C12 Wireless Networking (Lab & Review ?s)
What is the possible bandwidth of 802.11ac?
1 Gbps
What is the maximum data rate of IEEE 802.11b?
11 Mbps
What is the frequency range of IEEE 802.11b?
2.4 GHz
What is the frequency range of IEEE 802.11g?
2.4 GHz
What is the frequency range of IEEE 802.11a?
5 GHz
What is the maximum data rate of IEEE 802.11a?
54 Mbps
What is the maximum data rate of IEEE 802.11g?
54 Mbps
What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode? (Select two.) A. An access point B. A router C. A hub D. A wireless bridge
A and D. A wireless access point or wireless bridge enables you to connect wireless PCs to a wired network segment.
What is MAC filtering?
A feature that enables the admin to limit the access of the wireless network based on the physical, hard-wired addresses of the wireless adapter MAC filtering is a security method based on access control. In this, each address is assigned a 48-bit address which is used to determine whether we can access a network or not. It helps in listing a set of allowed devices that you need on your Wi-Fi and the list of denied devices that you don't want on your Wi-Fi.
MIMO (multiple input-multiple output)
A technology that makes 802.11n speeds possible, using multiple antennas to send and receive digital data in simultaneous radio streams that increases performance.
Which of the following is known as a basic service set in infrastructure mode? A. A WAP B. A WPA C. A RADIUS server D. A TKIP
A. A single wireless access point (WAP) is a basic service set. (DON'T forget we are talking about an BSSID or ESSID) Wi-Fi Protected Access (WPA) is a data encryption scheme. A RADIUS server provides authentication via a username and password. Temporal Key Integrity Protocol (TKIP) is used by the WPA encryption scheme to encrypt the data.
When setting up WPA2-PSK on his wireless network, Edsel has the option to choose TKIP or AES. Which should he implement? A. Only AES B. Only TKIP C. Both AES and TKIP D. Neither. He should implement RADIUS.
A. Although WPA2 supports both the Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES), TKIP is deprecated and AES is far more secure.
What is the progressive loss of radio signal passing through different media called? A. Attenuation B. EAP C. RFI D. SNR
A. Attenuation is the term describing the progressive loss of radio signal passing through different media.
What does extended service set (ESS) ID mean? A. That you have more than one access point, and they are in the same SSID connected by a distribution system B. That you have more than one access point, and they are in separate SSIDs connected by a distribution point C. That you have multiple address points, but they are placed physically in different buildings D. That you have multiple access points, but one is a repeater access point
A. Extended service set ID means that you have more than one access point, they are all set to the same SSID, and they are all connected together in the same VLAN or distribution system so users can roam.
Which is the highest encryption that WPA2 can use? A. AES-CCMP B. PPK via IV C. PSK D. TKIP/MIC
A. The IEEE 802.11i uses AES-CCMP (aka Counter Mode CBC-MAC Protocol), which replaced Wired Equivalent Privacy (WEP) with a specific mode of the Advanced Encryption Standard (AES) known as the Counter Mode Cipher Block Chaining-Message Authentication Code (CBC-MAC) protocol. This allows AES-Counter Mode CBC-MAC Protocol (AES-CCMP) to provide both data confidentiality (encryption) and data integrity.
Which devices can interfere with the operation of a wireless network because they operate on similar frequencies? A. Copier B. Microwave oven C. Toaster D. Cordless phone E. IP phone F. AM radio
B, D. If you are running 802.11b/g frequency (2.4 GHz), which most networks are, then you can receive interference from microwave ovens and cordless phones.
802.11n uses MIMO. How does this optimize throughput to gain the high-speed advantage that 802.11n provides? A. By specifying an acknowledgement of each and every frame, 802.11n provides better overhead B. Several frames are sent by several antennas over several paths and are then recombined by another set of antennas C. One frame at a time is sent, but father than in 802.11g because multiple antennas are used (multiple-in, multiple-out) D. MIMO packs smaller packets into a single unit, which improves throughput
B. 80211n MIMO sends multiple frames by several antennas over several paths. The frames are then recombined by another set of antennas to optimize throughput and multipath resistance. This is called spatial multiplexing.
What do you call a wireless network in infrastructure mode with more than one access point? A. BSS B. EBSS C. WBSS D. ExNet
B. A wireless network in infrastructure mode with more than one access point is called an EBSS, or extended basic service set.
