Wireless Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The ____ setting of a site survey analyzer specifies the AP that will be involved in the test. a. Destination MAC Address b. Delay Between Packets c. Packet Tx Type d. Continuous Link Test

a. Destination MAC Address

Which of the following are weaknesses of MAC address filtering? (Choose all that apply.) a. MAC address management can be difficult b. MAC addresses can be spoofed c. the MAC address can be captured by forcing a reassociation d. only Windows uses MAC addresses, excluding other OSs from this method

a. MAC address management can be difficult b. MAC addresses can be spoofed c. the MAC address can be captured by forcing a reassociation

Which sublayer of the Physical layer reformats data received from the MAC layer when transmitting? a. PLCP b. PMD c. LLC d. Data Link

a. PLCP

Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply) a. WEP does not prevent man-in-the-middle attacks. b. The RC4 PRNG is not properly implemented. c. WEP didn't always encrypt the data. d. Initialization vector keys are reused.

a. WEP does not prevent man-in-the-middle attacks. b. The RC4 PRNG is not properly implemented. d. Initialization vector keys are reused.

Which of the following are used to describe the behaviors of waves as they propagate? (Choose all that apply.) a. absorption b. diffraction c. resistance d. scattering

a. absorption b. diffraction d. scattering

Which of the following are proposed solutions to the interference caused by competing technologies that use FHSS to hop across the spectrum? (Choose all that apply.) a. add switching software b. change the Network layer c. modify power levels d. change the RF spectrum used

a. add switching software c. modify power levels d. change the RF spectrum used

A distributed WLAN architecture can be described as which of the following? a. an ESS that uses multiple autonomous access points b. a BSS composed of two or more ESS networks c. multiple ad-hoc networks combined to form one large network d. an IBSS that uses a single centrally managed fat AP

a. an ESS that uses multiple autonomous access points

Cleartext that has been encrypted is referred to as which of the following? a. ciphertext b. cryptography c. keytext d. plaintext

a. ciphertext

Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information? a. data retention can be difficult b. data is not gathered in real time c. data collection can be time consuming d. gathered data may not be timely

a. data retention can be difficult b. data is not gathered in real time d. gathered data may not be timely

What is the most common method for updating an AP's capabilities? a. downloading new firmware b. rebooting with a new installation CD c. installing a new EEPROM d. sending the AP back to the manufacturer

a. downloading new firmware

If a remote wireless bridge is in repeater mode it functions as a standard AP only and does not communicate with other remote wireless bridges. True False

False

SOHO businesses are not likely to benefit from wireless data communications because of the substantial costs of setting up a wireless network. True False

False

Wireless security was implemented well in the original 802.11 standard. True False

False

A 1 Mbps transmission rate is achieved by sending a single symbol every microsecond. True False

True

A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network. True False

True

Low-gain antennas have a shorter range than high-gain antennas but do not have to be precisely aimed. True False

True

One of the goals of a security policy is to implement control. True False

True

The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage). True False

True

The final step in the site survey process is to create the report. True False

True

WLANs are based on de jure standards. True False

True

Signature-based monitoring can be described as which of the following? a. examines network traffic, activity, and transactions, and looks for well-known patterns b. attempts to answer the question: "will this do something harmful if allowed to execute?" c. compiles a baseline of normal activities and looks for statistical anomalies d. continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected

a. examines network traffic, activity, and transactions, and looks for well-known patterns

Which of the following units is used to measure frequency? a. hertz b. byte c. decibel d. volt

a. hertz

Which type of RF signal uses only a single frequency for transmission? a. narrowband b. orthogonal frequency c. spread-spectrum d. broadband

a. narrowband

Which of the following are NOT among the several defenses against attacks? a. random employee security scans b. using security policies c. security training d. physical security

a. random employee security scans

Which technique can increase performance by sending independent streams of information at the same time over the same frequencies? a. spatial multiplexing b. transmit beam forming c. spatial diversity d. MIMO diversity

a. spatial multiplexing

Which of the following are categories of site survey? (Choose all that apply.) a. troubleshooting b. periodic c. baseline d. postdeployment

a. troubleshooting b. periodic d. postdeployment

Which of the following are RF site tuning settings? (Choose all that apply.) a. validate coverage area b. adjust channel settings c. adjust radio power levels on APs d. adjust transmission frequency

a. validate coverage area b. adjust channel settings c. adjust radio power levels on APs

