Module 06 Wireless Networking
The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.
802.11g
Dwight is a fresher who has been hired as an assistant to the head network administrator. Which of the following 802.11 wireless standards should Dwight have an understanding of so that he can assist his senior in setting up a wireless standard that has a theoretical throughput of 600 Mbps?
802.11n
You are the proprietor of an export business. Currently, the wireless network in your office is using the WEP (Wired Equivalent Privacy) standard. It offers two forms of authentication: OSA (Open System Authentication) and SKA (Shared Key Authentication). However, neither of them is secure. Your requirement is of an authorization service that provides a central authentication point for wireless, mobile, and remote users. Which of the following will you use in such a scenario?
WPA-Enterprise or WPA2-Enterprise
Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?
WPS attack
What was the first 802.11 standard to implement channel bonding? a. 802.11n b. 802.11g c. 802.11ax d. 802.11ac
a. 802.11n
Which Carrier Sense technology is used on wireless networks to reduce collisions?
a. CSMA/CA
Which type of identifier allows wireless clients to roam freely from AP to AP? a. ESSID b. IP address c. BSSID d. Transmitter address
a. ESSID
Which of the following wireless technologies does not use the 2.4 GHz band?
a. Z-Wave
Which protocol replaced TKIP for WPA2?
d. CCMP
Which function of WPA/WPA2 security ensures data cannot be read in transit?
d. Encryption
A client has complained to you about low signal strength in his office. You want to ensure that the issue is resolved, and for that purpose, you plan to place the Wi-Fi client very close to the AP (access point). What level of RSSI (received signal strength indicator) rating will you check to fix this issue?
-30 dBm with an excellent rating
What is the frequency range for cellular communication?
1850 MHz-1990 MHz
You have been contracted to install a wireless network connection at Vice City Public School. The school management has requested you to install the latest available Wi-Fi technology for the students. Which of the following frequencies will you use to establish the connection in this scenario?
5.1 GHz-5.8 GHz
Tyler has plans of setting up a cellular network distribution plant for which he has contacted you to act as a service manager. Your first job as a service manager is to document the necessary frequency range under which this 800 band will be operational. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?
824 MHz-896 MHz
Howard has recently installed a network connection for a workstation where he has made network connections accessible through both wired and wireless connections. Before finishing the installation, he wants to check whether the computer is making conflicting attempts to communicate with the network through both types of connections. After inspection, he realizes that the computer is indeed making conflicting attempts. Which of the following steps will help Howard in resolving the issue?
He can resolve the issue by disabling the Wi-Fi adapter or by unplugging the Ethernet cable.
As a network engineer, you have installed a wireless connection in a newly constructed office floor for Black & White Communications. The CEO's office files a complaint about slow data transmission with the IT department. The IT department gets in touch with you to fix this error. On inspection, you realize that the problem is primarily because of large obstacles like walls and ceilings because of which the wave bounces back to its source. What of the following phenomena will you state as a cause of this error while reporting to the IT department?
Reflection
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
b. Evil twin
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
b. Layer 3
Which Wi-Fi encryption standard was designed to use AES encryption? a. WEP2 b. WPA2 c. WPA d. WEP
b. WPA2
Which device on the network will require the greatest throughput capacity? a. Wireless LAN controller b. Wireless bridge c. Smart thermostat d. Smart speaker
b. Wireless bridge
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
c. 802.11ax
Which of the following statements is false? a. Wi-Fi spreads its data across all available frequencies within a wide channel. b. Each Wi-Fi channel contains multiple frequencies. c. Each Wi-Fi channel contains multiple frequency bands. d. Wi-Fi functions on two different frequency bands
c. Each Wi-Fi channel contains multiple frequency bands.
Which problem would a low RSSI level indicate? a. Encryption protocol mismatch b. Incorrect passphrase c. Insufficient wireless coverage d. Mismatched standards
c. Insufficient wireless coverage
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?
c. RSSI
Which standard adapted EAP to WLANs? a. 802.11g b. 802.3 c. 802.11i d. 802.1X
d. 802.1X
Which of the following statements is true? a. A fish aquarium full of clear water won't negatively affect a Wi-Fi signal. b. A satellite dish receives signals equally from any direction. c. A smartphone always directs its signal toward the closest cell tower. d. A Wi-Fi client connects to a range extender which connects to an AP
d. A Wi-Fi client connects to a range extender which connects to an AP
Which one of the following wireless transmission types requires a clear LOS to function?
d. IR
Which off-boarding policy can protect proprietary corporate information if a smartphone is lost? a. Trusted access b. OS update requirements c. Site survey d. Remote wipe
d. Remote wipe
You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?
d. Rogue AP
Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi? a. Wi-Fi analyzer b. Wireless LAN controller c. Captive portal d. Spectrum analyzer
d. Spectrum analyzer