Wireless Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____ measures, in dBm, the power of the signal on a wireless receiver's end.

RSSI

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

Site survey

A wireless device with its protocols running, periodically surveys its surroundings for evidence of an access point is known as _____.

scanning

A _____ assesses client requirements, facility characteristics, and coverage areas to determine the optimal AP arrangement.

site survey

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

RADIUS

_____ uses electromagnetic fields to store data on a small chip, which includes an antenna that can both transmit and receive.

RFID

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

RSSI

_____ uses an ad hoc topology for a small number of nodes closely positioned to transmit directly to each other without an intervening connectivity device, such as an AP.

IBSS

What was the first 802.11 standard to implement channel bonding?

802.11n

Which protocol replaced TKIP for WPA2?

CCMP

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

Diffraction

WPA2-Enterprise improves security by adding __ to work alongside ___ for the most secure communication possible.

EAP, RADIUS

Which type of identifier allows wireless clients to roam freely from AP to AP?

ESSID

A short burst of data is transmitted on a particular frequency within the band, and the next burst goes to the next frequency in the sequence is called _____

FHSS

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Fading

_____ is a sophisticated security technique that detects a Wi-Fi client's geographical position and activates resources or access according to that location.

Geofencing

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Sequence Control

Which Wi-Fi encryption standard was designed to use AES encryption?

WPA2

What is the primary difference between how WPA2-Personal and WPA2-Enterprise are implemented on a network?

WPA2-Enterprise requires a RADIUS authentication server.

The _____ standard has a theoretic bandwidth of up to 9608 Mbps and will work in three wireless bands.

Wi-Fi 6E

_____ is a smart home protocol that provides two basic types of functions: signaling to manage wireless connections, and control to transmit data and commands between devices.

Z-wave

_____ is a low-powered, battery-conserving wireless technology designed to handle small amounts of data and is therefore ideal for use in ISM (industrial, scientific, and medical) sensors and IoT devices.

ZigBee

What feature of a site survey maps the Wi-Fi signals in your location?

Heat map

A peer-to-peer wireless network is also known as a(n):

IBSS

Which one of the following wireless transmission types requires a clear LOS to function?

IR

802.11ac and 802.11ax both support all the following except which two bonded channels?

10 MHz and 240 MHz

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

2.4 GHz-2.4835 GHz

What is the frequency range for Bluetooth communication?

2.4 GHz-2.4835 GHz

In North America, there are _____ wireless frequency channels to use in the 5GHz band)

24

a 2.4GHz wireless channel's bandwidth infringes upon (or overlaps with) ______ neighboring channels' bandwidths in each direction.

4

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation?

802.11ax

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11ax

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band?

802.11ax

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

802.11b

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

A more negative RSSI value indicates a higher quality of signal.

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

______ is a wireless sensor technology using an ad-hoc protocol enabling PANs to communicate with heart-rate monitors, GPS devices and other activity-monitoring devices and works at ranges of no more than 5 feet.

ANT+

_____ provides faster and more secure encryption for WPA2 wireless transmissions.

CCMP

Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?

EAP-TLS

what type of identifier allows wireless clients to roam freely from AP to AP?

ESSID

Which function of WPA/WPA2 security ensures data cannot be read in transit?

Encryption

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil twin

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?

Guest network and Wireless client isolation

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

IBSS

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

IBSS

Royal Global University has just set up a new department for biotechnology and has hired you to extend the network connection to this department. Which of the following equipment do you think is necessary while extending the connection?

IDF

_____ exists just below the spectrum that is visible to the human eye, with longer wavelengths than red light and thus requires a nearly unobstructed LOS (line of sight) between the transmitter and receiver.

IR

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

Insufficient wireless coverage

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.

Interference seems to be the cause.

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be.

It will increase the possibility of transmission interference between wires.

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

_____ allows for multiple antennas on the access point and on a client device process incoming or outgoing data simultaneously.

MU-MIMO

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

_____ includes a tiny antenna embedded in a device that sends its radio signal at a fixed frequency of 13.56 MHz to transfer data wirelessly over very short distances (usually 10 cm or less).

NFC

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?

OFDMA

_____ allows an 802.11ax AP to subdivide each channel into smaller frequency allocations for each client, such as 2 MHz or 4 MHz of each 20-MHz channel so that the AP can then transmit multiple small frames to multiple clients at one time using parts of the channel.

OFDMA

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted) Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

PEAP

___ RFID scanning uses electromagnetism in the tag, while ___ RFID scanning uses a battery in the tag.

Passive, Active

Which of the following cloud models makes resources available to users through a WAN connection?

Private cloud

The CSMA/CA wireless protocol uses _ and ______ packets to aid in accessing the network medium.

RTS, CTS

What addresses does an 802.11 frame contain that an 802.3 frame does not?

Receiver address and Transmitter address

_____ occurs as a wave travels into and through a different transmission medium, such as when traveling through glass or other solids, the wave's direction, speed, and wavelength are altered.

Refraction

Which off-boarding policy can protect proprietary corporate information if a smartphone is lost?

Remote wipe

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?

Rogue AP

The proportion of noise to the strength of a signal is called the _____.

SNR

A character string used to identify an access point is called the _____.

SSID

Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?

Smart thermostat

a ___, which lets you determine all frequencies, including Wi-Fi, within a scanned range that are present in an environment.

Spectrum Analyzer

Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi?

Spectrum analyzer

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

Spectrum analyzer

When a wireless signal encounters a large obstacle with wide, smooth surfaces, what happens to the signal?

The signal reflects, or bounces back, toward its source.

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

Trailer

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique

Which of the following security threats involves an interception of the network keys communicated between clients and access points?

WPA attack

You have been appointed as the network administrator in Well Brew Ltd) The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

WPS attack

The lesson covered the process of ___ for business vetting of user-owned devices to be allowed access to company network resources.

on-boarding

Configuring clients for wireless access to an enterprise network is called _____.

onboarding

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

Wi-Fi analyzer

the term Wi-Fi stands for ____.

Wi-Fi does not stand for anything

Although there are many types of Wi-Fi security threats, this lesson did not cover which of the following?

Wireless Sniffing

Wildfilms Ltd), who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

Wireless range extender

Charlie Gordon is the new technician at Beekman University computer lab) He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

Wrong SSID

Which of the following wireless technologies does not use the 2.4 GHz band?

Z-Wave

The _____ is the first page a new client sees in the browser when connecting to a guest network.

captive portal

When two adjacent 20-MHz channels are combined to make a 40-MHz channel is called _____.

channel bonding

A type of rogue access point, an _____, can be used to trick a device into connecting to the wrong network by broadcasting the same SSID as the authorized network.

evil twin

To exchange information, two antennas must be tuned to the same ____.

frequency and channel

According to the lecture, all of the following are to be considered in the placement of an access point EXCEPT.

number of antennae

A device that can assess the quality of a wireless signal by scanning a band of frequencies for signals and noise is called a _____.

spectrum analyzer


संबंधित स्टडी सेट्स

Chapter 11 - How Home Ownership is Held

View Set

week 4 carmen quiz: correlation and regression

View Set

Chapter 11: Nutritional Assessment

View Set

Explorer Study Guide - John Cabot

View Set