CIT: 472 ADV Telecommunications I @ WKU - Fall 2018 Study Tool
_____dBm is a typical recommended signal strength for a WLAN?
-70
When 802.11n uses bonded channels, the primary and secondary channels are both _________ wide, giving a total width of ________ when bonded.
20 MHz, 40 MHz
When 802.11n uses bonded channels, the primary and the secondary channels are both __________ wide, giving a total width of __________ when bonded.
20 MHz, 40 MHz
How many non-overlapping channels are available when using 802.11a?
23
Select the standard below that defines how Power over Ethernet (PoE) functions.
802.3at
The materials concrete, wood, and asphalt that "soak up" an RF signal can all cause __________.
Absorption
Which wireless mesh network makes use of clients to relay signals from the AP?
Ad hoc wireless mesh network
Which wireless mesh network makes use of clients in relay signals from the AP?
Ad hoc wireless mesh network.
The technique for using the antenna with the most recently received strongest signal to transmit is known as:
Answer: Transmit diversity Side-note: Transmit diversity = sending Antenna diversity = receiving
_____ is the process in which an AP accepts a station into the WLAN.
Authentication
A(n) __________ is a radiation chart used to show horizontal coverage area.
Azimuth chart
When documenting a site survey, a __________ is included to itemize every software and/or hardware component needed for a WLAN.
Bill of materials (BOM)
Which of the following is the default access method for IEEE 802.11 WLANs?
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Which of the following is not typically a feature of autonomous access points?
Centralized remote management capabilities
Which of the following is NOT a management frame?
Control Frame
Which term describes an attack where the intent is to prevent a device from performing normal functions?
Denial of Service
When performing a site survey, which step should be taken first?
Determine business requirements
__________________ is the process by which an AP can automatically move to another channel if it detects a foreign AP using the same channel.
Dynamic Frequency Selection (DFS)
__________ is the process by which an AP can automatically move to another channel if it detects a foreign AP using the same channel.
Dynamic frequency selection (DFS)
Which IFS frame is used when a frame MUST be retransmitted?
Extended IFS
Which IFS frame is used when a frame must be retransmitted?
Extended IFS
An RF signal splitter takes one input and splits it into two outputs, doubling the power of the signal.
False
An antenna must be horizontally oriented to communicate with a vertically oriented antenna.
False
CMSA/CD is used in wireless networks to detect if a collision has occured from two stations transmitting simultaneously.
False
CSMA/CD is used in wireless networks to detect if a collision has occurred from two stations transmitting simultaneously.
False
Forward Error Correction (FEC) will cause data to be retransmitted if the first copy of data sent out is found to be corrupted.
False
Most network operating systems require significant modifications to make them compatible with the features at the WLAN Physical Layer.
False
The maximum frame size useable on a wireless network is 1,500 bytes.
False
_____ is the primary regulatory agency for wireless communications in the United States and its territorial possessions.
Federal Communications Comission (FCC)
A __________ is used to limit the power of an RF signal to comply with FCC regulations, and cannot be set by the user.
Fixed-loss attenuator
_______________ is caused by the loss of signal strength as the signal travels.
Free Space Path Loss (FSPL)
In _____ mode an IEEE 802.11a/b/g device will not be able to access the AP.
Greenfield
Select the RTS/CTS technology used when an 802.11n device is used in a mixed environment:
HT Dual-CTS
The RTS/CTS technology used when an 802.11n device is used in a mixed environment is:
HT Dual-CTS protection
The __________ channel access method assigns priorities to transmission and schedules access to a medium by allocating transmission opportunities
Hybrid Coordination Function
The _____________ channel access method assigns priorities to transmissions and schedules access to a medium by allocating transmission opportunities.
Hybrid Coordination Function
The ___________ channel access method assigns priorities to transmissions and schedules access to a medium by allocating transmission opportunities.
Hybrid Coordination Function (HCF)
Which organization is responsible for the global management of radio frequency spectrum?
ITU-R
Which organization is responsible for the global management of the radio frequency spectrum?
ITU-R
The vulnerability in WEP's use of IV is that:
IVs can be repeated
__________ ensures that information has not been modified or changed by a malicious third party.
Integrity
A(n) __________ sends out RF signals in all directions, using power levels regulated by the FCC.
Intentional radiator
An ______________ sends out RF signals in all directions, using power levels regulated by the FCC.
Intentional radiator
Which of the following is NOT an advantage of spread-spectrum transmission in comparison to narrowband transmission?
Invulnerability to interference
Address filtering makes use of a __________, which is a 48-bit identifier that is hard coded into a wireless device.
MAC address
A __________ usually involved physically moving around a WLAN while using a mobile device or laptop to gather information.
Manual site survey
The technique for combining multiple copies of multipath signals into one reinforced signal in 802.11n is called?
Maximum ratio combining (MRC)
Which of the following is NOT a design goal of a site survey? -Minimize bandwidth utilization -Determine the best location for the APs in the WLAN -Develop wireless networks that are optimized for the applications used on the network -Locate any unauthorized APs
Minimize bandwidth utilization
Sending multiple signals simultaneously is known as _________.