You connect a new host to your company's wireless network. The host is set to receive a DHCP address and the WPA2 key is entered correctly. However, the host cannot connect to the network. What can the problem be? A. DNS is not configured on the host B. MAC filtering is enabled on the AP C. The network has run out of wireless connections D. The host is enabled on run 802.11b and 802.11g
B. If everything is correctly configured on the host, then MAC filtering would stop the host from connecting to the AP. If you try to connect and can't, check the AP's settings.
Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another? A. Using adapters and access points manufactured by the same company B. Overlapping the wireless cell coverage by at least 10 percent C. Configuring all access points to use the same channel D. Utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding AP's
B. If you are running an extended service set (meaning more than one AP with the same SSID), you need to overlap the cell coverage by 10 percent or more so client will not drop out while roaming.
Which technology enables use of a WAP without directly connecting the WAP to an AC power outlet? A. AES B. PoE C. Powered Wi-Fi D. TKIP
B. Power over Ethernet (PoE) enables a wireless access point (WAP) to use electricity from a PoE switch rather than connect to an AC power outlet directly.
How many non-overlapping channels are available with 802.11a? A. 3 B. 12 C. 23 D. 40
B. The IEEE 802.11a standard provides up to 12 non-overlapping channels, or up to 23 if you add the 802.11h standard.
What is the maximum data rate for the 802.11b standard? A. 6 Mbps B. 11 Mbps C. 22 Mbps D. 54 Mbps
B. The IEEE 802.11b standard provides a maximum data rate of up to 11 Mbps.
Which spread-spectrum technology does the 802.11b standard define for operation? A. IR B. DSSS C. FHSS D. DSSS and FHSS E. IR, FHSS, and DSSS
B. The IEEE 802.11b standard uses Direct Sequence Spread Spectrum (DSSS). If you are running 802.11g, it uses Orthogonal Frequency Division Multiplexing (OFDM).
You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The throughput is low. What can you do to improve the link? A. Replace the bridges with APs B. Replace the Omni directional antennas with Yagis C. Configure 802.11a on the links D. Install amps to boost the signal
B. You need to use directional antennas, like a Yagi, to get the best signal between antennas. A Yagi antenna or a Yagi-Uda antenna, is a directional antenna that radiates signals in one main direction. From a general stability perspective, the omni-directional antenna might be a better choice. When the ability to receive a signal where there is virtually no signal, or an area with high interference, then a directional antenna (yagi) can be considered.
Throughput, Latency, and Bandwidth
Bandwidth is the name given to the number of packets that can be transferred throughout the network. Latency indicates how long it takes for packets to reach their destination. Throughput is the term given to the number of packets that are processed within a specific period of time.
How wide are the channels used in 802.11n in order to gain the large bandwidth that the specification provides? A. 22 MHz B. 20 MHz C. 40 MHz D. 100 MHz
C. 802.11n uses two 20 MHz wide channels to create a 40 MHz wide channel, which provides over 100 Mbps wireless.
What type of server supports EAP-encrypted passwords in accordance with the 802.1X standard? A. WAP server B. WEP server C. RADIUS server D. NAS server
C. A RADIUS server provides authentication through a username and password encrypted with Extensible Authentication Protocol (EAP).
Which of the following uses a certificate on both the server and the client to provide the best wireless security with 802.1X (but is hardest to implement)? A. AES B. TTLS C. TLS D. TKIP
C. EAP (extensible Authentication Protocol)- TLS provides really good wireless security, but it's hard to implement because you need to install a certificate on your server and also on all your clients. TTLS only uses a server-side certification.
Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled? A. Set the SSID value in the client software to public B. Configure open authentication on the AP and the client C. Set the SSID value on the client to the SSID configured on the AP D. Configure MAC address filtering to permit the client to connect to the AP
C. If you disable SSID broadcasting, which you should, then you must configure the SSID name on the clients that need to connect to the AP.
You need to install wireless on multiple floors of a large building and maintenance area. What is your first concern before installing the APs? A. Authentication B. Encryption C. Channel overlap D. AP configuration
C. If you have a large area to cover with wireless, you need to be concerned with channel overlap.
You need to install wireless internet access in an open warehouse environment. After installing the equipment, the technician notices varying signal strength throughout the warehouse. How do you make sure there is full coverage? A. Turn of broadcast key rotation B. Change the encryption method used on all the AP's C. Change the antenna placement D. Use channel bonding E. Use channel shaping
C. It is imperative that a good site survey is completed before you install your wireless network. Trying various types of antennas and their placement is the key to covering the whole wireless area.
