CNT4514 Chapter 1- 18 : Quiz2
____ of retailers will provide guest Wi-Fi by 2017. 47% 75% 56% 25%
56%
Approximately 75% of 2.4 GHz access points are set to which channel by default?
6
When analyzing feasibility, you should perform a feasibility study to evaluate the projects potential for success.
TRUE
Which of the following are advantages of autonomous access point architectures? (select ALL that apply) Security issues will not be an issue Installations may be time-consuming Less hardware to install Can be less expensive for smaller installations
1- Can be less expensive for smaller Installstions. 2- Less Hardware to install.
This specification is used to create personal area networks (PANs) built from low-power digital radios. 802.15.4 Zigbee Bluetooth 802.14 PAN Net 802.11.ac USBnet
802.15.4 Zigbee
In 802.2, the LLC provides which of the following services (select 3):
- Connection-oriented service - Acknowledged connectionless service - Unacknowledged connectionless service
What would the answer be for converting 37mw to dBm?
15.68 dBm
In the 7 steps to Wireless LAN deployment, this step includes: Preliminary Requirements and Design Hardware and Software Costs Deployment Services Costs Ongoing Operations and Maintenance Costs
Step: 5
To avoid unauthorized access to your wireless network, you should allow only specific computers to access the network. You do this by putting the ____ addresses into an access table so that only those systems can access the network. MAC SSID TCP NAP
MAC
When considering PoE in a wireless LAN, you have the following options: switch with inline power, inline power patch panel, and power injector.
TRUE
FFT stands for...
Fast Fourier Transform
Which 802.11 wireless standard supports 5GHz frequencies, and speeds greater than 1Gbps?
ac
802.11 fragmentation divides data into separate fragments. (True/False)
true P. 144 - Figure 6-8
Based on Federal Communications Commission (FCC) RF exposure limits, keep access point antennas at least 7.9 inches (20 cm) or more from the body of all persons.
true Page 395
Which of the following are architectural elements that you should consider when designing a WLAN system? (select ALL that apply)
- Application Connectivity - Access Network - Distribution System - Voice over WLAN
Which wireless technology standard supports data rates of 100 Mbps or higher?
802.11 n
Which of the following supports MIMO?
802.11n
Which of the following elements ensures that client devices connecting to an access point are authorized to access protected resources?
Authentication
What type of access point is relatively intelligent and implements enough functions to allow the access point to interconnect with other access points via conventional Ethernet switches?
Autonomous
Which three properties are interrelated?
Frequency, phase, and amplitude
_______ is a method of encoding digital data on multiple carrier frequencies. It has also developed into a popular scheme for wideband digital communication.
OFDM
What technology enables ordinary Ethernet network cables to function as power cords?
Power over Ethernet
Which of the following are benefits of the 802.11 standard?
Price reductions Fast product development Stable future migration Appliance interoperability
All but which ONE of the following are benefits of wireless networks?
Resistance to interference
The MAC layer main functions, include ALL but which ONE of the following?
Route path metrics
In wireless technologies, SNR stands for....
Signal to Noise Ratio
High rate DSSS (HR/DSSS) is the PHY defined in the IEEE 802.11b−1999 amendment.
TRUE
The biggest source of interference today for most people is neighboring Wi-Fi networks.
TRUE
Amplifiers improve performance throughout the coverage area. True/False
True
If a company used a mainframe computer, and needed to connect numerous personal computers, what type of software would be used to permit this? Mainframe Middleware Software Terminal Emulation Wireless Middleware System Browser Emulation
Wireless Middleware
A wireless signal is embedded on a _________ wave specified at a certain frequency. digital broadband---0 analog carrier
carrier
A _________________ attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have.
denial of service
.Which one of the following radio signals can cause degradation in performance of a wireless network?
microwave signals
Which of the following are security vulnerabilities in Wireless?(Select ALL that apply)
passive monitoring unauthorized access rogue access point(s) denial of service (DoS)
When it comes to installing and configuring a wireless LAN, which of these safety tips should be considered (select ALL that apply):
1- Recommend that installers remove rings and necklaces while installing hardware components. 2- Wear eye protection when using saws or drills. 3- Insist that no installers work alone. 4- The use of proper ladders and safety harnesses if placing antennas on towers or rooftops.
When preparing/performing a site survey, which of the following should one consider? (Select ALL that apply)
1- identify potential radio signal interference 2- inspect the facility 3- determine optimum access point antenna installation 4- review requirements 5- obtain floor diagrams 6- select tools 7- write a wireless site survey report 8- assess existing network infrastructure
An installation plan should include which of the following? (Select ALL that apply)
1- required facility changes 2- points of contact 3- tools 4- safety tips 5- installation procedures
This is a use of multiple antennas at both the transmitter and receiver to improve communication performance.
MIMO
Which type of wireless network type can easily, and effectively connect entire cities using inexpensive, existing technology?
MESH
Which of the following are benefits of wireless networks? (Select all that apply)
Mobility. Installation in difficult-to-wire areas. Increased reliability Reduced installation time. Long-term cost savings.
The WLAN market is growing faster than the traditional LAN market as a whole.
True
When using amplifiers, one should be certain to follow the country's regulatory rules that define the usage of radio frequency (RF) amplifiers. (True or False)
True
Pilot testing should be considered when testing the system design of a WLAN solution before installing the system.
