Wireless LANs

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following typically resides between the wireless network and the wired network, serving as the entry point to the wired network while providing encryption and authentication services?

enterprise encryption gateway

What was a design goal of WPA?

fit into the existing WEP engine

Which is a measure of delay between packets?

jitter

What is an Azimuth chart used to represent?

the horizontal coverage area

What is the recommended color for the window in an IrDA device?

violet

Which type of wireless network uses the ATIM window?

IBSS

Which of the following is NOT part of the process a Windows wireless client performs when scanning for wireless networks?

IP address is requested

A method of roaming between APs that are separated by a router is referred to as which of the following?

Mobile IP

If you are setting up a retail business and want to use the latest technology to make customer purchases as easy as possible at the checkout line, which technology are you most likely to deploy?

NFC

Windows Vista and Windows 7 use which software for configuring wireless NICs?

WLAN AutoConfig

The term ____ describes the rate of electrical flow.

current

Which IEEE standard added speeds of 5.5 and 11 Mbps to the WLAN standards?

802.11b

Match each term with the correct statement below.

A site survey that requires walking through the area of the WLAN while carrying a wireless client like a laptop or tablet computer → manual site survey hardware or software that captures packets to decode and analyze their contents → protocol analyzer a list of itemized software and/or hardware components that are needed for a new WLAN → bill of materials the amount of acceptable time that a late packet can arrive and still be used → delay the measure of delay between packets → jitter an in-depth examination and analysis of a WLAN site → site survey a dynamic self-managing WLAN → automated RF resource management a site survey that is a virtual survey of the area that uses modeling techniques to design the wireless network → predictive site survey the implementation of Voice over IP (VoIP) telephony on a WLAN → VoWiFi

To ensure smooth roaming between coverage areas, which of the following must be true?

APs must use the same SSID and security settings

____ is a low-power, short-range, wireless data and voice transmission technology that falls under the category of WPANs.

Bluetooth

Which encryption protocol is used for 802.11i/WPA2?

CCMP

802.1X utilizes EAP. Which is a correct statement about EAP?

EAP is a framework for transporting authentication protocol

A DCF contention method is designed to provide priority handling to certain types of traffic.

False

A thin access point is one in which the intelligence for wireless management is contained within the AP itself.

False

Whenever a wave moves to the maximum voltage, then down to the minimum voltage, and then returns back to the starting point, it has finished two cycles.

False

What does an updated enterprise-level AP use to distribute the latest update to other APs on the WLAN?

IP multicast

The technique for combating multipath by using multiple transmit and receive antennas is sometimes called which of the following?

MIMO diversity

Which system is preferred for 802.11 WLANs that operate at speeds in excess of 11 Mbps?

OFDM

Which type of modulation changes the starting point of the cycle to represent a change from a 1 bit to a 0 bit and vice versa?

PM

If you are installing an access point on a ceiling, but find there are no electrical outlets nearby to provide power to the AP, what technology should you deploy?

POE

Match each term with the correct statement below.

RF interference that covers all bands of the RF spectrum→all-band interference any undesirable electrical energy emitted within the frequency range dedicated to RF transmissions→radio frequency interference (RFI) transmission problem involving two wireless devices, in which the wireless device closest to the AP transmits at a higher power than the other, more distant device, thereby overwhelming the weaker signal from the distant device→near/far the area between two APs in which a wireless device begins to search for a new AP with which to associate→cell overlap a WLAN that uses a reduced power output from the AP; results in a smaller coverage area but can allow for increased performance due to channel reuse→picocell an IP address that begins with the IP range 169.254.x.x and is assigned if a device cannot receive a valid IP→Automatic Private IP Addressing (APIPA) RF interference that is usually generated by television, radio, and satellite transmitters→narrowband interference RF interference that affects the entire frequency band, such as the entire 2.4-GHz band→wideband interference wireless networks that are used in areas in which large numbers of device are clustered close together→high-density WLANs

What is a difference between RMON and SNMP?

