(Chapter 4) Wireless Networking
A __________ is an ad hoc network of up to eight Bluetooth devices. piconet
piconet
Does a wireless network require a cable connection? Yes No
No
The maximum data rate of 802.11b, 802.11a, 802.11g, and 802.11n are _____ Mbps, _____ Mbps, _____ Mbps, and above _____ Mbps respectively.
11 54 54 200
Bluetooth operates in the _____ GHz ISM band 2.4 GHz
2.4 GHz
Which of the following 802.11 technologies use the 2.5 Ghz spectrum? (Choose all that apply) A. 802.11g B. 802.11n C. 802.11a D. 802.11b
A. 802.11g B. 802.11n D. 802.11b
Wireless network associations are characterized by which of the following (Choose all that apply) A. A wireless connection has been obtained B. All of these are characteristics C. Provides the client MAC address D. Allows unauthorized access
A. A wireless connection has been obtained C. Provides the client MAC address
Site surveys obtain the following information. (Choose all that apply) A. Connection points to the main network B. Supported bandwidth C. Electrical power D. RF coverage
A. Connection points to the main network B. Supported bandwidth C. Electrical power D. RF coverage
Which of the following is an advantage for using wireless networking? (Choose all that apply) A. Flexible B. User mobility C. More expensive D. Secure
A. Flexible B. User mobility
RDID technology has many uses including __________. (Choose all that apply) A. Full speed tollbooths B. Border crossings C. Tracking shipments D. Wired devices
A. Full speed tollbooths B. Border crossings C. Tracking shipments
The range of WiMAX networks is __________. A. None of them B. 31 km C. 31 feet D. 31 meters
A. None of them
The access point looks at the __________ to determine if the data packet is intended for its network. A. SSID B. routing table C. wireless adapter D. authentication
A. SSID
Which of the following are included in guidelines for wireless security? (Choose 2) A. Turn on access point security features B. Use firewalls C. Use 3rd party encryption software on the access point end only D. Use any technology in the 2.4 GHz band
A. Turn on access point security features B. Use firewalls
802.11 technologies never use which of the following? A. Visible light B. infrared C. FHSS D. DSSS
A. Visible light
The __________ refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source.
Backscatter
__________ refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source.
Backsctter
802.11u standard increases security by requiring user authentication. TRUE FALSE
FALSE
Bluetooth operates in the 5 GHz band. FALSE TRUE
FALSE
CSMA/CD is used in wireless networks to reduce collisions. FALSE TRUE
FALSE
MIMO uses wave division multiplexing FALSE TRUE
FALSE
Site surveys are only performed inside buildings FALSE TRUE
FALSE
Turning off the SSID transmission makes it impossible to discover the SSID. TRUE FALSE
FALSE
With Cisco LEAP, the user must provide the correct SSID. TRUE FALSE
FALSE
The FHSS transmitting and receiving units must know the __________ to communicate
Hopping sequence, pseudorandom seque
A piconet is an ad hoc network made up of up to 8 bluetooth devices. TRUE FALSE
TRUE
Access points provides 802.11 MAC layer functions TRUE FALSE
TRUE
Extended Service Set allows a wider range of wireless signals using roaming. FALSE TRUE
TRUE
Many WLANs are placed on a network without turning on all available security features. FALSE TRUE
TRUE
One of the parameters that define an RDID system is frequency of operation. TRUE FALSE
TRUE
RADIUS is sometimes used to provide authentication TRUE FALSE
TRUE