Wireless Networking
The ____ setting of a site survey analyzer specifies the AP that will be involved in the test. a. Destination MAC Address b. Delay Between Packets c. Packet Tx Type d. Continuous Link Test
a. Destination MAC Address
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.) a. MAC address management can be difficult b. MAC addresses can be spoofed c. the MAC address can be captured by forcing a reassociation d. only Windows uses MAC addresses, excluding other OSs from this method
a. MAC address management can be difficult b. MAC addresses can be spoofed c. the MAC address can be captured by forcing a reassociation
Which sublayer of the Physical layer reformats data received from the MAC layer when transmitting? a. PLCP b. PMD c. LLC d. Data Link
a. PLCP
Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply) a. WEP does not prevent man-in-the-middle attacks. b. The RC4 PRNG is not properly implemented. c. WEP didn't always encrypt the data. d. Initialization vector keys are reused.
a. WEP does not prevent man-in-the-middle attacks. b. The RC4 PRNG is not properly implemented. d. Initialization vector keys are reused.
Which of the following are used to describe the behaviors of waves as they propagate? (Choose all that apply.) a. absorption b. diffraction c. resistance d. scattering
a. absorption b. diffraction d. scattering
Which of the following are proposed solutions to the interference caused by competing technologies that use FHSS to hop across the spectrum? (Choose all that apply.) a. add switching software b. change the Network layer c. modify power levels d. change the RF spectrum used
a. add switching software c. modify power levels d. change the RF spectrum used
A distributed WLAN architecture can be described as which of the following? a. an ESS that uses multiple autonomous access points b. a BSS composed of two or more ESS networks c. multiple ad-hoc networks combined to form one large network d. an IBSS that uses a single centrally managed fat AP
a. an ESS that uses multiple autonomous access points
Cleartext that has been encrypted is referred to as which of the following? a. ciphertext b. cryptography c. keytext d. plaintext
a. ciphertext
Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information? a. data retention can be difficult b. data is not gathered in real time c. data collection can be time consuming d. gathered data may not be timely
a. data retention can be difficult b. data is not gathered in real time d. gathered data may not be timely
What is the most common method for updating an AP's capabilities? a. downloading new firmware b. rebooting with a new installation CD c. installing a new EEPROM d. sending the AP back to the manufacturer
a. downloading new firmware
If a remote wireless bridge is in repeater mode it functions as a standard AP only and does not communicate with other remote wireless bridges. True False
False
SOHO businesses are not likely to benefit from wireless data communications because of the substantial costs of setting up a wireless network. True False
False
Wireless security was implemented well in the original 802.11 standard. True False
False
A 1 Mbps transmission rate is achieved by sending a single symbol every microsecond. True False
True
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network. True False
True
Low-gain antennas have a shorter range than high-gain antennas but do not have to be precisely aimed. True False
True
One of the goals of a security policy is to implement control. True False
True
The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage). True False
True
The final step in the site survey process is to create the report. True False
True
WLANs are based on de jure standards. True False
True
Signature-based monitoring can be described as which of the following? a. examines network traffic, activity, and transactions, and looks for well-known patterns b. attempts to answer the question: "will this do something harmful if allowed to execute?" c. compiles a baseline of normal activities and looks for statistical anomalies d. continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
a. examines network traffic, activity, and transactions, and looks for well-known patterns
Which of the following units is used to measure frequency? a. hertz b. byte c. decibel d. volt
a. hertz
Which type of RF signal uses only a single frequency for transmission? a. narrowband b. orthogonal frequency c. spread-spectrum d. broadband
a. narrowband
Which of the following are NOT among the several defenses against attacks? a. random employee security scans b. using security policies c. security training d. physical security
a. random employee security scans
Which technique can increase performance by sending independent streams of information at the same time over the same frequencies? a. spatial multiplexing b. transmit beam forming c. spatial diversity d. MIMO diversity
a. spatial multiplexing
Which of the following are categories of site survey? (Choose all that apply.) a. troubleshooting b. periodic c. baseline d. postdeployment
a. troubleshooting b. periodic d. postdeployment
Which of the following are RF site tuning settings? (Choose all that apply.) a. validate coverage area b. adjust channel settings c. adjust radio power levels on APs d. adjust transmission frequency
a. validate coverage area b. adjust channel settings c. adjust radio power levels on APs
What does a loss of 10 decibels mean with respect to the percent of power loss in mW? a. 30% b. 90% c. 50% d. 10%
b. 90%
If you are setting up a retail business and want to use the latest technology to make customer purchases as easy as possible at the checkout line, which technology are you most likely to deploy? a. BAN b. NFC c. ZigBee d. Bluetooth
b. NFC
What is the term that describes the ratio of desired signal to undesired signal in the average power level of a transmission? a. RSSI b. SNR c. FSPL d. dBm
