Wireless Networking
What acronym refers to a client authentication method used in WPA/WPA2 Personal modes?
PSK
What is the name of an AES-based encryption mode implemented in WPA2?
CCMP
A wireless disassociation attack is a type of:
Denial of Service (DoS) attack
A unique WLAN identifier is commonly referred to as:
SSID
What refers to a channel access method used in 2G GSM networks?
TDMA
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:
TKIP
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). True or False?
True
Which of the following wireless technologies enables identification and tracking of tags attached to objects? a. WAF b. RFID c. GPS d. WTLS
b
The IEEE 802.11ac standard specifies a maximum channel bandwidth of:
160 MHz
The IEEE 802.11a standard specifies a channel bandwidth of:
20 MHz
The IEEE 802.11g standard specifies a channel bandwidth of:
20 MHz
The IEEE 802.11n standard specifies available channel bandwidth options of: (2 answers)
20 MHz and 40 MHz
Frequency bands used by 802.11 networks include: (2 answers)
5.0 GHz and 2.4 GHz
The IEEE 802.11g standard is backwards compatible with:
802.11b
Which refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment?
ANT+
A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called:
Ad hoc mode
A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called:
Bluetooth
What refers to a channel access method used in 3G cellular networks?
CDMA
A solution that allows to control access to a shared transmission medium in 802.11 networks is known as:
CSMA/CA
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as:
Geofencing
Which IEEE standard provides the implementation basis for most modern WLANs
IEEE 802.11
In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the:
IEEE 802.11n standard
A wireless networking topology consisting of at least one Access Point (AP) is referred to as:
Infrastructure mode
What refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?
Omnidirectional antenna
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?
Power level controls
What refers to an encryption algorithm used in TKIP?
RC4
A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as:
SNR
The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID) appears as a legitimate access point to connecting hosts. True or False?
True
Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. True or False?
True
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. True or False?
True
What tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?
WAP power level controls
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is known as:
WLAN
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War driving
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves
Wireless site survey
Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network?
Z-Wave
Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? a. EAP-TLS b. PEAP c. EAP-TTLS d. EAP-FAST
a
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) a. Suitable for large corporate networks b. Does not require an authentication server c. Suitable for all types of wireless LANs d. Requires RADIUS authentication server
a and d
Which network device enables centralized management of WAPs?
Wireless LAN controller
Which type of technology enables contactless payment transactions?
NFC
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. True or False?
True
Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards. True or False?
True
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. True or False?
True
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. True or False?
True
Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers) a. Maximum data signaling rate of 54 Mbps b. 5.0 GHz frequency band c. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method d. 2.4 GHz frequency band e. Maximum data signaling rate of 11 Mbps f. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
a b and c
The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) a. 802.11g b. 802.11ac c. 802.11b d. 802.11a
a c and d
Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) a. Yagi antenna b. Omnidirectional antenna c. Dish antenna d. Non-directional antenna e. Parabolic antenna f. Dipole antenna
a c and e
Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? a. 1 b. 5 c. 6 d. 9 e. 11
a c and e
The characteristic features of the IEEE 802.11n wireless standard include: (Select all that apply) a. Multiple Input / Multiple Output (MIMO) b. Maximum data signaling rate of 54 Mbps c. 2.4 GHz frequency band d. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method e. 5.0 GHz frequency band f. Multi-User Multiple Input / Multiple Output (MU-MIMO) g. Maximum data signaling rate of up to 600 Mbps h. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
a c e g and h
What are the characteristic features of satellite Internet connections? (Select 3 answers) a. High signal latency b. Lack of signal interference c. Cheaper in comparison to terrestrial links d. Interference (weather dependent) e. Low signal latency f. Relatively high cost in comparison to terrestrial links
a d and f
Disabling SSID broadcast: a. Is one of the measures used in the process of securing wireless networks b. Makes a WLAN harder to discover c. Blocks access to a WAP d. Prevents wireless clients from accessing the network
b
Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? a. 20 MHz b. 22 MHz c. 40 MHz d. 80 MHz
b
Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) a. Unidirectional antenna b. Dipole antenna c. Yagi antenna d. Omnidirectional antenna e. Dish antenna
b and d
What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) a. Maximum data signaling rate of 54 Mbps b. 5.0 GHz frequency band c. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method d. 2.4 GHz frequency band e. Maximum data signaling rate of 11 Mbps f. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
b c and d
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) a. Data signaling rate of up to 600 Mbps b. 5.0 GHz frequency band c. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method d. Maximum data signaling rate of up to 6.77 Gbps e. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method f. Multi-User Multiple Input / Multiple Output (MU-MIMO) g. 2.4 GHz frequency band
b d e and f
Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls? a. NFC b. 802.3 c. IR d. Z-Wave
c
Which of the following EAP methods offers the highest level of security? a. PEAP b. EAP-FAST c. EAP-TLS d EAP-TTLS
c
Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? a. Multiple Input / Multiple Output (MIMO) b. 40 MHz channel width c. Multi-User MIMO (MU-MIMO) d. Maximum data signaling rate of up to 600 Mbps
c
Which of the following would be the best solution for securing a small network lacking an authentication server? a. WPA-PSK b. WPA2-Enterprise c. WPA2-PSK d. WPA-Enterprise
c
Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) a. Maximum data signaling rate of 54 Mbps b. 5.0 GHz frequency band c. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method d. 2.4 GHz frequency band e. Maximum data signaling rate of 11 Mbps f. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
d e and f
Which of the following can be the source of RFI and cause disruptions in network connectivity? a. Cordless phones b. Fluorescent lights c. Microwave ovens d. Bluetooth devices e All of the above
e