CIS 321 Exam 2 Multiple Choice
In Wi-Fi, 2.4 GHz and 5 GHz refer _______.
....
What is the strongest security protocol for 802.11 today?
802.11i
What initial authentication mode does 802.11i use?
802.1X , PSK
The 802.11 standard has two mechanisms for media access control. One of the two, _________ is reliable, mandatory, and more efficient and faster.
CSMA/CA+ACK
A VPN provides __________.
End to end security
________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time.
Media access control
___________ have SSIDs.
Wireless access points
Wide bandwidth channels that permit high speed data transmission are known as __________ channels.
broadband
A security might use SNMP Get commands to ________ and SNMP Set commands to _______.
collect information to look for a rogue access point, change an access point's power
If Wi-Fi supported the basic printing profile, ________.
documents could be printed without downloading drivers
The most serious problem with wireless transmission in WLANs is ___________.
multipath interference
Wi-Fi direct ________ uses access points.
never
Wi-Fi normally uses a(n) ______.
omnidirectional antenna
Bluetooth uses __________ operation.
one to one
802.11i PSK initial authentication mode was created for ________ and 802.11i 802.1X initial authentication mode was created for ________.
residences with a single access point, corporations with multiple access points
A ________ is an unauthorized internal access point.
rogue
In general, the fewer the channels, __________.
the greater the likelihood of interference between access points
Which of the following is a risk in 802.11i PSK mode?
unauthorized sharing of the preshared key, a weak passphrase may be selected
In 802.1x initial authentication mode, the authenticator is the ________. A. wireless client
wireless access point
Which of the following is an ad hoc networking protocol?
zigbee and z-wave
_______ is among the most widely used 802.11 transmission standards used today and dominates Wi-Fi sales.
802.11ac
Spread spectrum transmission is used in WLANs because _________ and ___________.
It is required by regulators, is a reliable transmission
A group of devices on a desk that communicate wirelessly is called a ________.
PAN
Wireless access points typically link wireless clients to ________.
servers on the wired networks
What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?
shadow zones(dead zones)
WLANs normally use ____________ because they allow greater flexibility.
unlicensed bands
When two devices communicate using NFC, how close must they be?
a few inches
What propagation problem is especially bad in moist air?
absorptive attenuation
In 802.11i, protection, confidentiality, and message integrity are provided between the client and the ________.
access point
Site surveys should be done ___________.
after the initial provisional placement of access points, periodically afterwards
Which of the following is usually set up by a hacker outside the building?
an evil twin access point
In Bluetooth LE, ________ provide information.
beacons
Wireless radio transmission speed is usually measured in terms of ______ which is measured in terms of ______.
frequency, hertz
MIMO _____________.
increases transmission speed , increases transmission distance
IoT transmissions usually involve ________.
low transmission distances
Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band.
more bandwidth
The 60 GHz unlicensed service band offers ________ compared to lower-frequency service bands.
more speed per channel
What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?
5 MHz
Wi-Fi Standards come from the ________ Working Group.
802.11