RMON uses dedicated devices

Which value can be measured by the circuitry on a wireless NIC to determine if it is clear to send its transmission?

RSSI

What is the term that describes the ratio of desired signal to undesired signal in the average power level of a transmission?

SNR

Amongst the most common transport encryption algorithms, used to securely transmit documents over the Internet is which of the following?

SSL

Which technology is most likely found in applications such as smart lighting, temperature control, and smoke detection?

ZigBee

Match each term with the correct statement below.

a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings→Fixed WiMAX a low-power, short-range, and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration, security and other higher-level features→ZigBee a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body→autonomous body sensor network (ABSN) set of standards primarily for smartphones and smart cards that is used to establish communication between devices→near field communication (NFC) an attack that sends unsolicited messages to Bluetooth-enabled devices→bluejacking an optical, wireless, point-to-point, line-of-sight wireless technology for outdoor transmissions→free space optics (FSO) an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal→passive RFID tag an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source→visible light communications (VLC) a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician→managed body sensor network (MBSN)

Which best describes a BSS?

a group of wireless devices that is served by a single access point

Match each term with the correct statement below.

a list of stations that have buffered unicast frames waiting at the AP → traffic indication map single cable is used to support multiple virtual LANs → trunking a wireless architecture in which more than one channel is used in the wireless network → multiple-channel architecture an enhanced power management technology in which the AP sends a transmission schedule to one or more stations in a WLAN → scheduled PSMP a logical grouping of network devices within a larger physical network → virtual local area network a power management state in which the station is continuously awake → active mode another name for a WLAN controller → wireless switch reduced throughput caused as a result of all of APs set to the same channel number → cochannel interference a wireless architecture that creates small areas of coverage → micro-cell architecture

Match each term with the correct statement below.

a network of wireless mesh access points that communicate between themselves → wireless mesh network an infrared wireless transmission that requires that the emitter and detector be directly aimed at one another → directed transmission mode of a wireless bridge in which the bridge can transmit only to a wireless bridge that is in root mode → nonroot mode term used to refer to a wireless bridge operating in root mode → root bridge a mode of a wireless bridge that allows the bridge to extend the distance between buildings → repeater mode a term used to refer to the size and shape of a device → form factor a device that transmits a signal and is used in an IEEE 802.11 infrared network → emitter a small and inexpensive device that can inject power into an Ethernet cable → PoE injector device that contains the management and configuration functions for a lightweight access point → wireless switch

Match each term with the correct statement below.

a process in which a station first sends out a management probe request frame on an available channel → active scanning a wireless network that does not use an AP → ad hoc mode a probe request frame sent by a station with a null value as the SSID so that all APs will respond → broadcast probe the process in which a network device first listens on the wire to see if any other device is currently transmitting → carrier sensing an optional access method using RTS/CTS → virtual carrier sensing the final step in the process of a station being accepted into the wireless network → association device that provides routing services to the mobile computer in Mobile IP → foreign agent the amount of time that a station must wait after the medium is clear → slot time a probe request frame sent by a station that contains a specific SSID that the device is searching for → directed probe

Match each term with the correct statement below.

a system of earth-orbiting satellites used as a navigation system → GPS a wireless network designed to replace or supplement a wired local area network → WLAN a wireless metropolitan area network technology that can provide access from up to 10 miles → LTE the connection that begins at a fast Internet service provider, goes through the local neighborhood, and ends at the home or office → last mile connection a wireless network designed for hand-held and portable devices at slow transmission speeds and in close proximity → WPAN a wireless technology that emits a wireless data signal over a short range that contains an identification number → RFID a certification that is the foundation level wireless LAN certification for the CWNP program → CWNA business setting that typically has ten or fewer employees → SOHO special high-speed circuits leased from a local carrier that can be used to connect remote sites of a business → trunk-based leased line

Match each term with the correct statement below.

