CNT4514 Chapter 1- 18 : Quiz2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____ of retailers will provide guest Wi-Fi by 2017. 47% 75% 56% 25%

56%

Approximately 75% of 2.4 GHz access points are set to which channel by default?

6

When analyzing feasibility, you should perform a feasibility study to evaluate the projects potential for success.

TRUE

Which of the following are advantages of autonomous access point architectures? (select ALL that apply) Security issues will not be an issue Installations may be time-consuming Less hardware to install Can be less expensive for smaller installations

1- Can be less expensive for smaller Installstions. 2- Less Hardware to install.

This specification is used to create personal area networks (PANs) built from low-power digital radios. 802.15.4 Zigbee Bluetooth 802.14 PAN Net 802.11.ac USBnet

802.15.4 Zigbee

In 802.2, the LLC provides which of the following services (select 3):

- Connection-oriented service - Acknowledged connectionless service - Unacknowledged connectionless service

What would the answer be for converting 37mw to dBm?

15.68 dBm

In the 7 steps to Wireless LAN deployment, this step includes: Preliminary Requirements and Design Hardware and Software Costs Deployment Services Costs Ongoing Operations and Maintenance Costs

Step: 5

To avoid unauthorized access to your wireless network, you should allow only specific computers to access the network. You do this by putting the ____ addresses into an access table so that only those systems can access the network. MAC SSID TCP NAP

MAC

When considering PoE in a wireless LAN, you have the following options: switch with inline power, inline power patch panel, and power injector.

TRUE

FFT stands for...

Fast Fourier Transform

Which 802.11 wireless standard supports 5GHz frequencies, and speeds greater than 1Gbps?

ac

802.11 fragmentation divides data into separate fragments. (True/False)

true P. 144 - Figure 6-8

Based on Federal Communications Commission (FCC) RF exposure limits, keep access point antennas at least 7.9 inches (20 cm) or more from the body of all persons.

true Page 395

Which of the following are architectural elements that you should consider when designing a WLAN system? (select ALL that apply)

- Application Connectivity - Access Network - Distribution System - Voice over WLAN

Which wireless technology standard supports data rates of 100 Mbps or higher?

802.11 n

Which of the following supports MIMO?

802.11n

Which of the following elements ensures that client devices connecting to an access point are authorized to access protected resources?

Authentication

What type of access point is relatively intelligent and implements enough functions to allow the access point to interconnect with other access points via conventional Ethernet switches?

Autonomous

Which three properties are interrelated?

Frequency, phase, and amplitude

_______ is a method of encoding digital data on multiple carrier frequencies. It has also developed into a popular scheme for wideband digital communication.

OFDM

What technology enables ordinary Ethernet network cables to function as power cords?

Power over Ethernet

Which of the following are benefits of the 802.11 standard?

Price reductions Fast product development Stable future migration Appliance interoperability

All but which ONE of the following are benefits of wireless networks?

Resistance to interference

The MAC layer main functions, include ALL but which ONE of the following?

Route path metrics

In wireless technologies, SNR stands for....

Signal to Noise Ratio

High rate DSSS (HR/DSSS) is the PHY defined in the IEEE 802.11b−1999 amendment.

TRUE

The biggest source of interference today for most people is neighboring Wi-Fi networks.

TRUE

Amplifiers improve performance throughout the coverage area. True/False

True

If a company used a mainframe computer, and needed to connect numerous personal computers, what type of software would be used to permit this? Mainframe Middleware Software Terminal Emulation Wireless Middleware System Browser Emulation

Wireless Middleware

A wireless signal is embedded on a _________ wave specified at a certain frequency. digital broadband---0 analog carrier

carrier

A _________________ attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have.

denial of service

.Which one of the following radio signals can cause degradation in performance of a wireless network?

microwave signals

Which of the following are security vulnerabilities in Wireless?(Select ALL that apply)

passive monitoring unauthorized access rogue access point(s) denial of service (DoS)

When it comes to installing and configuring a wireless LAN, which of these safety tips should be considered (select ALL that apply):

1- Recommend that installers remove rings and necklaces while installing hardware components. 2- Wear eye protection when using saws or drills. 3- Insist that no installers work alone. 4- The use of proper ladders and safety harnesses if placing antennas on towers or rooftops.

When preparing/performing a site survey, which of the following should one consider? (Select ALL that apply)

1- identify potential radio signal interference 2- inspect the facility 3- determine optimum access point antenna installation 4- review requirements 5- obtain floor diagrams 6- select tools 7- write a wireless site survey report 8- assess existing network infrastructure

An installation plan should include which of the following? (Select ALL that apply)

1- required facility changes 2- points of contact 3- tools 4- safety tips 5- installation procedures

This is a use of multiple antennas at both the transmitter and receiver to improve communication performance.

MIMO

Which type of wireless network type can easily, and effectively connect entire cities using inexpensive, existing technology?

MESH

Which of the following are benefits of wireless networks? (Select all that apply)

Mobility. Installation in difficult-to-wire areas. Increased reliability Reduced installation time. Long-term cost savings.

The WLAN market is growing faster than the traditional LAN market as a whole.

True

When using amplifiers, one should be certain to follow the country's regulatory rules that define the usage of radio frequency (RF) amplifiers. (True or False)

True

Pilot testing should be considered when testing the system design of a WLAN solution before installing the system.

