CTS1134 - Ch. 6 Wireless Networking
When using RFID, what is an ARPT(Active Reader Passive Tag)?
It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission
When using RFID, what is an ARPT (Active Reader Passive Tag)?
It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
What is the purpose of the Layer 2 LLC sublayer?
It is used to handle multiplexing, flow and error control, and reliability.
What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?
1.3 Gbps
By default, the pathping command sends how many pings per hop?
100
Near-field communication devices send data at what fixed frequency?
13.56 MHz
In an 802.11 data frame, what is the maximum amount of data that can be sent?
2312 bytes
802.11ac Wave 2 devices can theoretically support how much maximum throughput?
3.47 Gbps
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds?
300 feet
How many data streams are used 802.11ac Wave 2 devices?
4 data streams
How many data streams are used in 802.11ac Wave 2 devices?
4 data streams
How many data streams are used in 802.11ac Wave 2 devices?
4 data streams
Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:
5.9 GHz
In an 802.11 data frame, what is the size of the frame check sequence field?
6 bytes
What is the maximum theoretical throughput of 802.11n?
600 Mbps
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?
802.11ac
Which of the following statements regarding the 802.11ac standard is NOT accurate?
802.11ac access points function more like a hub than a switch.
The wireless spectrum, as defined by FCC, spans between which two frequencies?
9 kHz and 300 GHz
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
9 kHz and 300 GHz
What scenario describes an evil twin attack?
A malicious access point is configured with the SSID of a non-malicious public access point
What scenario describes an evil twin attack?
A malicious access point is configured with the SSID of a non-malicious public access point.
Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal?
All of the above
The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.
Channel bonding
Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?
Class 1
Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100m?
Class 1
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
Control frames
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?
Diffraction
Select the component of enterprise level structured cabling that serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling:
Entrance Facility
A CSSID is an installation configuration variable for an AP
False
All wireless signals are carried through fiber cable by electromagnetic waves.
False
An ad hoc arrangement would work well for a WLAN with many users.
False
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
False
MAC layer frame subtypes: management frames, control frames, security frames, and data frames
False
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. (T/F)
False
The 802.11 data frame contains two address fields
False
The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
False
Wireless Topologies: Ad hoc, Infrastructure, Star-Bus, and Mesh
False
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?
Wi-Fi Analyzer
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?
Wi-Fi analyzer
Select below the network topology that is not a valid wireless network topology:
bus
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
control frames
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
control frames
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
multiple input-multiple output (MIMO)
A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?
probe frame
What type of device can be used to access the quality of a wireless signal?
spectrum analyzer
What type of device can be used to assess the quality of a wireless signal?
spectrum analyzer
How does the 802.11 data frame indicate how a large packet should be fragmented?
the sequence control field indicates how packets will be subdivided.
All wireless signals are carried through the air by electromagnetic waves.
true
An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.
true
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
true
The Wireless Personal Area Network(WPAN) is defined in the 802.15 standard.
true
The most secure Wi-Fi communication is made possible by combing a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.
true
In an 802.11 data frame, what is the size of the frame check sequence field?
6 bytes (frame check sequence field)
Which 802.11 standard was the first to utilize the 5 GHz band?
802.11a
How does the 802.11 data frame indicate how a large packet should be fragmented?
The sequence control field indicates how packets will be subdivided
what is the purpose of the Layer 2 LLC sublayer?
It is used to handle multiplexing, flow and error control, and reliability.
At what layer of the OSI model would a TCP or UDP header be added to a payload?
Layer 4
What type of routing protocol enables routers to communicate beyond neighboring routers, allowing each router to create a map of an entire network?
Link State
This 802.11n innovation increases the throughput and range of an access point by using more than one antenna to transmit.
MIMO
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?
MIMO
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
MIMO (Multiple Input Multiple Output)
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
Management Frames
____ signals follow a number of different paths to their destination because of reflection, diffraction, and scattering.
Multipath
An unauthorized access point is known as a rogue access point
True
Antennas are used for both the transmission and reception of wireless signals.
