2.3 Given a scenario, select and configure wireless devices and technologies.
100. C. The IEEE 802.11 ax standard provides the greatest possible throughput, up to a theoretical maximum of 9.6 Gbps. This is a 37% improvement over 802.11ac, at 7 Gbps. The 802.11n standard runs at speeds up to 600 Mbps. The 802.11a and 802.11g standards run at up to 54 Mbps. The 802.11b standard runs at up to 11 Mbps.
100. Which of the following IEEE wireless LAN standards provides the greatest possible throughput? A. 802.11a B. 802.11ac C. 802.11ax D. 802.11b E. 802.11g F. 802.11n
101. D, F. The 802.11n and 802.11ax standards define wireless LAN devices that can support both the 2.4 GHz and 5 GHz frequency bands. The 802.11a and 802.11ac standards use only 5 GHz, and the 802.11b and 802.11g standards use only 2.4 GHz.
101. Which of the following IEEE 802.11 wireless LAN standards are capable of supporting both the 2.4 GHz and 5 GHz frequencies? (Choose all that apply.) A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11ac F. 802.11ax
102. C. The 802.11ax and 802.11ac standards support multiple input, multiple output (MIMO) through the use of up to eight antennas on a single device. 802.11n is the only earlier 802.11 standard that supports MIMO, but it can only use a maximum of four antennas.
102. What is the maximum number of transmit and receive antennas supported by the currently ratified IEEE 802.11 wireless LAN standards? A. 2 B. 4 C. 8 D. 16
103. C. The service set identifier (SSID) is the name that you use when connecting to a wireless network. A basic service set (BSS) refers to the wireless network itself, consisting of a single AP and a number of clients. An extended service set (ESS) consists of two or more BSSs, using multiple APs. The basic service set identifier (BSSID) is the MAC address of the access point associated with a BSS. The extended service set identifier (ESSID) specifies the name of a network using multiple APs to support a single SSID. 104. A, B. Devices conforming to the IEEE 802.11a and 802.11g standards can only use a single 20 MHz channel. IEEE 802.11n devices can use channel bonding to join two channels together and achieve an aggregate channel width of 40 MHZ. IEEE 802.11ax and 802.11ac devices can bond up to eight channels, for an aggregate width of 160 MHz, in a single channel or a non-contiguous 80+80 configuration. 105. A.
103. Which of the following is the term for the network name that you use to connect a client device to an access point (AP) on a wireless LAN? A. BSS B. ESS C. SSID D. BSSID E. ESSID
104. A, B. Devices conforming to the IEEE 802.11a and 802.11g standards can only use a single 20 MHz channel. IEEE 802.11n devices can use channel bonding to join two channels together and achieve an aggregate channel width of 40 MHZ. IEEE 802.11ax and 802.11ac devices can bond up to eight channels, for an aggregate width of 160 MHz, in a single channel or a non-contiguous 80+80 configuration.
104. Which of the following IEEE wireless LAN standards define devices with a maximum aggregate channel width of 20 MHz? (Choose all that apply.) A. 802.11a B. 802.11g C. 802.11n D. 802.11ac
105. A. Wireless range extenders are Physical layer devices that receive signals from wireless access points (WAPs) and network adapters and retransmit them, enabling devices to connect that are farther apart than the network would normally support. Because the extenders do not process the packets in any way, but just retransmit the signals, they do not operate at any layer above the Physical.
105. At which layer of the Open Systems Interconnection (OSI) model do wireless range extenders operate? A. Physical B. Data link C. Network D. Transport E. Session F. Presentation G. Application
106. D. Wi-Fi Protected Access 3 (WPA3) is the most secure of the wireless protocols, providing the greatest degree of network device hardening. Wi-Fi Protected Access (WPA) was created to replace the insecure Wired Equivalent Privacy (WEP) protocol, and Wi-Fi Protected Access 2 (WPA2) was created to replace the Temporal Key Integrity Protocol (TKIP) used in the first version of WPA with Advanced Encryption Standard (AES). Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages.
