Network CH6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Management frames

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

Layer 3 (Network)

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

RTS/CTS (Request to Send/Clear to Send)

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

A malicious access point is configured with the SSID of a non-malicious public access point

What scenario describes an evil twin attack?

Beacon frame

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

FHSS

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?

Bluesnarfing

A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?

NFC

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

SMTP

An E-mail client application uses port 25 to connect to the outgoing E-mail server. Which protocol is being used in this scenario?

It distorts the signal as it travels into and through a different transmission medium.

How does refraction affect the propagation of a wireless transmission?

The deletion of the E-mail will occur on both the devices.

If users in your organizations use laptops and mobile to access online E-mail accounts. You are using IMAP as the protocol. What will happen if a user, using both mobile and a laptop, deletes one E-mail using either of the device?

Wi-Fi analyzer

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

Basic service set

In IEEE terminology, stations that share an access point are said to be part of which of the following?

2312 bytes

In an 802.11 data frame, what is the maximum amount of data that can be sent?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

The 802.11 standard specifies the use of what technique to minimize the potential for collisions?

False

The LLC sublayer is primarily concerned with managing MAC addresses in message frames.

True

The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.

True

The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.

Multiple input-multiple oputput (MIMO)

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

Captive portal

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

POP

Using port 110, you have configured an E-mail client to retrieve E-mails from a remote server over a TCP/IP connection. Which protocol is the E-mail client configured with?

The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.

You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?

SMTP

You have recently installed a new firewall on network. After the firewall is installed, you review the firewall logs and notice that port 25 incoming traffic is blocked. Which of the following protocol is impacted with this?

Evil twin

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Rogue AP

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

False (its 100m)

Z-Wave transmissions have a range of up to 50 m per hop, and can tolerate up to 8 hops through repeaters.

spectrum analyzer

What type of device can be used to assess the quality of a wireless signal?

Access points that use overlapping channels can cause interference with each other if they are too close

When troubleshooting wireless issues, what statement is accurate?

Control frames

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

802.11n

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

Class 1

Which Bluetooth class has the highest power output?

Class 1

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

CSMA/CA

Which Carrier Sense technology is used on wireless networks to reduce collisions?

Infrared

Which one of the following wireless transmission types requires a clear LOS to function?

Incoming E-mails will be stored on the server. &You can use multiple devices to access E-mails

While troubleshooting an E-mail client issue on a user's system, you that the incoming mail server settings are configured to listen on port 143. How will the client be able to access E-mails if you continue to use port 143? [Choose all that apply].


संबंधित स्टडी सेट्स

Quiz 4-History, Theories, and Research Methods in Lifespan Development

View Set

Outcomes Assessment & Quality Assurance

View Set

Coursepoint Module 8 Quiz: Taylor's Clinical Nursing Skills

View Set

Chapter 15 part 2 trauma positioning

View Set