CIT: 472 ADV Telecommunications I @ WKU - Fall 2018 Study Tool

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____dBm is a typical recommended signal strength for a WLAN?

-70

When 802.11n uses bonded channels, the primary and secondary channels are both _________ wide, giving a total width of ________ when bonded.

20 MHz, 40 MHz

When 802.11n uses bonded channels, the primary and the secondary channels are both __________ wide, giving a total width of __________ when bonded.

20 MHz, 40 MHz

How many non-overlapping channels are available when using 802.11a?

23

Select the standard below that defines how Power over Ethernet (PoE) functions.

802.3at

The materials concrete, wood, and asphalt that "soak up" an RF signal can all cause __________.

Absorption

Which wireless mesh network makes use of clients to relay signals from the AP?

Ad hoc wireless mesh network

Which wireless mesh network makes use of clients in relay signals from the AP?

Ad hoc wireless mesh network.

The technique for using the antenna with the most recently received strongest signal to transmit is known as:

Answer: Transmit diversity Side-note: Transmit diversity = sending Antenna diversity = receiving

_____ is the process in which an AP accepts a station into the WLAN.

Authentication

A(n) __________ is a radiation chart used to show horizontal coverage area.

Azimuth chart

When documenting a site survey, a __________ is included to itemize every software and/or hardware component needed for a WLAN.

Bill of materials (BOM)

Which of the following is the default access method for IEEE 802.11 WLANs?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Which of the following is not typically a feature of autonomous access points?

Centralized remote management capabilities

Which of the following is NOT a management frame?

Control Frame

Which term describes an attack where the intent is to prevent a device from performing normal functions?

Denial of Service

When performing a site survey, which step should be taken first?

Determine business requirements

__________________ is the process by which an AP can automatically move to another channel if it detects a foreign AP using the same channel.

Dynamic Frequency Selection (DFS)

__________ is the process by which an AP can automatically move to another channel if it detects a foreign AP using the same channel.

Dynamic frequency selection (DFS)

Which IFS frame is used when a frame MUST be retransmitted?

Extended IFS

Which IFS frame is used when a frame must be retransmitted?

Extended IFS

An RF signal splitter takes one input and splits it into two outputs, doubling the power of the signal.

False

An antenna must be horizontally oriented to communicate with a vertically oriented antenna.

False

CMSA/CD is used in wireless networks to detect if a collision has occured from two stations transmitting simultaneously.

False

CSMA/CD is used in wireless networks to detect if a collision has occurred from two stations transmitting simultaneously.

False

Forward Error Correction (FEC) will cause data to be retransmitted if the first copy of data sent out is found to be corrupted.

False

Most network operating systems require significant modifications to make them compatible with the features at the WLAN Physical Layer.

False

The maximum frame size useable on a wireless network is 1,500 bytes.

False

_____ is the primary regulatory agency for wireless communications in the United States and its territorial possessions.

Federal Communications Comission (FCC)

A __________ is used to limit the power of an RF signal to comply with FCC regulations, and cannot be set by the user.

Fixed-loss attenuator

_______________ is caused by the loss of signal strength as the signal travels.

Free Space Path Loss (FSPL)

In _____ mode an IEEE 802.11a/b/g device will not be able to access the AP.

Greenfield

Select the RTS/CTS technology used when an 802.11n device is used in a mixed environment:

HT Dual-CTS

The RTS/CTS technology used when an 802.11n device is used in a mixed environment is:

HT Dual-CTS protection

The __________ channel access method assigns priorities to transmission and schedules access to a medium by allocating transmission opportunities

Hybrid Coordination Function

The _____________ channel access method assigns priorities to transmissions and schedules access to a medium by allocating transmission opportunities.

Hybrid Coordination Function

The ___________ channel access method assigns priorities to transmissions and schedules access to a medium by allocating transmission opportunities.

Hybrid Coordination Function (HCF)

Which organization is responsible for the global management of radio frequency spectrum?

ITU-R

Which organization is responsible for the global management of the radio frequency spectrum?

ITU-R

The vulnerability in WEP's use of IV is that:

IVs can be repeated

__________ ensures that information has not been modified or changed by a malicious third party.

Integrity

A(n) __________ sends out RF signals in all directions, using power levels regulated by the FCC.

Intentional radiator

An ______________ sends out RF signals in all directions, using power levels regulated by the FCC.

Intentional radiator

Which of the following is NOT an advantage of spread-spectrum transmission in comparison to narrowband transmission?

Invulnerability to interference

Address filtering makes use of a __________, which is a 48-bit identifier that is hard coded into a wireless device.

MAC address

A __________ usually involved physically moving around a WLAN while using a mobile device or laptop to gather information.

Manual site survey

The technique for combining multiple copies of multipath signals into one reinforced signal in 802.11n is called?

Maximum ratio combining (MRC)

Which of the following is NOT a design goal of a site survey? -Minimize bandwidth utilization -Determine the best location for the APs in the WLAN -Develop wireless networks that are optimized for the applications used on the network -Locate any unauthorized APs

Minimize bandwidth utilization

Sending multiple signals simultaneously is known as _________.

Multiplexing

What happens if a probe request frame contains a null value?