106. Which of the following wireless security protocols provides the greatest degree of network device hardening? A. WEP B. WPA C. WPA2 D. WPA3 E. EAP
118. C, D. WPA-Enterprise, also known as WPA-802.1X, can use the Extensible Authentication Protocol (EAP) to support various types of authentication factors and requires a Remote Authentication Dial-In User Service (RADIUS) server. WPA-Personal, also known as WPA-PSK (Pre-Shared Key), is intended for small networks and does not require RADIUS.
118. Which of the following forms of the WiFi Protected Access (WPA), WPA2, and WPA3 protocols require a RADIUS server? (Choose all that apply.) A. WPA-Personal B. WPA-PSK C. WPA-Enterprise D. WPA-802.1X
119. A. WPA-Personal, also known as WPA-PSK, is intended for small networks and requires a PSK. WPA-Enterprise, also known as WA-802.1X, uses the Extensible Authentication Protocol (EAP) to support various types of authentication factors and requires a Remote Authentication Dial-In User Service (RADIUS) server.
119. Which of the following forms of the Wi-Fi Protected Access (WPA), WPA2, and WPA3 protocols call for the use of a pre-shared key (PSK)? A. WPA-Personal B. WPA-Enterprise C. WPA-EAP D. WPA-802.1X
120. A. TKIP uses the RC4 stream cipher for its encryption. Advanced Encryption Standard (AES) is used with CMP on versions 2 and 3 of the Wi-Fi Protected Access (WPA2 and WPA3) security protocol, not version 1 (WPA), which uses TKIP. Secure Hash Algorithm (SHA) is a file hashing algorithm, not used for wireless network encryption.
120. Which of the following stream ciphers does the Temporal Key Integrity Protocol (TKIP) use for encryption on a wireless network? A. RC4 B. AES С. ССМР
122. C. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is based on the Advanced Encryption Standard (AES) and is the encryption protocol used with the WiFi Protected Access 2 and 3 (WPA2 and 3) security protocols on wireless networks. CCMP is not based on the Temporal Key Integrity Protocol (TKIP), which uses RC4 as its stream cipher. 802.1X is an authentication protocol and is not used for encryption.
122. CCMP is based on which of the following encryption standards? A. TKIP B. RC4 C. AES D. 802.1X
86. D. An ad hoc topology describes wireless computers that communicate directly with each other, without the need for any hardware other than their wireless network adapters. Therefore, the ad
86. Which of the following components is required for two computers to communicate using an IEEE 802.11 wireless LAN in an ad hoc topology? A. A router connected to the Internet B. A wireless access point (WAP) C. An external antenna D. None of the above
87. A, E. IEEE 802.11b, 802.11g, 802.11n, and 802.11ax networks can use the 2.4 GHz frequency band for their transmissions, which can experience interference from a wireless phone using the same frequency. IEEE 802.11a and IEEE 802.11ac, however, use the 5 GHz band, which will not experience interference from a 2.4 GHz phone.
87. Which of the following wireless networking technologies will never experience interference from a 2.4 GHz wireless phone? (Choose all that apply.) A. IEEE 802.11a B. IEEE 802.11b C. IEEE 802.11g D. IEEE 802.11n E. IEEE 802.11ac F. TEEE 802.11ax
88. C, D, E. The IEEE 802.11n, 802.11ac, and 802.11 ax standards include MIMO, which enables them to effectively multiplex signals using multiple antennas. This capability was first introduced in the 802.11n standard, so the 802.11a and 802.11b/g standards do not support it.
88. Which of the following wireless LAN standards include the ability to use multiple input, multiple output (MIMO) antennas? (Choose all that apply.) A. IEEE 802.11a B. IEEE 802.11b/g C. IEEE 802.11n D. IEEE 802.11ac E. IEEE 802.11ax
89. B. The IEEE 802.11b standard calls for DSSS signal modulation. All of the other standards listed call for orthogonal frequency-division multiplexing (OFDM) encoding.
