Mod 6 Homework

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What addresses does an 802.11 frame contain that an 802.3 frame does not?

A transmitter and receiver.

To exchange information, two antennas must be tuned to the same ______________________.

Frequency/Channel

What feature of a site survey maps the Wi-Fi signals in your location?

Heat Map

Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _______________ due to the higher proportion of noise.

SNR

When a wireless signal encounters a large obstacle with wide, smooth surfaces, what happens to the signal?

The signal reflects or bounces back towards its source.

Which protocol replaced TKIP for WPA2? a. CCMP b. WEP c. RADIUS d. RC4

a. CCMP

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? a. RSSI b. Channel c. EIRP d. Band

a. RSSI

Which of the following wireless technologies does not use the 2.4 GHz band? a. Z-Wave b. Bluetooth c. ZigBee d. Wi-Fi

a. Z-Wave

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1

b. Layer 3

Which Carrier Sense technology is used on wireless networks to reduce collisions? a. CSMA/CD b. EAPoL c. CSMA/CA d. SSID

c. CSMA/CA

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ac c. 802.11b d. 802.11ax

d. 802.11ax

Which 802.11X authentication protocol is often used by WLANs?

EAPoL

What size bonded channels do 802.11ac and 802.11ax support?

802.11ac supports 20-,40-,60-MHz channels with optional use of 160-MHz channels.

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?

Make a guest network, while also making a captive portal page to isolate her network from guests.

What is the primary difference between how WPA2-Personal and WPA2-Enterprise are implemented on a network?

WPA2 Personal uses pre-shared keys (PSK) and is designed for home use. However, WPA2 Enterprise is specifically designed for use in organizations. Enterprise is far more secure as it requires a RADIUS while WPA2-Personal uses a single password that anyone can use to gain network access.

Why do wireless networks generally experience a greater reduction in throughput compared with wired networks?

Wireless networks operate at half duplex while wired networks can operate in full duplex which causes throughput to be lower in wireless connections then what is advertised for them. Wireless experience collisions.

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? a. Rogue AP b. War driving c. Evil twin d. Hidden node

a. Rogue AP

Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Message integrity b. Authentication c. Encryption d. Key distribution

c. Encryption

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Guest network b. Captive portal c. Evil twin d. Brute force attack

c. Evil twin

Which one of the following wireless transmission types requires a clear LOS to function? a. Bluetooth b. NFC c. IR d. Wi-Fi

c. IR


Ensembles d'études connexes

Serial Season 1, Episode 9 Questions

View Set

Therapeutic Interventions (Ch 10-13)

View Set

Cultural Forms of Addression (pg. 89)

View Set

Biology- The Nature of Molecules and the Properties of Water

View Set

Deep Learning for Computer Vision

View Set

13-THE MUSCULOSKELETAL SYSTEM KHAN ACADEMY NOTES

View Set