Networking Quiz (part 2 of 2)
AES-based encryption mode implemented in WPA2 is known as: 1) CCMP 2) TPM 3) TKIP 4) MTBF
1) CCMP
Which of the following answers refers to an antenna type used as standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? 1) Dipole antenna 2) Dish antenna 3) Unidirectional antenna 4) Yagi antenna
1) Dipole antenna
What is the name of the signal modulation technique specified in the IEEE 802.11b wireless standard amendment? 1) Direct Sequence Spread Spectrum (DSSS) 2) Orthogonal Frequency Division Multiplexing (OFDM) 3) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) 4) Frequency Hopping Spread Spectrum (FHSS) 5) Carrier Sense Multiple Access / Collision Detection (CSMA/CD)
1) Direct Sequence Spread Spectrum (DSSS)
Which of the following answers refers to the measurement of data transfer rate that excludes all protocol overhead information as well as retransmission of lost data packets? 1) Goodput 2) Bandwidth cap 3) Throughput 4) Baseline
1) Goodput
An infrastructure device designed for connecting client devices to a network is commonly referred to as an Access Point (AP). 1) True 2) False
1) True
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. IEEE 802.11 wireless networks use several EAP methods, including EAP-TLS, EAP-TTLS, PEAP, and EAP-SIM. 1) True 2) False
1) True
In computer networking, the term "Collision" is used to describe a situation in which two or more demands are made simultaneously on equipment that can handle only one at any given moment. 1) True 2) False
1) True
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting in order to prevent collisions and loss of data. 1) True 2) False
1) True
Frequency bands for WLANs using IEEE 802.11 protocols include: (Select 2 answers) 1) 5.0 GHz 2) 2.4 GHz 3) 5.4 GHz 4) 2.0 GHz
1) 5.0 GHz 2) 2.4 GHz
The IEEE 802.11n standard amendment provides for backward compatibility with: (Select all that apply) 1) 802.11b 2) 802.11g 3) 802.11ac 4) 802.11a
1) 802.11b 2) 802.11g 4) 802.11a
The IEEE 802.11g wireless standard amendment specifies the use of frequency band of: 1) 5.0 GHz 2) 2.4 GHz 3) 2.0 GHz 4) 5.4 GHz
2) 2.4 GHz
The IEEE 802.11n wireless standard amendment specifies maximum data signaling rate of: 1) 54 Mbps 2) 600 Mbps 3) 11 Mbps 4) 100 Mbps
2) 600 Mbps
In Wireless Local Area Networks (WLANs), collisions are resolved with the use of Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method. 1) True 2) False
2) False
Disabling SSID broadcast: 1) Is one of the measures used in securing wireless networks 2) Makes a WLAN harder to discover 3) Blocks access to a WAP 4) Prevents wireless clients from accessing the network
2) Makes a WLAN harder to discover
Which of the following WAP configuration settings allows for adjusting the boundary range of a wireless signal? 1) Beacon frame 2) Power level controls 3) Maximum Transmission Unit (MTU) 4) Quality of Service (QoS)
2) Power level controls
Which of the following serves as a unique identifier for a WLAN (a wireless network name)? 1) EUI 2) SSID 3) OUI 4) CNAME
2) SSID
Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the replacement of legacy hardware? 1) PEAP 2) TKIP 3) CCMP 4) WPA2
2) TKIP
Modified older wireless standards that allow complaint devices to achieve higher speeds include: (Select all that apply) 1) 802.11x 2) 802.11a-ht 3) 802.11ac 4) 802.11g-ht
2) 802.11a-ht 4) 802.11g-ht
Which of the antenna types listed below provide a 360-degree horizontal signal coverage? (Select 2 answers) 1) Unidirectional antenna 2) Dipole antenna 3) Dish antenna 4) Omnidirectional antenna 5) Yagi antenna
2) Dipole antenna 4) Omnidirectional antenna
Which of the following answers list(s) the characteristic features of the 802.11g wireless standard amendment? (Select all that apply) 1) Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 2) Orthogonal Frequency Division Multiplexing (OFDM) modulation 3) Maximum data signaling rate of 54 Mbps 4) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 5) 2.4 GHz frequency range 6) Maximum data signaling rate of 11 Mbps 7) Direct Sequence Spread Spectrum (DSSS) modulation 8) 5.0 GHz frequency range
2) Orthogonal Frequency Division Multiplexing (OFDM) modulation 3) Maximum data signaling rate of 54 Mbps 4) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 5) 2.4 GHz frequency range 7) Direct Sequence Spread Spectrum (DSSS) modulation
Which of the following answers refers to an authentication framework frequently used in wireless networks and point-to-point connections? 1) RDP 2) CCMP 3) EAP 4) LDAP
3) EAP