True Page 418

Do not install access points near unshielded blasting caps or in an explosive environment because radio frequency (RF) signals from the access point (or radio clients) may cause explosives to ignite. (True/False)

true Page 395

When performing wireless site survey coverage testing, set the signal-measuring tool to only record signal strength on the channel that the test access point is set to. (True/False)

true Page 407

Simulation testing should be done when developing a type of WLAN product that does not exist.

true Page 417

Prototype testing should be considered when initially testing the design of a new WLAN product before going into mass production.

true Page 418

There are two major methods of modulation. One adjusts the height of the wave, and the other adjusts the width of the wave. These two techniques are referred to as _______ and _______ modulation.

frequency, amplitude

When attempting to provide wireless coverage in the presence of an elevator (and within) in a multi-floor facility, the recommendation is to place AP close to the elevator and...

- place an AP on every other floor - -

When co-locating multiple access points, many times, one will need to use multiple channels to ensure the least amount of AP interference. The three channels that will most likely be used in this situation are:

1, 6, 11

Which of the following can be used as authentication servers for an EAP-TLS system? (Select 3)

1- Cisco Access Control Server (ACS) 2- FreeRADIUS 3- Microsoft Internet Authentication Server (IAS)

Performance testing of a WLAN includes which of the following? (Select ALL that apply)

1- Load Tests 2- Association Tests 3- Registration Tests 4- Application Tests

When managing a wireless LAN, operation support considerations include:(Select all that apply)

1- security management 2- network monitoring 3- maintenance 4- help desk 5- configuration management

Which of the following wireless technologies can operate in the 2.4 GHz spectrum? (Select all that apply).

802.11b 802.11g 802.11n

Which of the following supports bonding two 20 MHz channels into a 40 MHz wide channel?

802.11n

This wireless standard supports common devices found in cars, and portable devices. It is primarily used for exchanging data over short distances, and uses short-wavelength UHF radio waves.

802.15

Which of the following are common antenna characteristics? (Select ALL that apply)

Bandwidth and Power Radiation Pattern Antenna Gain Antenna Diversity

Many companies are starting to use this function to protect wireless devices that are lost or stolen from being accessed. System Lock Device Lo-Jack Device Management Client Device Wipe MAC Access Encryption

Client Device Wipe

Inter-Frame Spacing refers to timing and synchronization. Which of the following are valid IFS? (Select ALL that apply)

DCF IFS PCF IFS Short IFS Extended IFS

Multipath propagation ____________ the quality of the signal at the receiver.

Decreases

This is the first stage in project management, and is the most important.

Defining the scope

This is done after you have created the project charter, stated the assumptions, and identified the project constraints.

Develop the Work Breakdown Structure

When attempting to cover outdoor open areas, it is best to use this type of antenna?See the picture below:

Directional Page 380

Which one of the following is not an EAP Method?

EAP Slow

Which one of the following EAP Methods is very secure and is supported on a wide range of client cards, and it is native to Microsoft Windows?

EAP-TLS

This type of access point is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network.

ROGUE

This tool enables one to visualize radio frequency (RF) signals present within the frequency spectrum.

Spectrum Analyzer

The MAC Layer provides which of the following functions (select ALL that apply)?

Timing and Synchronization Data delivery Connectivity Power Management

Which ONE of the following is NOT something that should be defined when planning the security for a wireless network?

Existing Router Configurations

802.11g is not backward-compatible with 802.11b in that disparate clients and access points will not discover one another and communicate.

FALSE

An ad hoc wireless network is a method for wireless devices to indirectly communicate with each other.

FALSE

The IEEE 802 Family of Standards falls within the scope of _________ and _________ of the OSI Reference model.

Layer 1 Layer 2 P. 121 - Figure 5-2

________ is a method of encoding digital data on multiple carrier frequencies. It has developed into a popular scheme for wideband digital communication, whether wireless or over copper wires, used in applications such as digital television and audio broadcasting

OFDM

These types of standards are implemented and controlled by an organization like the IEEE.

OFFICIAL

This is a timing method used by wireless networks, and resides in a point coordinator or access point to coordinate the communication within the network.

PCF

The _______ minimizes the dependence of the MAC layer on the PMD sublayer by mapping MPDUs into a frame format suitable for transmission by the PMD.

PLCP

These devices are used to increase the effective power of a radio frequency signal

RF Amplifier

This wireless technology is used to help businesses wirelessly scan shipments of products.

RFID

This is the optional mechanism used by the 802.11 wireless networking protocol to reduce frame collision introduced by the hidden node problem.

RTS/CTS

This analysis is used to help a company determine the risks, strengths and other issues that may arise in any project.

SWOT analysis

In this step, the Project's scope is defined which provides a basis for future project decisions.

Step: 1

In this step, team members, such as project manager, user representatives, analysts, engineers, implementers, etc. are defined within project teams.

Step: 3

In the 7 steps to Wireless LAN deployment, this step includes: Names of the phases and tasks listed on the WBS (Work Breakdown Structure). Starting date, duration, and due date of each task. Relatioships between phases and tasks.

Step: 4

Higher gain antennas boost performance throughout the coverage area. True/False

True

What method of signal is distributed across multiple frequencies which results in a signal with a wider bandwidth?

spread-spectrum


Ensembles d'études connexes

CHAM Arrival - Patient and Family Experience

View Set

General Biology - Chapter 9 (Part A) Quiz to study for Exam 4

View Set