89. Which of the following IEEE wireless LAN standards uses the direct-sequence spread spectrum (DSSS) signal modulation technique? A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11ac
97. D. Using a technique called channel bonding, the 802.11ax and 802.11ac standards define the combination of up to eight 20 MHz channels, for a total possible channel width of 160 MHz, in a single 160 MHz channel or a non-contiguous 80+80 configuration. The 802.11n standard can bond up to two channels, for a 40 MHz width. Earlier standards are limited to a single 20 MHz channel.
97. What is the maximum channel width possible using wireless networking equipment based on the ratified IEEE 802.11 regulatory standards? A. 20 MHz B. 40 MHZ C. 80 MHz D. 160 MHZ
98. A, E. The IEEE 802.11a and IEEE 802.11ac standards can use the 5 GHz band only. IEEE 802.11b and IEEE 802.11g can use the 2.4 GHz band only. IEEE 802.11n and IEEE. 802.11ax can use either the 2.4 or the 5 GHz band.
98. Which of the following wireless networking standards are capable of using only the 5 GHz frequency? (Choose all that apply.) A. IEEE 802.11a B. IEEE 802.11b C. IEEE 802.11g D. IEEE 802.11n E. TEEE 802.11ac F. TEEE 802.11ax
99. F. Only the 802.11ax standard defines wireless LAN devices that can support the 6 GHz frequency band. The 802.11a and 802.11ac standards use only 5 GHz, and the 802.11b and 802.11g standards use only 2.4 GHz. The 802.1ln standard supports both the 2.4 and 5 GHz bands.
99. Which of the following IEEE 802.11 wireless LAN standards is capable of supporting the 6 GHz frequency band? A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11ac F. 802.11ax
107. B. WPA was created to replace the insecure Wired Equivalent Privacy (WEP) protocol and used Temporal Key Integrity Protocol (TKIP) with the RC4 cipher for encryption. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (ССМР) with Advanced Encryption Standard (AES) is an encryption protocol that is used with the Wi-Fi Protected Access 2 (WPA2) security protocol. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages. EAP is used on wireless networks and point-to-point connections and supports dozens of different authentication methods, including Transport Layer Security (TLS). It is not the encryption protocol used with WPA. Terminal Access Controller Access Control System Plus (TACACS+) is a protocol designed to provide AAA services for networks with many routers and switches.
107. Which of the following encryption protocols was introduced in the Wi-Fi Protected Access (WPA) wireless security standard? A. CCMP-AES B. TKIP-RC4 C. EAP-TLS D. TACACS+
108. B. Wi-Fi Protected Access (WPA) was created to replace the insecure Wired Equivalent Privacy (WEP) protocol and used the Temporal Key Integrity Protocol (TKIP) with the RC4 cipher. WPA was replaced by WPA2 and later WPA3, both of which use Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) with Advanced Encryption Standard (AES) for encryption. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages.
108. TKIP-RC4 is an encryption protocol used with which of the following wireless network security standards? A. WEP B. WPA C. WPA2 D. WPA3 E.EAP
109. A. Wi-Fi Protected Access (WPA) is a wireless security protocol that was designed to replace the increasingly vulnerable Wired Equivalent Privacy (WEP). WPA added an encryption protocol called Temporal Key Integrity Protocol (TKIP). This too became vulnerable, and WPA2 was introduced, which replaced TKIP with the stronger CCMP-Advanced Encryption Standard (CCMP-AES). Extensible Authentication Protocol and 802.1X do not provide encryption.