True Page 418
Do not install access points near unshielded blasting caps or in an explosive environment because radio frequency (RF) signals from the access point (or radio clients) may cause explosives to ignite. (True/False)
true Page 395
When performing wireless site survey coverage testing, set the signal-measuring tool to only record signal strength on the channel that the test access point is set to. (True/False)
true Page 407
Simulation testing should be done when developing a type of WLAN product that does not exist.
true Page 417
Prototype testing should be considered when initially testing the design of a new WLAN product before going into mass production.
true Page 418
There are two major methods of modulation. One adjusts the height of the wave, and the other adjusts the width of the wave. These two techniques are referred to as _______ and _______ modulation.
frequency, amplitude
When attempting to provide wireless coverage in the presence of an elevator (and within) in a multi-floor facility, the recommendation is to place AP close to the elevator and...
- place an AP on every other floor - -
When co-locating multiple access points, many times, one will need to use multiple channels to ensure the least amount of AP interference. The three channels that will most likely be used in this situation are:
1, 6, 11
Which of the following can be used as authentication servers for an EAP-TLS system? (Select 3)
1- Cisco Access Control Server (ACS) 2- FreeRADIUS 3- Microsoft Internet Authentication Server (IAS)
Performance testing of a WLAN includes which of the following? (Select ALL that apply)
1- Load Tests 2- Association Tests 3- Registration Tests 4- Application Tests
When managing a wireless LAN, operation support considerations include:(Select all that apply)
1- security management 2- network monitoring 3- maintenance 4- help desk 5- configuration management
Which of the following wireless technologies can operate in the 2.4 GHz spectrum? (Select all that apply).
802.11b 802.11g 802.11n
Which of the following supports bonding two 20 MHz channels into a 40 MHz wide channel?
802.11n
This wireless standard supports common devices found in cars, and portable devices. It is primarily used for exchanging data over short distances, and uses short-wavelength UHF radio waves.
802.15
Which of the following are common antenna characteristics? (Select ALL that apply)
Bandwidth and Power Radiation Pattern Antenna Gain Antenna Diversity
Many companies are starting to use this function to protect wireless devices that are lost or stolen from being accessed. System Lock Device Lo-Jack Device Management Client Device Wipe MAC Access Encryption
Client Device Wipe
Inter-Frame Spacing refers to timing and synchronization. Which of the following are valid IFS? (Select ALL that apply)
DCF IFS PCF IFS Short IFS Extended IFS
Multipath propagation ____________ the quality of the signal at the receiver.
Decreases
This is the first stage in project management, and is the most important.
Defining the scope
This is done after you have created the project charter, stated the assumptions, and identified the project constraints.
Develop the Work Breakdown Structure
When attempting to cover outdoor open areas, it is best to use this type of antenna?See the picture below:
Directional Page 380
Which one of the following is not an EAP Method?
EAP Slow
Which one of the following EAP Methods is very secure and is supported on a wide range of client cards, and it is native to Microsoft Windows?
EAP-TLS
This type of access point is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network.
ROGUE
This tool enables one to visualize radio frequency (RF) signals present within the frequency spectrum.
Spectrum Analyzer
The MAC Layer provides which of the following functions (select ALL that apply)?
Timing and Synchronization Data delivery Connectivity Power Management
Which ONE of the following is NOT something that should be defined when planning the security for a wireless network?
Existing Router Configurations
802.11g is not backward-compatible with 802.11b in that disparate clients and access points will not discover one another and communicate.
FALSE
An ad hoc wireless network is a method for wireless devices to indirectly communicate with each other.
FALSE
The IEEE 802 Family of Standards falls within the scope of _________ and _________ of the OSI Reference model.
Layer 1 Layer 2 P. 121 - Figure 5-2
________ is a method of encoding digital data on multiple carrier frequencies. It has developed into a popular scheme for wideband digital communication, whether wireless or over copper wires, used in applications such as digital television and audio broadcasting
OFDM
These types of standards are implemented and controlled by an organization like the IEEE.
OFFICIAL
This is a timing method used by wireless networks, and resides in a point coordinator or access point to coordinate the communication within the network.
PCF
The _______ minimizes the dependence of the MAC layer on the PMD sublayer by mapping MPDUs into a frame format suitable for transmission by the PMD.
PLCP
These devices are used to increase the effective power of a radio frequency signal
RF Amplifier
This wireless technology is used to help businesses wirelessly scan shipments of products.
RFID
This is the optional mechanism used by the 802.11 wireless networking protocol to reduce frame collision introduced by the hidden node problem.
RTS/CTS
This analysis is used to help a company determine the risks, strengths and other issues that may arise in any project.
SWOT analysis
In this step, the Project's scope is defined which provides a basis for future project decisions.
Step: 1
In this step, team members, such as project manager, user representatives, analysts, engineers, implementers, etc. are defined within project teams.
Step: 3
In the 7 steps to Wireless LAN deployment, this step includes: Names of the phases and tasks listed on the WBS (Work Breakdown Structure). Starting date, duration, and due date of each task. Relatioships between phases and tasks.
Step: 4
Higher gain antennas boost performance throughout the coverage area. True/False
True
What method of signal is distributed across multiple frequencies which results in a signal with a wider bandwidth?
spread-spectrum