True
MU-MIMO allows multiple antennas to serve multiple clients simultaneously
True
Multipath signaling is a significant cause of fading. (T/F)
True
Multipath signaling is a significant cause of fading.
True
On-boarding is installing an agent on a user's device which gives trusted access to portions of the network
True
The WPS PIN is vulnerable to brute force attacks. (T/F)
True
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
True
The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
True
Two address fields related to the AP are the transmitter and receiver addresses
True
With 802.11ac a A-MPDU maximum frame size is 4,692,480 bytes
True
A wireless controller is used to initially configure the APs in a mesh network and could optionally manage the APs
True
All wireless signals are carried through the air by electromagnetic waves.
True
A remote wipe will clear a wireless device of all important information
True
When troubleshooting wireless issues, what statement is accurate?
Access points that use overlapping channels can cause interference with each other if they are too close.
In IEEE terminology, a group of stations that share an access point are said to be part of what option below?
Basic service set
Select below the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point:
Beacon Frame
In the 802.11 standard, IEEE specifies what type of access method?
CSMA/CA
Which type of multiplexing is defined by wavelength instead of frequency?
CWDM
Which of the following techniques help to reduce overhead in 802.11n wireless transmission?
Frame aggregation
Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?
Half-Duplex
How does refraction affect the propagation of a wireless transmission?
It distorts the signal as it travels into and through a different transmission medium.
How does refraction affect the propagation of a wireless transmission?
It distorts the signals as it travels into and through a different transmission medium.
How will clients obtain the SSID if the SSID broadcast is disabled on your wireless router?
It has to be provided to them
which of the following is not true about multipath signaling? A. The more obstacles a wireless signal reflects or diffracts off, the better chance it has of reaching its destination. B. Multipath signaling uses less energy and results in clearer reception than line-of-sight signaling. C. Given that they follow multiple paths to their destination, signals will arrive at the same destination at slightly different times. D. The more obstacles between a wireless transmitter and receiver, the more signal fading will occur.
Multipath signaling uses less energy and results in clearer reception than line- of-sight signaling.
At what layer of the OSI model do the 802.11 standards vary?
Physical
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
RTS/CTS (Request to Send/Clear to Send)
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
RTS/CTS(Request to Send/Clear to Send)
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?
Scattering
Your wireless station detects more than one access point. Which of the factors will it use to determine the access point it will attempt association with?
Signal strength
If your wireless stations are configured to perform passive scanning, what do they need from an access point to initiate association?
The beacon frame
You are troubleshooting client's wireless networking issue. Which of the following will prevent the client from connecting to the network?
The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID
You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?
The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.
How does the 802.11 data frame indicate how a large packet should be fragmented?
The sequence control field indicates how packets will be subdivided.
Diffraction has what affect on a wireless signal's propagation?
The signal is split into secondary waves that continue in the direction in which they split
Diffraction has what affect on a wireless signal's propagation?
The signal is split into secondary waves that continue in the direction in which they split.
Your laptop has its wireless NIC on, has wireless protocols running and is using active scanning. Which action will the device take to find access points?
Transmit a probe frame
A heat map is a feature that maps Wi-Fi signals and other noise in an area and can also pinpoint gaps in coverage
True
A lightweight wireless protocol is used for centralized wireless management
True
Healing messages are a feature of what smart home protocol?
Z-wave
In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?
basic service set
What special signal is issued periodically from a AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?
beacon frame
What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?
beacon frame
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
captive portal
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?
diffraction
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
false
Infrared technology utilizes an LED that emits light with shorter wavelengths than red light.
false
NFC tags are expensive and cannot be purchased blank, requiring them to be pre-loaded.
false
The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
false
Z-wave transmission have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.
false
In ____ wireless systems, the transmitting antenna focuses its energy directly toward the receiving antenna which results in a point-to-point link.
fixed
In Linux, what command can be used for viewing and setting wireless interface parameters?
iwconfig
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?
iwconfig
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
management frames