Chapter 20 | Wireless Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

24. The maximum distance between infrared devices is ______________.

1 meter

21. Products that adhere to the 802.11b standard provide a maximum of ______________ channels in the 2.4 GHz band.

14

19. The 802.11g standard is backward-compatible with ______________.

802.11b

20. Like 802.11g, ______________ WAPs can run in the 2.4-GHz ISM band, supporting earlier, slower 802.11b/g devices.

802.11n

16. What is the theoretical maximum range of the 802.11a wireless networking standard? A. 150 feet B. 200 feet C. 250 feet D. 300 feet

A. 150 feet

18. At what frequency range do the 802.11b- and 802.11g-based wireless technologies operate? A. 2.4 GHz B. 3.4 GHz C. 4.4 GHz D. 5.4 GHz

A. 2.4 GHz

21. What frequencies does 802.11n use? A. 2.4 and 5 GHz B. 11 and 54 MHz C. 5 and 24 GHz D. 2.4 and 11 MHz

A. 2.4 and 5 GHz

4. What wireless network mode can quickly be used to share files and printers without a WAP? A. Ad hoc B. Infrastructure C. Multiple access D. WAN

A. Ad hoc

28. What WAP settings should be adjusted in an environment with overlapping Wi-Fi signals? A. Channel and frequency B. SSID and MAC filtering C. Default user name and password D. Encryption protocols

A. Channel and frequency

12. Which standard or protocol provides a security improvement that WPA addresses over WEP? A. EAP B. IrDA C. SWAP D. TCP/IP

A. EAP

9. Most WAPs support filtering, in which data packets that do not contain the appropriate address are rejected. What kind of address is filtered? A. MAC B. SSID C. WEP D. WPA

A. MAC

20. What 802.11n feature increases its range and speed? A. MIMO B. CSMA/CA C. SSID D. WPA-PSK

A. MIMO

24. What type of wireless network is very small and designed for "quick-and-dirty" jobs? A. PAN B. WAN C. LAN D. MAN

A. PAN

32. What process needs to be undertaken to enable Bluetooth devices to create a secure connection? A. Pairing B. Duplicating C. Searching D. Finding

A. Pairing

2. Which feature allows you to plug a single Ethernet cable into the WAP to provide both power and a network connection? A. PoE B. SID C. ESSI D. PoW

A. PoE

11. WPA2 uses the ______________ to provide a secure wireless environment.

Advanced Encryption Standard (AES)

31. What is the gain from a typical WAP? A. 1 dB B. 2 dB C. 10 dB D. 12 dB

B. 2 dB

17. At what frequency range does the 802.11a-based wireless technology operate? A. 7 GHz B. 5 GHz C. 3 GHz D. 1 GHz

B. 5 GHz

15. Which wireless networking standard supports data throughput of up to 11 Mbps? A. 802.11a B. 802.11b C. 802.11c D. 802.11g

B. 802.11b

3. What method do wireless networks use to determine if other nodes are currently broadcasting? A. CSMA/CD B. CSMA/CA C. Dipole antennae D. MIMO

B. CSMA/CA

7. What method enables you to limit access to your wireless network based on the physical, hard-wired address of the units' wireless NIC? A. OFDM B. MAC address filtering C. SSID broadcasting D. NTFS Permissions

B. MAC address filtering

8. What is another name for the Service Set Identifier parameter? A. Network address B. Network name C. Network path D. Network protocol

B. Network name

1. What centrally connects wireless network nodes in the same way that a hub connects wired Ethernet PCs? A. EAP B. WAP C. WEP D. WPA

B. WAP

34. What should you open up to troubleshoot a suspected hardware problem? A. BIOS B. Windows Device Manager C. Windows update D. Task Manager

B. Windows Device Manager

35. What should you check first when troubleshooting wireless connectivity issues? A. Wireless configuration utility B. Wireless NIC link light C. Encryption settings D. Dipole gain

B. Wireless NIC link light

27. ______________ is designed to create small wireless networks preconfigured to do very specific jobs.

Bluetooth

25. What is the maximum distance of a Class 3 Bluetooth device? A. 100 meters B. 10 meters C. 1 meter D. 5 meters

C. 1 meter

11. How many bits does WEP encryption use to scramble data packets? A. 20 B. 30 C. 40 D. 50

C. 40

19. What is the speed at which the 802.11g wireless technology transfers data? A. 11 Mbps B. 20 Mbps C. 54 Mbps D. 64 Mbps

C. 54 Mbps

10. Which standard or protocol represents a security improvement in WPA2 over WEP and WPA? A. EAP B. IrDA C. AES D. TCP/IP

C. AES

30. What is the standard straight-wire omnidirectional wireless antenna called? A. Omnipole B. Unipole C. Dipole D. Bipole

C. Dipole

6. Where is the location for an omni-directional antenna in your home or office? A. On the roof B. Adjacent to the outside wall C. Near the center D. In a basement

C. Near the center

29. What is the first step in choosing an optimal location for an access point? A. Software upgrades B. Market research C. Site survey D. Interference control