No APS will respond

Which of the following is NOT a management frame?

Not: Control frame Are: authentication association request association response beacon deauthentication deassociation probe request probe response reassociation request reassociation response

802.11g makes use of what modulation technique to achieve 54 Mbps transmission speeds?

OFDM

What is data called that is to be encrypted by inputting into an encryption algorithm?

Plaintext

Which utility can be used to view live network traffic and view its contents?

Protocol analyzer

A __________ tag emites wireless data signals that can be used to identify whatever it is placed on.

RFID

A working group is mostly involved in what IEEE process?

Ratification of amendment

A __________ remote wireless bridge can only communicate with other bridges that are not using the same mode. This is a requirement in PtP or PtMP configurations.

Root mode

A ________ serves as a logical network name used by clients to connect to a wireless network.

SSID

A(n) __________ serves as a logical network name used by clients to connect to a wireless network.

SSID

Which of the following does NOT apply to SSID hiding:

SSID cannot be used by unauthorized users

Which of the following uses a challenge text?

Shared key authentication

__________ is a technique for sending the same transmission out from different antennas.

Spatial diversity

An RTS Threshold is used to ensure that packets smaller than a certain size do not make use of RTS/CTS, preventing wasted resources.

True

Devices that use a minimum of 75 hop channels make use of full-channel FHSS.

True

High-gain antennas have longer ranges and higher signal quality, hence may not be aimed precisely in a particular direction at the receiver.

True

High-gain antennas have longer ranges and higher signal quality, hence may not be aimed precisely in a particular direction at the reciever.

True

Beacon frames are regularly transmitted messages sent from APs to announce their presence.

True Ones that do it: probe beacon association authentication

_____ are special high-speed circuits leased from a local carrier that can be used to connect remote sites of a business.

Trunk based leased lines

A weakening electromagnetic signal does not impact which two characteristics?

Wavelength and frequency

A site survey should be performed in all of the following situations EXCEPT -When there are software updates available to client utilities -When there are significant changes in personnel -When there are changes in network needs -When there are physical changes to the building

When there are software updates available to client utilities

The __________ is an organization that encourages use of standards in wireless equipment manufacture, and certifies wireless equipment for compatability.

Wi-Fi Alliance

Which is NOT typically found on a site survey documentation form? -Wired network topology -AP configuration -Throughput findings -Purpose of the report

Wired network topology

The materials concrete, wood, and asphalt that "soak up" an RF signal can all cause

absorption

The modification of the height of a digital signal is called

amplitude shift keying

What is access control in a WLAN?

authorizing devices

A dynamic "self-managing" WLAN that can monitor the environment and then automatically adjust power levels of channels to compensate for changes uses __________ tools.

automated RF resource management

Each of the following is a name for the electromagnetic signal that has been modified to carry information except

carrier keying

__________ is the theoretical maximum rated speed of a network.

data rate

The reference point that relates the logarithmic relative decibel (dB) scale to the linear milliwatt scale is known as the

decibel milliwatt (dBm)

__________ is caused by an object in the path of the transmission.

diffraction

A(n) __________ transmission requires that the emitter and detector be directly aimed at one another.

directed

A delay called the __________ is used to help reduce the effects of intersymbol interference.

guard interval

A delay called the ______________ is used to help reduce the effects of intersymbol interference.

guard interval

Each of the following is a name for the Media Access Control ( MAC) address except:

hardware address

A __________ is a specific geographic location that is served by a wireless data system.

hotspot

Two signals that have the same peaks and valleys are called

in phase

IEEE 802.11 specified that either radio frequency waves or __________ could be used in a WLAN.

infrared light

A mathematical value used to produce ciphertext is called a(n)

key

A __________ is an attack where an attacker analyzes two packets created from the same IV.

keystream attack of IV attack

The __________ refers to the connection that begins at a fast Internet service provider, goes through the local neighborhood, and ends at the home or office

last mile connection

nfrared light is next to visible on the __________.

light spectrum

_______ occurs when a multipath signal arrives 180 degrees out of phase.

nulling

Cycles are illustrated by an up-and-down wave called a(n)

oscillating signal

Focusing RF signal in such a way to cause a gain without increase in IR power is call a(n) __________.

passive gain

With ___________ the medium through which the signal passes causes the signal to bend.

refraction

The wireless system that makes use of a single antenna:

single-input single-output (SISO)

When performing a site survey for a WLAN environment that will support VoWiFi, it is recommended that the primary tools used are:

the built-in tools in the VoWiFi handset

When documenting the current network, each of the following items is important EXCEPT -the number of USB ports on each client -the type of media -the number of clients -the types of clients

the number of USB ports on each client

Which of the following describes a backhaul connection?

two or more remote locations or (if a different option is available) A connection between two local devices

The distance between peaks of an electromagnetic wave is called the

wavelength


संबंधित स्टडी सेट्स

14-2 Guided Reading ( + other stuffs)

View Set

MGT3000 Test #2 Study Guide (Chpts. 4, 5, & 6)

View Set

Operations and Supply Chain Mgmt

View Set

MGMT 498 SB Assignment Chapter 9

View Set