A Wireless Local Area Network (WLAN) operating in an infrastructure mode with the use of more than one Access 1) Point (AP) is referred to as: 2) Service Set Identifier (SSID) 3) Extended Service Set (ESS) 4) Basic Service Set (BSS) 5) Independent Basic Service Set (IBSS)
3) Extended Service Set (ESS)
Which of the answers listed below refers to the new feature introduced with the IEEE 802.11ac standard? 1) MIMO 2) 40-Hertz mode 3) MU-MIMO 4) Maximum data signaling rate of up to 600 Mbps
3) MU-MIMO
The IEEE 802.11n wireless standard amendment specifies a signal modulation technique known as: 1) Direct Sequence Spread Spectrum (DSSS) 2) Carrier Sense Multiple Access / Collision Detection (CSMA/CD) 3) Orthogonal Frequency Division Multiplexing (OFDM) 4) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) 5) Frequency Hopping Spread Spectrum (FHSS)
3) Orthogonal Frequency Division Multiplexing (OFDM)
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws? 1) AES 2) PEAP 3) WEP 4) CCMP
3) WEP
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: 1) War chalking 2) Tailgating 3) War driving 4) Shoulder surfing
3) War driving
Which of the following is an example of a wireless site survey? 1) Spear phishing 2) Bluejacking 3) War driving 4) Shoulder surfing 5) War chalking
3) War driving
Which of the following answers refer to collision avoidance methods specified in the 802.11 wireless networking standard? (Select 2 answers) 1) Direct Sequence Spread Spectrum (DSSS) 2) Orthogonal Frequency Division Multiplexing (OFDM) 3) Distributed Coordination Function (DCF) 4) Frequency Hopping Spread Spectrum (FHSS) 5) Point Coordination Function (PCF)
3) Distributed Coordination Function (DCF) 5) Point Coordination Function (PCF)
Which of the following answers refer to the 3G/4G mobile broadband telecommunications standards? (Select 2 answers) 1) High-Level Data Link Control (HDLC) 2) Digital Subscriber Line (DSL) 3) Evolved High-Speed Packet Access (HSPA+) 4) Open Systems Interconnection (OSI) 5) Long Term Evolution (LTE)
3) Evolved High-Speed Packet Access (HSPA+) 5) Long Term Evolution (LTE)
Which of the following answers refer(s) the characteristic features of the 802.11a wireless standard amendment? (Select all that apply) 1) Maximum data signaling rate of 54 Mbps 2) 5.0 GHz frequency band 3) Orthogonal Frequency Division Multiplexing (OFDM) modulation 4) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) 5) Frequency Hopping Spread Spectrum (FHSS) modulation 6) 2.4 GHz frequency band 7) Maximum data signaling rate of 11 Mbps 8) Carrier Sense Multiple Access / Collision Detection (CSMA/CD)
3) Orthogonal Frequency Division Multiplexing (OFDM) modulation 4) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA)
The IEEE 802.11g wireless standard amendment specifies maximum data signaling rate of: 1) 11 Mbps 2) 2 Mbps 3) 54 Mbps 4) 100 Mbps
3) 54 Mbps
Which of the device types listed below offers the highest coverage of a wireless signal? 1) 802.11g 2) 802.11a 3) 802.11n 4) 802.11b
3) 802.11n
Which of the following protocols encapsulates EAP within an encrypted and authenticated TLS tunnel? 1) CHAP 2) PAP 3) IPsec 4) PEAP
4) PEAP
Which of the following answers list(s) the characteristic features of the 802.11b wireless standard amendment? (Select all that apply) 1) Orthogonal Frequency Division Multiplexing (OFDM) modulation 2) Maximum data signaling rate of 54 Mbps 3) 5.0 GHz frequency range 4) Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 5) 2.4 GHz frequency range 6) Maximum data signaling rate of 11 Mbps 7) Direct Sequence Spread Spectrum (DSSS) modulation 8) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
5) 2.4 GHz frequency range 6) Maximum data signaling rate of 11 Mbps 7) Direct Sequence Spread Spectrum (DSSS) modulation 8) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the following answers list(s) the characteristic features of the 802.11n wireless standard amendment? (Select all that apply) 1) Multiple Input / Multiple Output (MIMO) 2) Maximum data signaling rate of 54 Mbps 3) 2.4 GHz frequency band 4) Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 5) Orthogonal Frequency Division Multiplexing (OFDM) modulation 6) 5.0 GHz frequency band 7) Frequency Hopping Spread Spectrum (FHSS) modulation 8) Maximum data signaling rate of 600 Mbps 9) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
5) Orthogonal Frequency Division Multiplexing (OFDM) modulation 6) 5.0 GHz frequency band 8) Maximum data signaling rate of 600 Mbps 9) Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method