109. Which of the following protocols provides wireless networks with the strongest encryption? A. AES В. TKIP С. EAP D. 802.1X
111. C, D. A replay attack is one in which an attacker utilizes the encryption key found in a previously captured packet to gain access to the network. Simultaneous Authentication of Equals (SAE) prevents replay attacks by including a mutual authentication process, as well as correlation of a shared passphrase. Perfect Forward Secrecy (PFS) prevents replay attacks by issuing a unique key for every session, so that data illicitly retained from previous sessions is rendered unusable. Pre-shared key (PSK) is the passphrase mechanism from WPA2 that has been replaced by SAE in WPA3. Near field communication (NFC) is a contact-based short-range authentication method used by some wireless implementations. Neither prevents replay attacks
111. Upgrading a wireless network to the WPA3-Personal security protocol provides clients with additional protection from replay attacks. Which of the following WPA3 elements accomplish this? (Choose all that apply.) A. PSK B. NFC C. SAE D. PFS
112. C, D. Wi-Fi Protected Access (WPA) is a wireless security protocol that was designed to replace the increasingly vulnerable Wired Equivalent Privacy (WEP). WPA added an encryption protocol called Temporal Key Integrity Protocol (TKIP). This too became vulnerable, and WPA2 and later WPA3 were introduced, both of which replace TKIP with CCMP-Advanced Encryption Standard (CMP-AES) encryption.
112. Which of the following wireless security protocols use CCMP-AES for encryption? (Choose all that apply.) A. WEP B. WPA C. WPA2 D. WPA3E. TKIP
113. D. WPA3-Personal addresses WPA2's KRACK vulnerability with a more secure cryptographic handshake, replacing the PSK four-way handshake with Simultaneous Authentication of Equals (SAE), a version of the Internet Engineering Task Force's dragonfly handshake in which either client or AP can initiate contact. Each device then transmits its authentication credentials in a discrete, one-off message, instead of in a give-and-take, multipart conversation.
113. Which of the following wireless LAN security protocols does not support the use of a pre-shared key (PSK) in its Personal configuration? A. WEP B. WPA C. WPA2 D. WPA3
114. A. WPA2 adds Counter Mode with Cipher Block Chaining Message Authentication Code Protocol - Advanced Encryption Standard (CCMP-AES), a new symmetric key encryption algorithm that strengthens the protocol's security. Multiple-input and multiple-output (MIMO) is a multiplexing technology added to the IEEE 802.11n standard, not to WPA2. Wired Equivalent Protocol (WEP) is the predecessor to WPA; it is not part of WPA2. Temporal Key Integrity Protocol (TKIP) is the encryption algorithm used in the first version of WPA; it was not added in the second version.
114. Which of the following did the WiFi Protected Access 2 (WPA2) security protocol add to the existing WPA standard? A. CCMP-AES B. MIMO C. WEP D. TKIP
115. A. Of the options listed, Wi-Fi Protected Access 3 (WPA3) will provide the maximum security for the wireless network, in part because it uses long encryption keys that change frequently. IPsec is a Network layer security standard that does not provide the security needed for IEEE 802.11 wireless networks. Transport Layer Security (TLS) is a protocol that encrypts data exchanged by web servers and clients at the Application layer; it does not provide adequate security for wireless LANs. Layer 2 Tunneling Protocol (L2TP) is a virtual private networking protocol; it does not provide adequate security for wireless networks.
115. Alice is setting up a wireless LAN in a friend's home, using an 802.11n wireless access point and three computers with 802.11n adapters. She has installed and successfully tested the devices on an open network, and now she is ready to add security. Which of the following protocols should Alice choose to provide maximum security for the wireless network? A. WPA3 B. IPsec C. TLS D. L2TP
117. C. Wi-Fi Protected Access 3 (WPA3) and W1-Fi Protected Access 2 (WPA2) are both wireless security protocols that control access to the network and provide encryption, using protocols like Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (ССМР) with Advanced Encryption Standard (AES). These protocols do not provide authentication services, however. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages. Its many variants provide support for the use of smart cards and other authentication factors, such as biometrics, in addition to traditional passwords.
