Networking + 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which is the orientation of the antenna concerning the surface of the earth? Channel Throughput Antenna Polarization Received signal strength indication (RSSI) signal strength Channel Capacity

Antenna Polarization

Which off-boarding policy can protect proprietary corporate information if a smartphone is lost? a. Remote wipe b. Trusted access c. Site survey d. OS update requirements

a. Remote wipe

When is a site survey done for a wireless network? Before deployment Post deployment During deployment At each step of deployment

Before deployment

Which type of portal is used for wireless client authentication? RADIUS Captive Acceptable Usage Authentication

Captive

In roaming, what is the first step that a wireless client performs? Authentication Scanning Disassociation Association

Scanning

Which protocol is used for generating preshared keys? Temporal Key Integrity Protocol (TKIP) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Advanced Encryption Standard (AES) Wi-Fi Protected Access 2 (WPA2)

Temporal Key Integrity Protocol (TKIP)

Which Wi-Fi encryption standard was designed to use AES encryption? a. WPA2 b. WEP2 c. WPA d. WEP

a. WPA2

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? a. Band b. RSSI c. Channel d. EIRP

b. RSSI

When using CDMA, where is the cellular-related information stored? In SIM At the service provider's end Both in the SIM and handset In the handset

In the handset

Which type of identifier allows wireless clients to roam freely from AP to AP? a. ESSID b. IP address c. BSSID d. Transmitter address

a. ESSID Within an ESS (extended service set), a client can associate with any one of many APs that use the same ESSID (ESS identifier)

Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Encryption b. Key distribution c. Authentication d. Message integrity

a. Encryption

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1

b. Layer 3 LANs define operations at OSI layers 1 and 2. They support the same TCP/IP protocols—such as IP, TCP, and UDP—from layer 3 and up as wired LANs do

Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi? a. Wi-Fi analyzer b. Spectrum analyzer c. Captive portal d. Wireless LAN controller

b. Spectrum analyzer

Which device on the network will require the greatest throughput capacity? a. Smart thermostat b. Wireless bridge c. Wireless LAN controller d. Smart speaker

b. Wireless bridge

Which of the following wireless technologies does not use the 2.4 GHz band? a. Bluetooth b. Z-Wave c. Wi-Fi d. ZigBee

b. Z-Wave

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ac c. 802.11b d. 802.11ax

d. 802.11ax

Which Carrier Sense technology is used on wireless networks to reduce collisions? a. EAPoL b. SSID c. CSMA/CD d. CSMA/CA

d. CSMA/CA

A client has complained to you about low signal strength in his office. You want to ensure that the issue is resolved, and for that purpose, you plan to place the Wi-Fi client very close to the AP (access point). What level of RSSI (received signal strength indicator) rating will you check to fix this issue? -50 dBm with a good rating -70 dBm with an acceptable rating -30 dBm with an excellent rating -80 dBm with a not good rating

-30 dBm with an excellent rating

In Basic Service Set (BSS), what is the maximum number of access points? 0 2 1 Multiple

1

What is the frequency range for cellular communication? 300 GHz-300,000 GHz 5.1 GHz-5.8 GHz 1850 MHz-1990 MHz 2.4 GHz-2.4835 GHz

1850 MHz-1990 MHz

You have been contracted to install a wireless network connection at Vice City Public School. The school management has requested you to install the latest available Wi-Fi technology for the students. Which of the following frequencies will you use to establish the connection in this scenario? 2.446 GHz-2.454 GHz 300 GHz-300,000 GHz 1850 MHz-1990 MHz 5.1 GHz-5.8 GHz

5.1 GHz-5.8 GHz

Which wireless standard provides a range of 150 feet and is the oldest standard still in use and supported by wireless routers? 802.11g 802.11a 802.11b 802.11n

802.11b

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario. 802.11b 802.11a 802.11g 802.11n

802.11n

Tyler has plans of setting up a cellular network distribution plant for which he has contacted you to act as a service manager. Your first job as a service manager is to document the necessary frequency range under which this 800 band will be operational. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection? 2.4 GHz-2.4835 GHz 1850 MHz-1990 MHz 824 MHz-896 MHz 5.1 GHz-5.8 GHz

824 MHz-896 MHz

You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use? Segment the wireless network Restrict the visitors from connecting to the wireless network Create a guest wireless network Install antivirus on each wireless client

Create a guest wireless network

Howard has recently installed a network connection for a workstation where he has made network connections accessible through both wired and wireless connections. Before finishing the installation, he wants to check whether the computer is making conflicting attempts to communicate with the network through both types of connections. After inspection, he realizes that the computer is indeed making conflicting attempts. Which of the following steps will help Howard in resolving the issue? He can resolve the issue by placing the AP in a high spot for best signal transmission to clients. He can resolve the issue by updating to a NIC or access point's firmware. He can resolve the issue by disabling the Wi-Fi adapter or by unplugging the Ethernet cable. He can resolve the issue by installing a newer Wi-Fi standard.

