Review Questions - Module 6 - Wireless Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What size bonded channels do 802.11ac and 802.11ax support?

802.11ac supports 20-,40-,60-MHz channels with optional use of 160-MHz channels.

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11ax

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

RSSI

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a strong signal near the middle of the 100-acre campus. It's SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?

Rogue AP

Which protocol replaced TKIP for WPA2?

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which 802.11X authentication protocol is often used by WLANs?

EAPoL Extensible Authentication Protocol (EAP) over LAN (EAPoL Protocol) is a network port authentication protocol used in IEEE 802.1X (Port Based Network Access Control) developed to give a generic network sign-on to access network resources.

Which function of WPA/WPA2 security ensures data cannot be read in transit?

Encryption

You've just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the WiFi so you can listen to some music while you study. As you're about to sign in, you realize that you've clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil Twin

To exchange information, two antennas must be tuned to the same_________.

Frequency

What feature of a site survey maps the Wi-Fi signals in your location?

Heat Map

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3 Network layer 3 is the lowest layer of the OSI Model at which wired and wireless transmissions share the same protocol .

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?

Make a guest network, while also making a captive portal page to isolate her network from guests.

Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _______________ due to the higher proportion of noise.

SNR

When a wireless signal encounters a large obstacle with wide, smooth surfaces, what happens to the signal?

The signal reflects or bounces back towards its source.

what addresses does an 802.11 frame contain that an 802.3 frame does not?

Transmitter address and Receiver address.

What is the primary difference between how WPA2-Personal and WPA2-Enterprise are implemented on a network?

WPA2 Personal uses pre-shared keys (PSK) and is designed for home use. However, WPA2 Enterprise is specifically designed for use in organizations. Enterprise is far more secure as it requires a RADIUS while WPA2-Personal uses a single password that anyone can use to gain network access.

Why do wireless networks generally experience a greater reduction in throughput compared with wired networks?

Wireless networks operate at half duplex while wired networks can operate in full duplex which causes throughput to be lower in wireless connections then what is advertised for them. Wireless experience collisions.

Which of the following wireless technologies does not use the 2.4GHz band?

Z-Wave

Which one of the following wireless transmissions types requires a clear LOS to function?

inrared


संबंधित स्टडी सेट्स

BUSMHR 2500 Chapter 4 Creativity and The Business Idea

View Set

SAS Programming 2: Data Manipulation Techniques Review

View Set