117. Which of the following wireless security protocols can enable network users to authenticate using smart cards? A. WPA3 B. WPA2 С. EAP D. AES
123. D. An SSID that is not broadcast is not detectable by clients, so Ralph must type it in manually. Security protocols are also not detectable, so Ralph must configure the clients to use the same protocol he selected on the WAP.
123. Ralph has installed a new wireless access point (WAP) on his network and configured it to use WPA3 for security and an SSID that is not broadcast. Which of the following describes what Ralph must do to configure his wireless clients? A. Select the SSID from a list and allow the client to automatically detect the security protocol. B. Select the SSID from a list and then select WPA3 from the security protocol options provided. C. Type the SSID manually and allow the client to automatically detect the security protocol. D. Type the SSID manually and then select WPA3 from the security protocol options provided.
125. A, B. Wired Equivalent Privacy (WEP) was one of the first commercially available security protocols for wireless LANs, but it was soon found to be easily penetrated and was replaced by Wi-Fi Protected Access (WPA). WPA was also deprecated in 2015 due to multiple security weaknesses, leading to the introduction of Wi-Fi Protected Access 2 (WPA2) and then WPA3. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages.
125. Which of the following wireless LAN security protocols were rendered obsolete after they were found to be extremely easy to penetrate? (Choose all that apply.) A. WEP B. WPA C. WPA2 D. WPA3 E. EAP
126. C. WPA2 was introduced when the earlier version of Wi-Fi Protected Access (WPA) was determined to be increasingly vulnerable to attack. WPA used an encryption protocol called Temporal Key Integrity Protocol (TKIP). WPA2 replaced TKIP with an Advanced Encryption Standard (CCMP-AES) protocol. 127. B, C, D. Roaming from one AP to another without interruption requires that the APs all use the same SSID, the same security protocol, and the same passphrase. The APs will not function properly if they have the same IP address.
126. Which of the following encryption ciphers was replaced by CCMP-AES when the WPA2 wireless security protocol was introduced? A. EAP B. WEP С. TKIP D. CCMP
127. B, C, D. Roaming from one AP to another without interruption requires that the APs all use the same SSID, the same security protocol, and the same passphrase. The APs will not function properly if they have the same IP address.
127. Ralph is installing a wireless LAN that includes three access points (APs) to provide coverage for a large building. Which of the following must Ralph do to ensure that users are able to roam without interruption from one AP to another using their portable devices? (Choose all that apply.) A. Configure each AP with the same IP address. B. Configure each AP with the same security passphrase. C. Configure each AP to use the same security protocol. D. Configure each AP with the same SSID.
128. D. The 5G cellular network specification calls for maximum theoretical download speeds of 10 Gbps, although the actual speed realized will be less.
128. Which of the following is the maximum theoretical download speed for a 5G cellular network? A. 42 Mbps B. 150 Mbps C. 1 Gbps D. 10 Gbps E. 100 Gbps
129. A, B. 5G networks can operate on three frequency bands-low, medium, and high-with the high frequencies having the fastest speeds and reduced range. 4G devices cannot function on 5G networks.
129. Which of the following statements about 5G cellular networks are true? (Choose all that apply.) A. 5G networks can operate on three frequency bands. B. 5G networks with the highest speeds also have a more limited range. C. 4G devices can connect to 5G networks at reduced speeds. D. On a 5G network, the lower frequency bands provide the highest speeds.
130. D. IEEE 802.1X is a standard that defines a port-based network access control (PNAC) mechanism used for authentication on wireless and other networks. IEEE 802.11ac and 802.11n are standards defining the physical and Data link layer protocols for wireless networks. IEEE 802.11h is a standard that addresses the coexistence of wireless LANs with other services using the same frequencies. IEEE 802.3x is one of the standards for wired Ethernet networks.