C. Site survey

27. What WPA/WPA2 encryption version uses a RADIUS server for secure authentication? A. WPA/WPA2-PSK B. SSIDv3 C. WPA/WPA2-Enterprise D. SSIDv4

C. WPA/WPA2-Enterprise

14. Which standard has a security flaw that allows a hacker to guess an eight-digit code? A. WPA B. WEP C. WPS D. WPA2

C. WPS

3. Wireless devices operate using the ______________ networking scheme.

CSMA/CA

22. What is the maximum capacity for data transfer between infrared devices? A. 1 Mbps B. 2 Mbps C. 3 Mbps D. 4 Mbps

D. 4 Mbps

23. What wireless technology is often used to connect headsets to smartphones? A. WPA-Enterprise B. WPA-PSK C. AES D. Bluetooth

D. Bluetooth

26. What enables you to connect to the Internet through a network-aware smartphone, tablet, or other mobile device? A. 802.11b B. 802.11n C. MAC filtering D. Cellular wireless network

D. Cellular wireless network

5. What is a wireless service area that has been extended by adding more WAPs? A. EWAP B. SID C. BSS D. EBSS

D. EBSS

33. Where should you look for firmware updates on older WAPs? A. CMOS B. Device Manager C. Windows update D. Manufacturer's Web site

D. Manufacturer's Web site

13. Which protocol does WPA use to provide a new encryption key for every sent packet? A. SSH B. WEP C. SSL D. TKIP

D. TKIP

A service area that is extended by adding WAPs is called a(n) _____________.

Extended Basic Service Set (EBSS)

4. Two or more wireless nodes communicating in ad hoc mode form what's called a(n) ______________.

Independent Basic Service Set (IBSS)

22. Communication through infrared devices is implemented via the ______________ protocol.

IrDA (Infrared Data Association)

8. ______________ is a handy way of creating a type of "accepted users" list to limit access to your wireless network.

MAC address filtering

28. The IEEE organization has made first-generation Bluetooth the basis for its 802.15 standard for wireless ______________.

Personal Area Networks (PANs)

2. With ______________, you only need to plug a single Ethernet cable into the WAP to provide both power and a network connection.

Power over Ethernet (PoE)

7. Changing the default ______________ for a WAP is the first step in setting up a new wireless network.

Service Set Identifier (SSID)

13. WPA uses the ______________, which provides a new encryption key for every sent packet.

Temporal Key Integrity Protocol (TKIP)

14. The developers of Wi-Fi created ______________ a standard included on most WAPs and clients to make it easier for end users to configure secure connections.

Wi-Fi Protected Setup (WPS)

23. Infrared is designed to make a point-to-point connection between two devices only in ______________ mode.

ad hoc

9. To protect wireless systems, tell the WAP not to _______________ the SSID.

broadcast

29. A(n) ______________ enables you to connect to the Internet through a network-aware smartphone, tablet, or other mobile device.

cellular wireless network

31. Devices such as ______________ and ______________ also use the 2.4-GHz frequency and can cause a great deal of interference.

cordless phones, microwaves

33. The standard straight-wire antennas that provide most omni-directional function are called ______________ antennas.

dipole

32. With ______________ 802.11n WAPs, you can choose which band to put 802.11n traffic on, either 2.4 GHz or 5 GHz.

dual-band

15. WPS has a security flaw that allows a hacker to repeatedly guess the ______________ -digit numeric code.

eight

34. An antenna strengthens and focuses the radio frequency (RF) output from a WAP. The ratio of increase called ______________ is measured in decibels (dB).

gain

26. A(n) ______________ enables Ethernet network communication using IrDA.

infrared access point

5. Wireless networks running in ______________ mode use one or more wireless access points to connect the wireless network nodes to a wired network segment.

infrastructure

10. When adjusting the radio power levels of your wireless antenna, decrease the radio power until you can get reception at the furthest point ______________ the target network space.

inside

25. IrDA links are direct ______________ and are susceptible to interference.

line-of-sight

30. Communication will fail if the encryption level, key, and ______________ do not match on the wireless client node.

passphrase

35. Antennas and the signals that they transmit have an electromagnetic property called ______________.

polarization

18. Today's wireless world is dominated by ______________ technologies, in particular the 802.11 (Wi-Fi) standards.

radio frequency (RF)

17. You can install multiple WAPs to permit "______________" between one WAP's coverage area and another's.

roaming

16. The IEEE 802.11 wireless Ethernet standard defines methods by which devices may communicate using ______________ radio waves.

spread-spectrum

1. Wireless access points can act as ______________ and Internet routers.

switches


Ensembles d'études connexes

Practice Test: Module 01 Introduction to Security

View Set

block 09 Landing Gear Systems Quiz 1

View Set

HUMAN BIOLOGY: THE SPECIAL SENSES (CH. 15)

View Set

HA 477 Gambling and Casino Management

View Set

Week 2 ICU Cardiac Study Test 12.1.20

View Set

Unit 5 Macroeconomics Sample Questions

View Set

Overview of Genetics and Genomics

View Set