an attack that attempts to prevent a device from performing its normal functions → denial of service data input into an encryption algorithm → plaintext an attack that makes it appear that the wireless device and the network computers are communicating with each other → man-in-the-middle the process of changing ciphertext into plaintext → decryption granting or denying approval to use specific resources → access control the output from a pseudo-random number generator (PRNG) → keystream data that has been encrypted → ciphertext an imposter AP that is set up by an attacker → evil twin a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring → RF jamming

When an AP accepts or rejects a wireless device it sends a ____ frame.

association response

At regular intervals the AP sends a ____ frame to both announce its presence and to provide the necessary information for other devices to join the network.

beacon

Which of the following is NOT true of broadband radio service?

can be used as an alternative to cable TV

What should you deploy if you manage a public hotspot and want users to agree to a policy or present credentials before using the WLAN?

captive portal AP

Which system allows APs and other network equipment to be connected through the Internet and managed from one central location?

cloud management

DSSS makes it possible to share the frequency with similar devices by assigning each device a unique chipping code, a function known as what?

colocation

WEP guards one of the CIA characteristics, namely what?

confidentiality

The time difference of the arrival of signals as copies travel along different paths is referred to as which of the following?

delay spread

Why do VoWiFi networks require special consideration when performing a site survey?

depend upon timely arrival of each frame in sequence

Match each term with the correct statement below.

dynamically generating a new key for each packet to preventing collisions → per-packet key an encryption cipher that takes one character and replaces it with another character → stream cipher providing access based on a user's job function within an organization → Role-Based Access Control a method for auditing usage by using an algorithm to determine if a threat exists → heuristic monitoring an encrypted alternative to the Telnet protocol that is used to access remote computers → secure shell a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated → 802.1X using wireless technologies for asset tracking of wireless equipment → real-time location services device in an IEEE 802.1X network that makes an appeal for access → supplicant a device in an IEEE 802.1X network that accepts or rejects a supplicant → authenticator

Which of the following is NOT a component of using SNMP for network monitoring?

event log

Which of the following is NOT an option when dealing with risk?

exploit the risk

A threat agent is software installed on a computer that monitors for potential threats to the computer.

false

Active RFID tags do not require their own power source.

false

Antennas play a vital role in receiving signals, but no role in transmitting.

false

Kerberos became the heart of the WPA security method.

false

Which of the following describes the process of a wireless device switching from one AP to another?

handoff

A ____ dipole antenna produces a flatter signal than a standard dipole antenna.

high-gain

The 802.11a standard enables faster data rates than 802.11b due to which of the following?

higher frequencies and increased power

Which of the following is a geographic location that is served by a wireless data system and provides network access to mobile users?

hotspot

Which of the following is NOT true of the Bluetooth technology?

it uses the 5.0 GHz spectrum

A ____ attack on WEP involves identifying two packets derived from the same IV.

keystream

On wireless networks, ____ attacks are commonly done by attackers setting up an evil twin.

man-in-the-middle

What should you do when you have several wireless devices, all with different power levels, and one or more of the devices are having difficulty communicating?

match the AP power level with the lowest-powered device

What provides the greatest source of RF interference?

mirror

Match each term with the correct statement below

modification to a signal to enable it to carry information → modulation distance between the peaks of a wave → wavelength equal to current times resistance → voltage voltage multiplied by the current → electrical power loss of signal strength → attenuation up-and-down wave → oscillating signal bending caused by an object in the path of the transmission → diffraction occurs when the RF signal comes in contact with elements in the air, such as rain or heavy dust particles → refraction rate at which an event occurs → frequency

Match each term with the correct statement below.