What does a loss of 10 decibels mean with respect to the percent of power loss in mW? a. 30% b. 90% c. 50% d. 10%

b. 90%

If you are setting up a retail business and want to use the latest technology to make customer purchases as easy as possible at the checkout line, which technology are you most likely to deploy? a. BAN b. NFC c. ZigBee d. Bluetooth

b. NFC

What is the term that describes the ratio of desired signal to undesired signal in the average power level of a transmission? a. RSSI b. SNR c. FSPL d. dBm

b. SNR

What is the first phase of the development of a security policy likely to involve? a. an outline of how the organization will respond to attacks b. review of the policy for compliance c. vulnerability assessment d. remediation of employees that violate the policy

c. vulnerability assessment

Which of the following are enhancements of the 802.11n standard? a. bonding of two 10 MHz channels b. operation in the 40 GHz frequency range c. 20 MHz channels and fixed guard interval d. 40 MHz channels and variable guard interval

d. 40 MHz channels and variable guard interval

Which technology works by inserting a tag header within the existing Ethernet packet? a. Point Coordinated Function b. enhanced distributed channel access c. Wi-Fi Multimedia d. 802.1Q trunking

d. 802.1Q trunking

Which of the following is the foundation level wireless LAN certification? a. Network+ b. Wireless+ c. MCSE d. CWNA

d. CWNA

Which is true about wireless AP and device optimization? a. always use picocell APs for large coverage areas b. using autonomous APs reduces TCO c. devices should be set to maintain their wireless connection even when connected to a wired network d. conservative roaming setting should be used for VoWiFi devices

d. conservative roaming setting should be used for VoWiFi devices

What aspect of RF may produce biological damage? a. waves passing through the brain b. waves damaging the eyes c. cooling effects d. heating effects

d. heating effects

One way to reduce ISI for outdoor settings is to use which type of antenna? a. omnidirectional b. multidirectional c. unidirectional d. highly-directional

d. highly-directional

Which of the following is least likely to have a built-in wireless connection? a. smartphone b. tablet c. laptop d. server

d. server

If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode. a. access point mode b. repeater mode c. nonroot mode d. root mode

c. nonroot mode

When an AP accepts or rejects a wireless device it sends a(n) ____ frame. a. association request b. association response c. authentication d. reassociation

b. association response

Which of the following are types of APs found in a controller-based architecture? (Choose all that apply.) a. stand-alone b. captive portal c. mesh d. autonomous

b. captive portal c. mesh

The term ____ describes the rate of electrical flow. a. resistance b. current c. electrical power d. voltage

b. current

Which of the following is NOT a component of using SNMP for network monitoring? a. MIB b. event log c. software agent d. management station

b. event log

Which binary modulation technique is similar to frequency modulation? a. amplitude shift keying b. frequency shift keying c. phase shift keying d. All of the above

b. frequency shift keying

Which of the following are advantages of wireless networks compared to wired networks? (Choose all that apply.) a. faster speeds b. mobility c. security d. increased access

b. mobility d. increased access

Which is true of a wireless mesh network? a. a maximum of 10 APs can be on each network b. only one AP must be connected to the wired network c. they use only autonomous APs d. each AP communicates directly to the wired network

b. only one AP must be connected to the wired network

What is the default authentication method according to the 802.11 standard? a. private key b. open system c. basic d. shared key

b. open system

A Bluetooth device in ____ mode is part of the piconet but is in a low-power state. a. idle b. park/hold c. page d. inquire

b. park/hold

Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network? a. presentation b. session c. network d. transport

b. session

Which of the following is true about antennas? a. IR is the power emanating from an antenna b. they are passive conductors c. they have a single connection point which is to the ground plane d. they are active and generate the power they use to transmit

b. they are passive conductors

Which problem did dynamic WEP resolve? a. man-in-the-middle attacks b. weak IV problem c. dictionary attacks d. denial of service attacks

b. weak IV problem

What is the first step in shared key authentication? a. AP sends wireless device an authentication frame that contains a block of text known as the challenge text b. wireless device sends an authentication frame to the AP c. wireless device encrypts challenge text and sends it to AP d. AP encrypts challenge text and sends it to wireless device

b. wireless device sends an authentication frame to the AP

Which best describes kinesthetic learners? a. learn by watching presentations b. work well with hands-on environments c. learn best through lectures d. tend to like taking notes

b. work well with hands-on environments

Which of the following was a result of a group formed to investigate a high-rate WPAN due to the weaknesses of Bluetooth? a. piconet b. ZigBee c. UWB d. RFID

c. UWB

As an insurance company, the customer data that you store on your servers should be considered which of the following? a. vulnerability b. threat c. asset d. risk

c. asset

Which of the following is NOT true of broadband radio service? a. it uses narrowband RF b. can transmit video, voice, and data up to 1.5 Mbps c. can be used as an alternative to cable TV d. used to transmit digital radio

c. can be used as an alternative to cable TV

Which of the following is NOT an option when dealing with risk? a. accept the risk b. transfer the risk c. exploit the risk d. diminish the risk

c. exploit the risk

What is the positive difference in amplitude between two signals? a. refraction b. delay spread c. gain d. propagation

c. gain

In a piconet, one device is the ____, and controls all of the wireless traffic. a. active slave b. controller c. master d. slave

c. master

Which of the following are common spectrum analyzer measurements? (Choose all that apply.) a. attenuation b. current c. modulation d. distortion

c. modulation d. distortion


संबंधित स्टडी सेट्स

Chapter 6: Health, Wellness, and Models of Health

View Set

Practice Exam: 1.0: Cloud Concepts and Models

View Set

NSG 330 Ch 49- Assessment and Management of Hepatic Disorders

View Set

Psychological Disorders (Chapter 11 book & online)

View Set