130. Which of the following IEEE standards describes an implementation of port-based access control for wireless networks? A. 802.11ac B. 802.11h C. 802.11n D. 802.1X E. 802.3x
131. A, D. Disabling SSID broadcasting prevents a wireless network from appearing to clients. The clients must specify the SSID to which they want to connect. MAC address filtering is a form of access control list (ACL) that is maintained in the AP and contains the addresses of devices that are to be permitted to access the network. Both of these mechanisms make it more difficult for unauthorized devices to connect to the access point (AP). Kerberos is an authentication protocol used by Active Directory, and relocating the AP to a screened subnet will not resolve the problem.
131. Unauthorized users are connecting to Alice's wireless access point (WAP) and gaining access to the network. Which of the following are immediate steps Alice can take to prevent this from happening? (Choose all that apply.) A. Disable SSID broadcasting. B. Use Kerberos for authentication. C. Place the access point (AP) in a screened subnet. D. Implement MAC address filtering.
132. D. WAPs use the layer 2 MAC addresses coded into devices in their ACLs. Usernames, IP addresses, and device names can more easily be impersonated.
132. On a wireless access point (WAP) that uses an access control list (ACL) to specify which devices are permitted to connect to the network, which of the following is used to identify the authorized devices? A. Usernames B. IP addresses C. Device names D. MAC addresses
133. C. Allow listing is the process of using MAC filtering to specify the hardware addresses of devices that are permitted to access a wireless network. Deny listing, by contrast, is making a list of addresses that are denied access to the network.
133. Which of the following best describes the process of allow listing on a wireless network? A. Using an access control list (ACL) to specify the IP addresses that are permitted to access a wireless network B. Using port protection to specify the well-known port numbers of applications that users are permitted to run over a wireless network C. Using MAC filtering to create a list of devices that are permitted to access a wireless network D. Using an AAA server to create a list of users that are permitted to access a wireless network
134. A, B. The Control and Provisioning of Wireless Access Points (CAPWAP) protocol and the Lightweight Access Point Protocol (LWAPP) both enable wireless controllers to manage and control access points (APs). Lightweight Directory Access Protocol (LDAP) is used by directory services, and Point-to-Point Tunneling Protocol (PPTP) is used for virtual private networking.
134. Which of the following protocols can be used by wireless controllers to communicate with the access points (APs) on a wireless local area network (WLAN)? (Choose all that apply.) A. CAPWAP B. LWAPP C. LDAP D. PPTP
135. B. A captive portal is a web page displayed to a user attempting to access a public wireless network. The user typically must supply credentials, provide payment, or accept a user agreement before access is granted. A captive portal does not refer to a switch port, a secured entryway to a room, or a type of extortionate computer attack.
135. On a wireless network, which of the following best describes an example of a captive portal? A. A switch port used to connect to other switches B. A web page with which a user must interact before being granted access to a wireless network C. A series of two doors through which people must pass before they can enter a secured space D. A web page stating that the user's computer has been locked and will only be unlocked after payment of a fee
136. A. A web page that prompts users for payment, authentication, or acceptance of a EULA is a captive portal. Ransomware is a type of attack that extorts payment. Port security and root guards are methods for protecting access to switch ports.
136. A user attempting to connect to a Wi-Fi hotspot in a coffee shop is taken to a web page that requires her to accept an end-user license agreement (EULA) before access to the network is granted. Which of the following is the term for such an arrangement? A. Captive portal B. Ransomware C. Port security D. Root guard
137. D. A WAP is a device with a wireless transceiver that also connects to a standard cabled network. Wireless computers communicate with the WAP, which forwards their transmissions over the network cable. This is called an infrastructure topology. A star/hub and spoke or bus network requires the computers to be physically connected to the network cable, and an ad hoc topology is one in which wireless computers communicate directly with one another.
137. A wireless access point (WAP) enables computers equipped with wireless network interface adapters to function in which of the following topologies? A. Star/hub and spoke B. Ad hoc C. Bus D. Infrastructure
138. B. Band steering is a wireless network adapter mechanism that evaluates the available wireless signals and automatically chooses the best frequency for the current conditions. Channel bonding is a wireless networking technique that combines channels to increase bandwidth. Link aggregation is a term for technology in which the bandwidth of multiple network adapter connections is joined to speed up transmissions. Traffic shaping is a means of prioritizing network traffic by delaying packets at the Application layer.
