. Which of the following will you use in such a scenario?

WPA-Enterprise or WPA2-Enterprise

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?

WPS attack

What was the first 802.11 standard to implement channel bonding? a. 802.11n b. 802.11g c. 802.11ax d. 802.11ac

a. 802.11n

Which Carrier Sense technology is used on wireless networks to reduce collisions?

a. CSMA/CA

Which type of identifier allows wireless clients to roam freely from AP to AP? a. ESSID b. IP address c. BSSID d. Transmitter address

a. ESSID

Which of the following wireless technologies does not use the 2.4 GHz band?

a. Z-Wave

Which protocol replaced TKIP for WPA2?

d. CCMP

Which function of WPA/WPA2 security ensures data cannot be read in transit?

d. Encryption

A client has complained to you about low signal strength in his office. You want to ensure that the issue is resolved, and for that purpose, you plan to place the Wi-Fi client very close to the AP (access point). What level of RSSI (received signal strength indicator) rating will you check to fix this issue?

-30 dBm with an excellent rating

What is the frequency range for cellular communication?

1850 MHz-1990 MHz

You have been contracted to install a wireless network connection at Vice City Public School. The school management has requested you to install the latest available Wi-Fi technology for the students. Which of the following frequencies will you use to establish the connection in this scenario?

5.1 GHz-5.8 GHz

Tyler has plans of setting up a cellular network distribution plant for which he has contacted you to act as a service manager. Your first job as a service manager is to document the necessary frequency range under which this 800 band will be operational. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

824 MHz-896 MHz

Howard has recently installed a network connection for a workstation where he has made network connections accessible through both wired and wireless connections. Before finishing the installation, he wants to check whether the computer is making conflicting attempts to communicate with the network through both types of connections. After inspection, he realizes that the computer is indeed making conflicting attempts. Which of the following steps will help Howard in resolving the issue?

He can resolve the issue by disabling the Wi-Fi adapter or by unplugging the Ethernet cable.

As a network engineer, you have installed a wireless connection in a newly constructed office floor for Black & White Communications. The CEO's office files a complaint about slow data transmission with the IT department. The IT department gets in touch with you to fix this error. On inspection, you realize that the problem is primarily because of large obstacles like walls and ceilings because of which the wave bounces back to its source. What of the following phenomena will you state as a cause of this error while reporting to the IT department?

Reflection

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

b. Evil twin

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

b. Layer 3

Which Wi-Fi encryption standard was designed to use AES encryption? a. WEP2 b. WPA2 c. WPA d. WEP

b. WPA2

Which device on the network will require the greatest throughput capacity? a. Wireless LAN controller b. Wireless bridge c. Smart thermostat d. Smart speaker

b. Wireless bridge

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

c. 802.11ax

Which of the following statements is false? a. Wi-Fi spreads its data across all available frequencies within a wide channel. b. Each Wi-Fi channel contains multiple frequencies. c. Each Wi-Fi channel contains multiple frequency bands. d. Wi-Fi functions on two different frequency bands

c. Each Wi-Fi channel contains multiple frequency bands.

Which problem would a low RSSI level indicate? a. Encryption protocol mismatch b. Incorrect passphrase c. Insufficient wireless coverage d. Mismatched standards

c. Insufficient wireless coverage

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

c. RSSI

Which standard adapted EAP to WLANs? a. 802.11g b. 802.3 c. 802.11i d. 802.1X

d. 802.1X

Which of the following statements is true? a. A fish aquarium full of clear water won't negatively affect a Wi-Fi signal. b. A satellite dish receives signals equally from any direction. c. A smartphone always directs its signal toward the closest cell tower. d. A Wi-Fi client connects to a range extender which connects to an AP

d. A Wi-Fi client connects to a range extender which connects to an AP

Which one of the following wireless transmission types requires a clear LOS to function?

d. IR

Which off-boarding policy can protect proprietary corporate information if a smartphone is lost? a. Trusted access b. OS update requirements c. Site survey d. Remote wipe

d. Remote wipe

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?

d. Rogue AP

Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi? a. Wi-Fi analyzer b. Wireless LAN controller c. Captive portal d. Spectrum analyzer

d. Spectrum analyzer


Conjuntos de estudio relacionados

Ch.4 Adjustments, Financial Statement, and Financial Results

View Set

khan academy programming unit test

View Set

Central Ideas and Context: Utopia Assignment

View Set

Questions, language help, repeat, meaning?

View Set

Productivity- Principles of Economics

View Set

Code, Standards, and Practices 1 - LESSON 4

View Set

Accounting 202 Homework 19 Chapter 12

View Set

Hazardous Waste/ Regulated Waste

View Set

Module 11: Digital Ethics and Lifestyle

View Set