b. SNR
What is the first phase of the development of a security policy likely to involve? a. an outline of how the organization will respond to attacks b. review of the policy for compliance c. vulnerability assessment d. remediation of employees that violate the policy
c. vulnerability assessment
Which of the following are enhancements of the 802.11n standard? a. bonding of two 10 MHz channels b. operation in the 40 GHz frequency range c. 20 MHz channels and fixed guard interval d. 40 MHz channels and variable guard interval
d. 40 MHz channels and variable guard interval
Which technology works by inserting a tag header within the existing Ethernet packet? a. Point Coordinated Function b. enhanced distributed channel access c. Wi-Fi Multimedia d. 802.1Q trunking
d. 802.1Q trunking
Which of the following is the foundation level wireless LAN certification? a. Network+ b. Wireless+ c. MCSE d. CWNA
d. CWNA
Which is true about wireless AP and device optimization? a. always use picocell APs for large coverage areas b. using autonomous APs reduces TCO c. devices should be set to maintain their wireless connection even when connected to a wired network d. conservative roaming setting should be used for VoWiFi devices
d. conservative roaming setting should be used for VoWiFi devices
What aspect of RF may produce biological damage? a. waves passing through the brain b. waves damaging the eyes c. cooling effects d. heating effects
d. heating effects
One way to reduce ISI for outdoor settings is to use which type of antenna? a. omnidirectional b. multidirectional c. unidirectional d. highly-directional
d. highly-directional
Which of the following is least likely to have a built-in wireless connection? a. smartphone b. tablet c. laptop d. server
d. server
If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode. a. access point mode b. repeater mode c. nonroot mode d. root mode
c. nonroot mode
When an AP accepts or rejects a wireless device it sends a(n) ____ frame. a. association request b. association response c. authentication d. reassociation
b. association response
Which of the following are types of APs found in a controller-based architecture? (Choose all that apply.) a. stand-alone b. captive portal c. mesh d. autonomous
b. captive portal c. mesh
The term ____ describes the rate of electrical flow. a. resistance b. current c. electrical power d. voltage
b. current
Which of the following is NOT a component of using SNMP for network monitoring? a. MIB b. event log c. software agent d. management station
b. event log
Which binary modulation technique is similar to frequency modulation? a. amplitude shift keying b. frequency shift keying c. phase shift keying d. All of the above
b. frequency shift keying
Which of the following are advantages of wireless networks compared to wired networks? (Choose all that apply.) a. faster speeds b. mobility c. security d. increased access
b. mobility d. increased access
Which is true of a wireless mesh network? a. a maximum of 10 APs can be on each network b. only one AP must be connected to the wired network c. they use only autonomous APs d. each AP communicates directly to the wired network
b. only one AP must be connected to the wired network
What is the default authentication method according to the 802.11 standard? a. private key b. open system c. basic d. shared key
b. open system
A Bluetooth device in ____ mode is part of the piconet but is in a low-power state. a. idle b. park/hold c. page d. inquire
b. park/hold
Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network? a. presentation b. session c. network d. transport
b. session
Which of the following is true about antennas? a. IR is the power emanating from an antenna b. they are passive conductors c. they have a single connection point which is to the ground plane d. they are active and generate the power they use to transmit
b. they are passive conductors
Which problem did dynamic WEP resolve? a. man-in-the-middle attacks b. weak IV problem c. dictionary attacks d. denial of service attacks
b. weak IV problem
What is the first step in shared key authentication? a. AP sends wireless device an authentication frame that contains a block of text known as the challenge text b. wireless device sends an authentication frame to the AP c. wireless device encrypts challenge text and sends it to AP d. AP encrypts challenge text and sends it to wireless device
b. wireless device sends an authentication frame to the AP
Which best describes kinesthetic learners? a. learn by watching presentations b. work well with hands-on environments c. learn best through lectures d. tend to like taking notes
b. work well with hands-on environments
Which of the following was a result of a group formed to investigate a high-rate WPAN due to the weaknesses of Bluetooth? a. piconet b. ZigBee c. UWB d. RFID
c. UWB
As an insurance company, the customer data that you store on your servers should be considered which of the following? a. vulnerability b. threat c. asset d. risk
c. asset
Which of the following is NOT true of broadband radio service? a. it uses narrowband RF b. can transmit video, voice, and data up to 1.5 Mbps c. can be used as an alternative to cable TV d. used to transmit digital radio
c. can be used as an alternative to cable TV
Which of the following is NOT an option when dealing with risk? a. accept the risk b. transfer the risk c. exploit the risk d. diminish the risk
c. exploit the risk
What is the positive difference in amplitude between two signals? a. refraction b. delay spread c. gain d. propagation
c. gain
In a piconet, one device is the ____, and controls all of the wireless traffic. a. active slave b. controller c. master d. slave
c. master
Which of the following are common spectrum analyzer measurements? (Choose all that apply.) a. attenuation b. current c. modulation d. distortion
c. modulation d. distortion