What is the frequency range of the IEEE 802.11g standard? A. 2.4 Gbps B. 5 Gbps C. 2.4 GHz D. 5 GHz
C. The IEEE 802.11b and 802.11g both run in the 2.4 GHz RF range.
Which wireless standard allows you to channel-bond to increase bandwidth and use both the 2.4 GHz and 5 GHz frequencies? A. 802.11b B. 802.11g C. 802.11a D. 802.11n E. 802.11ac
D. 802.11n uses channel bonding of both the 2.4 GHz range and the 5 GHz range to get increased bandwidth of over 100 Mbps.
Which of the following is considered a PAN? A. AES B. BSS C. SSID D. Bluetooth
D. Bluetooth works wirelessly to connect our phones, keyboards, and so on in small areas, also known as personal area networks (PANs).
What is the maximum data rate for the 802.11a standard? A. 6 Mbps B. 11 Mbps C. 22 Mbps D. 54 Mbps
D. The IEEE 802.11a standard provides a maximum data rate of up to 54 Mbps.
What feature enabled 802.11n networks to minimize dead spots? A. Channel bonding B. FIFO C. MIMO D. Transit beamforming
D. Transit beamforming enabled an 802.11n WAP to minimize dead spots by using multiple antennas. Transmit Beam Forming is an optional component to the as yet unratified 802.11n standard that can improve signal strength for the receiver by up to 400%, according to experts at Wi-Fi chipmaker Atheros. To do so, the technology uses an array of transmit antennas with the same signal, except that the magnitude and phase are adjusted at each transmitter to generate a focused beam. If information about the location of the target receiver is known, the transmitter points its focused beam in that direction, which will improve range because all of the radiated waves can be focused in the one direction of interest.
What is one reason that WPA encryption is preferred over WEP? A. A WPA key is longer and requires more special characters than the WEP key B. The access point and the client are manually configured with different WPA key values C. WPA key values remain the same until the client configuration is changed D. The values of WPA keys can change dynamically while the system is used
D. WPA is cool because it is easy to configure and works great. Type in a passphrase (assuming you're using a pre-shared key) and you're done. Plus, you have great security because the keys change dynamically. Avoid WEP
Which of the following is the most secure method of wireless encryption? A. WEP B. WPA C. WPA2 D. WPA3
D. WPA3 offers the highest security here. WPA2 is more secure than WPA or WEP because it uses CCMP-AES, a 128-bit cipher that is harder to crack than the 128-bit TKIP wrapper used by WPA. It would rank second here.
Latency
Latency is measured in milliseconds. In the event that you want to measure the amount of data traveling from one point to another, you would use network throughput. Latency refers to the amount of time, including delays, for data to travel from one given point to another. Throughput is measured in bits per second (bps) in the form of megabits per second (Mbps) or gigabits per second (Gbps).
Throughput VS Bandwidth
Like bandwidth, throughput is the measure of the transfer of bits across the media over a given period of time. However, due to a number of factors, throughput does not usually match the specified bandwidth. Many factors influence throughput including: -The amount of data being sent and received over the connection -The types of data being transmitted -The latency created by the number of network devices encountered between source and destination
SSID
Service Set Identifier. Identifies the name of a wireless network (like a network ID). Disabling SSID broadcast can hide the network from casual users but an attacker can easily discover it with a wireless sniffer. It's recommended to change the SSID from the default name.
Which IEEE committee has been sanctioned by WPA and is called WPA2?
The IEEE 802.11i standard has been sanctioned by WPA and is called WPA version 2.
PPP vs PPPoE
The Point-to-Point Protocol over Ethernet (or PPPoE) enhances the PPP connection and allows multiple users to use it. Let's have a look at it in more detail. To better understand PPPoE, we must also clarify what PPP is. PPP is the communication protocol between two routers without any networking in between. It provides authentication, transmission, and data compression. It's an old-school protocol that was popular in the '80s and '90s, mainly used for various types of physical networks. PPoE is an advanced version of PPP that enables PPP functionality to work for multiple users simultaneously. https://nordvpn.com/blog/pppoe/#:~:text=PPPoE%20enables%20one%2Dto%2Dmany,that%20already%20have%20PPPoE%20configuration.
Why would we use WPA instead of basic WEP?
The values of WPA can change dynamically while the system is being used. dynamic key encryption
The IEEE 802.11b/g basic standard has how many non-overlapping channels?
Three (1, 6, 11)