modulation technique that uses a range of frequencies that change during the transmission → FHSS an IEEE 802.11a modulation technique that increases the amount of data encoded to 250 Kbps per channel → quadrature phase shift keying a proprietary transmission scheme used to double the effective rate of an 802.11a network → turbo mode the difference between the upper and lower frequencies → bandwidth a delay built-in into the receiver to allow for late-arriving symbols → guard interval sharing a frequenct band between similar devices → colocation an IEEE 802.11a error correction technique that transmits a secondary copy along with the primary information → Forward Error Correction the process of sending multiple signals simultaneously → multiplexing a modulation technique that splits a single high-speed digital signal into several slower signals running in parallel → orthogonal frequency division multiplexing

Match each term with the correct statement below.

mutiple antennas that can be customized to send an optimal signal → antenna array information that is computed by the receiver and sent back to the transmitter for use in the antenna configuration → implicit feedback additional power is sent to the antenna from the power source → active gain an antenna that divides the coverage area into different parts and gives each part its own antenna → sectorized antenna the VSWR as measured in dB → return loss a technique that sends a normal version of the signal along with a shifted version of the same signal → cyclic shift diversity a stick of metal inserted in the earth to ground the antenna → ground rod the orientation of of radio waves as they leave an antenna → polarization an antenna consisting of a single stretched wire with connection in the middle → dipole antenna

Which type of RF signal uses only a single frequency for transmission?

narrowband

When one wireless device of close proximity to the AP drowns out the signal of another device, this problem is referred to as which of the following?

near/far

Which OSI model layer picks the route packets take?

network

If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode.

nonroot mode

A Bluetooth device in ____ mode is part of the piconet but is in a low-power state.

park/hold

What are frequently the weakest link in information security?

passwords

Which site survey analyzer parameter allows a user to establish a baseline for satisfactory performance?

percent success threshold

The capability to prioritize different types of frames is known as which of the following?

quality of service

When considering an outdoor network without obstructions, what do you need to keep in mind?

radio signals attenuate with the square of the distance

Which of the following shows energy as a function of frequency at the time the signal is being transmitted?

realtime view

Which of the following is NOT typically included in an impact analysis?

remediation process

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

security

Which of the following is least likely to have a built-in wireless connection?

server

Impersonation falls into which category of attack?

social engineering

Which type of device can you use to detect RF interference?

spectrum analyzer

Which of the following is true about free space optics?

speeds are comparable to fiber optic

What is a 'last mile connection?'

the connection that begins at an Internet service provider, goes through the local neighborhood, and ends at the home or office

Which is true about the CSMA/CD media access method?

the hidden node problem makes it unsuitable for wireless networks

Which of the following is true about antennas?

they are passive conductors

Which is true about spectrum analyzers?

they are passive receivers

A WPAN has a shorter transmission distance than a WLAN.

true

A directed transmission requires a line of sight path from emitter to detector.

true

A wireless signal is not confinged to a cable and is therefore a security concern.

true

Electromagnetic waves travel through space at the speed of light.

true

If multiple piconets cover the same area, a Bluetooth device can be a member in two or more overlaying piconets.

true

In a wireless environment, a station might be in the range of an AP but not in the range of all other stations.

true

Low-gain antennas have a shorter range than high-gain antennas but do not have to be precisely aimed.

true

Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard.

true

Successful social engineering attacks rely on the weakness of people.

true

The system operating margin is the difference between the received signal level and that which is required.

true

WPA2 uses a block cipher rather than a stream cipher.

true

Which is true about WEP?

two keys are maintained

What is the first phase of the development of a security policy likely to involve?

vulnerability assessment

The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.

True

Which of the following is NOT considered a low data rate technology?

UWB


Ensembles d'études connexes

MyProgrammingLab 6.2,6.3,6,4, MPL

View Set

CH 5: The Self-Employment Contributions ACT (SECA)

View Set

Chapter 24 Homework: The Digestive System

View Set

Chapter 1 Fundamentals of Nursing

View Set

Chapter 17 LearnSmart Marketing 021 Ybarra

View Set

Chapter 45: Renal and Urologic Problems

View Set

PADM 3100 - Workplace Conflict (Quizzes/Test for Entire Course)

View Set