He can resolve the issue by disabling the Wi-Fi adapter or by unplugging the Ethernet cable.

As a network engineer, you have installed a wireless connection in a newly constructed office floor for Black & White Communications. The CEO's office files a complaint about slow data transmission with the IT department. The IT department gets in touch with you to fix this error. On inspection, you realize that the problem is primarily because of large obstacles like walls and ceilings because of which the wave bounces back to its source. What of the following phenomena will you state as a cause of this error while reporting to the IT department? Attenuation Interference Reflection Refraction

Reflection

You are the proprietor of an export business. Currently, the wireless network in your office is using the WEP (Wired Equivalent Privacy) standard. It offers two forms of authentication: OSA (Open System Authentication) and SKA (Shared Key Authentication). However, neither of them is secure. Your requirement is of an authorization service that provides a central authentication point for wireless, mobile, and remote users. Which of the following will you use in such a scenario? WPA WPA-PSK or WPA2-PSK WPA2 WPA-Enterprise or WPA2-Enterprise

WPA-Enterprise or WPA2-Enterprise

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network? WPA attack War chalking WPS attack War driving

WPS attack

Which standard adapted EAP to WLANs? a. 802.1X b. 802.11g c. 802.11i d. 802.3

a. 802.1X

Which protocol replaced TKIP for WPA2? a. CCMP b. WEP c. RC4 d. RADIUS

a. CCMP

Which of the following statements is true? a. A satellite dish receives signals equally from any direction. b. A Wi-Fi client connects to a range extender which connects to an AP. c. A smartphone always directs its signal toward the closest cell tower. d. A fish aquarium full of clear water won't negatively affect a Wi-Fi signal.

b. A Wi-Fi client connects to a range extender which connects to an AP. A Wi-Fi client can connect to a wireless range extender, which can connect to an AP (access point) to further extend the WLAN range. Satellite dishes are shaped to receive directional signals from one direction. Water in a fish aquarium and the glass around it will both refract waves as they travel into and through these different mediums. Cellular towers and cellular devices use omnidirectional antennas to improve mobility of cellular client devices.

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Brute force attack b. Captive portal c. Guest network d. Evil twin

d. Evil twin

Which problem would a low RSSI level indicate? a. Incorrect passphrase b. Mismatched standards c. Encryption protocol mismatch d. Insufficient wireless coverage

d. Insufficient wireless coverage

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? a. Evil twin b. War driving c. Hidden node d. Rogue AP

d. Rogue AP A rogue AP offers a connection to the Internet without the authorization of the area's network administrator. An evil twin is a type of rogue access point used to trick a device into connecting to the wrong network by broadcasting the same SSID as the authorized network. War driving is when a hacker searches for unprotected wireless networks by driving around with a laptop or smartphone configured to receive and capture wireless data transmissions. The hidden node problem happens when a wireless node is not visible to other nodes on the other side of the coverage area.

Dwight is a fresher who has been hired as an assistant to the head network administrator. Which of the following 802.11 wireless standards should Dwight have an understanding of so that he can assist his senior in setting up a wireless standard that has a theoretical throughput of 600 Mbps? 802.11b 802.11n 802.11a 802.11ax

802.11n

Which protocol was initially introduced with Wi-Fi Protected Access (WPA)? Temporal Key Integrity Protocol (TKIP) Wired Equivalent Privacy (WEP) Advanced Encryption Standard (AES) Wi-Fi Protected Access 2 (WPA2)

Temporal Key Integrity Protocol (TKIP)

What was the first 802.11 standard to implement channel bonding? a. 802.11ax b. 802.11ac c. 802.11g d. 802.11n

d. 802.11n

Which of the following statements is false? a. Wi-Fi functions on two different frequency bands. b. Wi-Fi spreads its data across all available frequencies within a wide channel. c. Each Wi-Fi channel contains multiple frequencies. d. Each Wi-Fi channel contains multiple frequency bands.

d. Each Wi-Fi channel contains multiple frequency bands. A band covers a frequency range that is further subdivided into channels; therefore, a Wi-Fi channel cannot contain multiple frequency bands

Which one of the following wireless transmission types requires a clear LOS to function? a. Wi-Fi b. NFC c. Bluetooth d. IR

d. IR


Ensembles d'études connexes

IS-706: NIMS Intrastate Mutual Aid - An Introduction

View Set

General Question 01 - self introduction + character

View Set

NHM 373 Chap 2 test review questions

View Set

SAFE MLO _ EXAM 3 _ 125 Q's Practice

View Set

Chapter 6 - Web-based Hacking: Servers and Applications

View Set