Chapter 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following wireless technologies does not use the 2.4 GHz band? Z-Wave Bluetooth ZigBee Wi-Fi

Z-Wave

Which one of the following wireless transmission types requires a clear LOS to function? Bluetooth NFC IR Wi-Fi

IR

What size bonded channels do 802.11ac and 802.11ax support?

20-, 40-, 80-, and 160-MHz channels

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? 802.11g 802.11ac 802.11b 802.11ax

802.11ax

Which protocol replaced TKIP for WPA2? CCMP WEP RADIUS RC4

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions? CSMA/CD EAPoL CSMA/CA SSID

CSMA/CA

Which 802.11X authentication protocol is often used by WLANs?

EAPoL Extensible Authentication Protocol (EAP) over LAN

Which function of WPA/WPA2 security ensures data cannot be read in transit? Message integrity Authentication Encryption Key distribution

Encryption

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? Guest network Captive portal Evil twin Brute force attack

Evil twin

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?

Guest network or wireless client isolation

What feature of a site survey maps the Wi-Fi signals in your location?

Heat map

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? Layer 4 Layer 3 Layer 2 Layer 1

Layer 3

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? RSSI Channel EIRP Band

RSSI Received Signal Strength Indicator

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? Rogue AP War driving Evil twin Hidden node

Rogue AP

Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _____ due to the higher proportion of noise.

SNR "Signal to Noise Ratio"

When a wireless signal encounters a large obstacle with wide, smooth surfaces, what happens to the signal?

The signal reflects, or bounces back, toward its source.

What is the primary difference between how WPA2-Personal and WPA2-Enterprise are implemented on a network?

WPA2-Enterprise requires a RADIUS authentication server.

Why do wireless networks generally experience a greater reduction in throughput compared with wired networks?

Wireless networks experience a high number of collisions and require greater overhead on each transmission, resulting in a significant reduction in throughput compared to wired networks.

To exchange information, two antennas must be tuned to the same _____.

frequency or channel

What addresses does an 802.11 frame contain that an 802.3 frame does not?

Transmitter address and Receiver address


Ensembles d'études connexes

La Tour Eiffel Lecture Vocabulaire

View Set