138. A wireless network adapter that automatically chooses the best available network frequency, 2.4 GHz or 5 GHz, based on signal strength and distance from the access point, is performing which of the following functions? A. Channel bonding B. Band steering C. Link aggregation D. Traffic shaping
139. A. Lightweight wireless access points are designed to facilitate the expansion of the network by using a single wireless LAN controller (WLC) to store and deploy the configuration parameters for multiple lightweight access points configured to use the same SSID. Standalone and autonomous are terms for the same type of combined switch and access point commonly used today. There is no such thing as a traffic access point.
139. Which of the following types of wireless access point (WAP) requires the network to include a wireless LAN controller (WLC)? A. Lightweight access point B. Standalone access point C. Autonomous access point D. Traffic access point
84. A. The IEEE 802.11ac standard, like all of the wireless LAN standards in the 802.11 working group, uses CSMA/CA for MAC. The 802.1X standard defines an authentication mechanism and does not require a MAC mechanism. The IEEE 802.3 (Ethernet) standard uses Carrier-Sense Multiple Access with Collision Detection (CSMA/CD).
84. Which of the following IEEE standards calls for the use of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Media Access Control (MAC) mechanism? A. 802.11ac B. 802.1X C. 802.3 D. All of the above
85. C. An infrastructure topology uses a wireless access point (WAP) to connect wireless devices to a wired network. An ad hoc topology connects wireless devices to each other, without connecting to a wired network. A mesh topology calls for complete interconnection of wireless nodes, which need not provide access to wired resources. The star/hub and spoke and bus topologies do not support wireless devices.
85. Which of the following topologies enables wireless devices to access resources on a wired network? A. Ad hoc B. Star/hub and spoke C. Infrastructure D. Bus E. Mesh
90. D. By placing a unidirectional antenna against an outside wall, you can limit network access to users inside the structure. Unidirectional antennas provide greater signal strength than omnidirectional antennas, enabling their signals to penetrate more interior walls. It is possible to focus a unidirectional antenna to a wider or narrower signal pattern.
90. When designing a wireless LAN installation, which of the following are valid reasons to install a unidirectional antenna in an access point (AP), rather thanan omnidirectional one? (Choose all that apply.) A. The AP will be located against an outside wall. B. There are many interior walls between the AP and the most distant workstation. C. A unidirectional antenna can be focused to a specific signal pattern width. D. All of the above.
91. B. The IEEE 802.11n and 802.11ac standards support a transmission technique called multiple input, multiple output (MIMO), which combines the bandwidth of multiple data streams to achieve greater throughput. IEEE 802.11n and 802.11ac do use the 5 GHz band, but this in itself does not yield greater transmission speeds. The specified standards do not call for the use of DSSS modulation, nor do they sacrifice range for speed. In fact, 802.11n and 802.11ac networks can achieve greater ranges than the previous technologies.
91. How do wireless networking devices conforming to the IEEE 802.11n and 802.11ac standards achieve transmission speeds greater than 72.2 Mbps? A. By using direct-sequence spread spectrum (DSSS) modulation B. By using multiple antennas to transmit several data streams simultaneously C. By using frequencies in the 5 GHz band D. By sacrificing transmission range for speed
92. A, C, D. The 5 GHz frequency has 23 channels available in the United States, while the 2.4 GHz frequency has only 11. Many household devices, such as cordless telephones, use the 2.4 GHz frequency band, but relatively few devices use the 5 GHz band. Higher frequencies typically 2.4 GHz, because it is less able to penetrate barriers.
92. Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a wireless LAN? (Choose all that apply.) A. The 5 GHz frequency has more channels than the 2.4 GHz frequency. B. The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency. C. The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency. D. The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
93. A, C. Upgrading the devices to 802.11n will enable them to use the 5 GHz band and evade the traffic generated by the surrounding networks. Configuring the devices to use the 5 GHz band will provide many more channels to choose from and will avoid the interference from the surrounding 2.4 GHz networks. The type of encryption that a wireless network uses has no bearing on the ability of the devices to avoid the interference generated by surrounding networks. Suppressing SSID broadcasts will not help the devices to connect to the network. Upgrading the firmware on the devices is not likely to have any effect on the connection problems when they are the result of interference from other networks. to transmit multiple frames to different users simultaneously, using multiple antennas. Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) is a Media Access Control (MAC) mechanism used by all 802.11 networks.
93. Alice is attempting to deploy an IEEE 802.11b/g wireless LAN on the fifth floor of a 10-story office building that is surrounded on all sides by other office buildings, all of which seem to be running many wireless LANs. Scanning the 2.4 GHz band, she sees literally dozens of networks, spread across all of the available channels. As a result, her wireless devices have trouble connecting to their access point (AP), and when they do, they achieve only low speeds. Which of the following tasks should Alice perform to enable the wireless clients to connect to the network more reliably? (Choose two.) A. Upgrade all of the wireless network devices to IEEE 802.11n. B. Configure all of the network devices to use WPA2 encryption with AES. C. Configure the wireless devices to use the 5 GHz band. D. Configure the AP to suppress service set identifier (SSID) broadcasts. E. Upgrade all of the network devices to the latest firmware.
94. D. The multiple input, multiple output (MIMO) technology introduced in the IEEE 802.11n standard enables wireless devices to transmit and receive signals using multiple antennas simultaneously. The multiuser MIMO (MU-MIMO) variant defined in the 802.11ac standard advances this technique by enabling wireless devices to transmit multiple frames to different users simultaneously, using multiple antennas. Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) is a Media Access Control (MAC) mechanism used by all 802.11 networks. Channel bonding is a wireless networking technique that combines channels to increase bandwidth.
94. What is the term for the technology implemented in the IEEE 802.11ac standard that enables a wireless device to transmit multiple frames to multiple clients simultaneously? A. MIMO B. Channel bonding C. CSMA/CA D. MU-MIMO
95. A. Wireless LAN regulations call for 22 MHz channels in the 2.4 GHz band that are spaced 5 MHz apart, which means that they overlap. Channels 1, 6, and 11 are the only three channels that are distant enough from each other not to overlap. Therefore, they do not interfere with each other. Channels 1, 6, and 11 do not differ from the other channels in their bandwidth or their transmission range. Each wireless device can be set to use only one channel. Therefore, channels 1, 6, and 11 cannot all be the default setting.
95. On an IEEE 802.11b/g/n wireless network running at 2.4 GHz with multiple access points (APs), the traditional best practice is to use channels 1, 6, and 11, with no two adjacent APs configured to use the same channel. Which of the following is the real reason why this is a good plan? A. Channels 1, 6, and 11 are the only channels with frequencies that do not overlap. B. Channels 1, 6, and 11 have more bandwidth than the other channels. C. Channels 1, 6, and 11 have greater ranges than the other channels. D. Channels 1, 6, and 11 are the default settings on most wireless devices.
96. A. Multiple input, multiple output (MIMO) calls for the use of two or more antennas, enabling wireless devices to effectively multiplex signals, thereby increasing their transmission speeds. Time-division multiple access (TDMA) is a communication technique that splits a frequency into multiple time slots, enabling it to carry multiple data streams. A personal area network (PAN) provides communication among devices associated with a single person, such as smartphones. Ant+ is a wireless protocol that is typically used to monitor data gathered by sensors, such as those in cardiac pacemakers.
96. Which of the following terms defines a wireless LAN transmission technique in which devices use multiple antennas to increase transmission speeds? A. MIMO B. TDMA C. PAN D. Ant+