Multiplexing
What happens if a probe request frame contains a null value?
No APS will respond
Which of the following is NOT a management frame?
Not: Control frame Are: authentication association request association response beacon deauthentication deassociation probe request probe response reassociation request reassociation response
802.11g makes use of what modulation technique to achieve 54 Mbps transmission speeds?
OFDM
What is data called that is to be encrypted by inputting into an encryption algorithm?
Plaintext
Which utility can be used to view live network traffic and view its contents?
Protocol analyzer
A __________ tag emites wireless data signals that can be used to identify whatever it is placed on.
RFID
A working group is mostly involved in what IEEE process?
Ratification of amendment
A __________ remote wireless bridge can only communicate with other bridges that are not using the same mode. This is a requirement in PtP or PtMP configurations.
Root mode
A ________ serves as a logical network name used by clients to connect to a wireless network.
SSID
A(n) __________ serves as a logical network name used by clients to connect to a wireless network.
SSID
Which of the following does NOT apply to SSID hiding:
SSID cannot be used by unauthorized users
Which of the following uses a challenge text?
Shared key authentication
__________ is a technique for sending the same transmission out from different antennas.
Spatial diversity
An RTS Threshold is used to ensure that packets smaller than a certain size do not make use of RTS/CTS, preventing wasted resources.
True
Devices that use a minimum of 75 hop channels make use of full-channel FHSS.
True
High-gain antennas have longer ranges and higher signal quality, hence may not be aimed precisely in a particular direction at the receiver.
True
High-gain antennas have longer ranges and higher signal quality, hence may not be aimed precisely in a particular direction at the reciever.
True
Beacon frames are regularly transmitted messages sent from APs to announce their presence.
True Ones that do it: probe beacon association authentication
_____ are special high-speed circuits leased from a local carrier that can be used to connect remote sites of a business.
Trunk based leased lines
A weakening electromagnetic signal does not impact which two characteristics?
Wavelength and frequency
A site survey should be performed in all of the following situations EXCEPT -When there are software updates available to client utilities -When there are significant changes in personnel -When there are changes in network needs -When there are physical changes to the building
When there are software updates available to client utilities
The __________ is an organization that encourages use of standards in wireless equipment manufacture, and certifies wireless equipment for compatability.
Wi-Fi Alliance
Which is NOT typically found on a site survey documentation form? -Wired network topology -AP configuration -Throughput findings -Purpose of the report
Wired network topology
The materials concrete, wood, and asphalt that "soak up" an RF signal can all cause
absorption
The modification of the height of a digital signal is called
amplitude shift keying
What is access control in a WLAN?
authorizing devices
A dynamic "self-managing" WLAN that can monitor the environment and then automatically adjust power levels of channels to compensate for changes uses __________ tools.
automated RF resource management
Each of the following is a name for the electromagnetic signal that has been modified to carry information except
carrier keying
__________ is the theoretical maximum rated speed of a network.
data rate
The reference point that relates the logarithmic relative decibel (dB) scale to the linear milliwatt scale is known as the
decibel milliwatt (dBm)
__________ is caused by an object in the path of the transmission.
diffraction
A(n) __________ transmission requires that the emitter and detector be directly aimed at one another.
directed
A delay called the __________ is used to help reduce the effects of intersymbol interference.
guard interval
A delay called the ______________ is used to help reduce the effects of intersymbol interference.
guard interval
Each of the following is a name for the Media Access Control ( MAC) address except:
hardware address
A __________ is a specific geographic location that is served by a wireless data system.
hotspot
Two signals that have the same peaks and valleys are called
in phase
IEEE 802.11 specified that either radio frequency waves or __________ could be used in a WLAN.
infrared light
A mathematical value used to produce ciphertext is called a(n)
key
A __________ is an attack where an attacker analyzes two packets created from the same IV.
keystream attack of IV attack
The __________ refers to the connection that begins at a fast Internet service provider, goes through the local neighborhood, and ends at the home or office
last mile connection
nfrared light is next to visible on the __________.
light spectrum
_______ occurs when a multipath signal arrives 180 degrees out of phase.
nulling
Cycles are illustrated by an up-and-down wave called a(n)
oscillating signal
Focusing RF signal in such a way to cause a gain without increase in IR power is call a(n) __________.
passive gain
With ___________ the medium through which the signal passes causes the signal to bend.
refraction
The wireless system that makes use of a single antenna:
single-input single-output (SISO)
When performing a site survey for a WLAN environment that will support VoWiFi, it is recommended that the primary tools used are:
the built-in tools in the VoWiFi handset
When documenting the current network, each of the following items is important EXCEPT -the number of USB ports on each client -the type of media -the number of clients -the types of clients
the number of USB ports on each client
Which of the following describes a backhaul connection?
two or more remote locations or (if a different option is available) A connection between two local devices
The distance between peaks of an electromagnetic wave is called the
wavelength