Wireless_chp6_Communication for wireless Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

OFDM 6, 9, 12, 18, 24, 36, 48 Mbps

802.11a uses what type of technology? What are the data rates?

VHT-OFDM up to 6.93Gbps

802.11ac uses what type of technology? what are the data rates?

HR/DSSS 1, 2, 5.5, 11 Mbps

802.11b uses what type of Technology? What are the data rates?

ERP-OFDM 6, 9, 12, 18, 24, 36, 48 Mbps

802.11g uses what type of technology? What are the data rates?

false, max limit of 32 characters

True or False? The SSID is case sensitive, must consist of at least one ASCII character, and has a maximum limit of 16 characters

False, must be on the same channel

True or false? IBSS can communicate with devices on alternate channels.

authentication & success

Two authentication frames are sent during this process. It is not a request and response situation; it is ____ and ____.

extended service set (ESS)

Two basic service sets connected by a common distribution system, make an ___ ____ ____.

C. 802.11a client devices

WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch

Easy to configure No AP needed

What are some of the advantages of IBSS network?

Limited RF Range & Interference No Centralized Administration Capability Not Scalable Difficult to Secure

What are some of the disadvantages of IBSS network?

Incurs additional hardware costs compared to IBSS. Usually will require a site survey Must be connected to a network infrastructure Requires additional knowledge for configuration and deployment.

What are some of the disadvantages of using BSS network?

Uses Intelligent devices Useful in all scaling SOHO to large business Centralized administration and control

What are the advantages of using BSS?

SSID RF Channel Security configuration

What are the three common parameters set on devices that belong to the same IBSS?

Control frames

What frame is used to request data from the access point after returning from a power save state?

Management Frames

What frames never crosses the Data Link Layer (Layer2)?

Wireless mesh DS

What type of DS is in this image?

Passive scanning

What type of scanning method is in this image?

BSS

What type of set is provided in this image? IBSS BSS ESS

B. Passive scanning

When a WLAN device listens for beacon frames, it is participating in which phase? A. Power save B. Passive scanning C. Active scanning D. Authentication

FHSS & DSSS 1&2 Mbps

802.11 uses what technology? What are the data rates?

HT-OFDM Up to 600 mbps

802.11n uses what type of technology? what are the data rates?

translational bridge

A ____ ____ is defined as a device used to connect two or more dissimilar types of LANs together, such as wireless (IEEE 802.11) and ethernet (IEEE 802.3).

B. At least one

A basic service set (BSS) consists of how many access points? A. Zero B. At least one C. At least two D. At least four

A. AP radio

A basic service set identifier (BSSID) is the unique identifying MAC address of the _____. . A. AP radio B. AP Ethernet port C. Router D. Client

C. Management

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame? A. Data B. Control C. Management D. Detail

C. 32

A service set identifier (SSID) has a maximum limit of how many characters or octets? A. 8 B. 16 C. 32 D. 128

A. One or more

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets? A. One or more B. Two or more C. Three or more D. Four or more

Independent basic service set (IBSS) Ad Hoc Peer-to-peer

An IBSS is usually identified by what three terms?

IBSS

An ____ network is also known as an ad hoc or peer-to-peer network.

beacon

An example of a management frame that works in the discovery phase or passive scanning is a ____ frame.

A. 0

An independent basic service set (IBSS) consists of how many access points? A. 0 B. 1 C. 2 D. 4

A. Data rate decreases

As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases

10

By default, beacons for most access points broadcast at about ____ times a second.

4

How many authentication frames are used in shared-key authentication?

association

IEEE 802.11 _____ takes place after a wireless device has been successfully 802.11 authenticated either by open system authentication or by shared-key authentication.

robust security network (RSN).

IEEE 802.11 open system authentication is the only valid authentication process allowed with newer WLAN security amendments and interoperability certifications for the network to be considered a ____ ____ ____

ad hoc or infrastructure mode

IEEE 802.11 wireless LANs (WLANs) can be configured in one of two operation methods/modes: ____ or ____

6,933.3 / 6.93

IEEE 802.11ac access point advertises a maximum aggregate signaling rate of up to ____ Mbps (____ Gbps)

distribution system (DS)

In WLAN technology, the ____ ____ is the common network infrastructure to which wireless access points are connected; it can be wired or wireless mesh.

probe

In active scanning, WLAN devices wishing to connect to a network send out a management frame known as a ____ request.

B. Authenticate, associate

In order for a wireless client to become completely part of the basic service set, it must first _____ and then _____. A. Associate, authenticate B. Authenticate, associate C. Deauthenticate, authenticate D. Disassociate, authenticate

A. SSID & C. Channel

In order to set up an ad hoc network, a user must know which two parameters? (Choose two.) A. SSID B. BSSID C. Channel D. MAC address E. Protection mode

8.1

Microsoft Windows operating systems after version _____ no longer allow for an ad hoc network to be created from the graphical user interface.

No coverage after pg239

No coverage after pg239

closed network

SSID hiding is also known as a _____ _____

A. Authentication

The IEEE 802.11 association process happens after which phase? A. Authentication B. Distribution C. Deauthentication D. Reauthentication

antenna & RF

The RF area of coverage, known as the basic service area (BSA), depends on several factors, such as the ____ gain and ____ output power settings.

distribution System (DS)

The ____ ____ is a network segment that consists of one or more connected basic service sets.

service set identifier (SSID)

The ____ _____ _____ is a common parameter used in all WLAN operation configurations.

BSSID

The ____ is defined as the unique identifier, Media Access Control (MAC) address of the basic service set.

SSID

The ____ is the logical name of the service set used to identify the wireless network.

distribution system (DS)

The access points are connected by a common medium known as the ____ _____.

B. Mismatched SSID

The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association

passive

The first part of the discovery phase in IEEE 802.11 wireless networking is known as ____ scanning.

frames

The information traveling through the air is organized into what are known as _____.

C. Active mode

The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode

B. Two

The open system authentication process uses how many frames? A. One B. Two C. Three D. Four

B. Roaming

The process in which a WLAN client connection moves from one access point to another is called _____ . A. Reauthentication B. Roaming C. Rebuilding D. Roving

data rate

The speed at which wireless devices are designed to exchange information is known as the _____ _____.

QoS

There is also a variant of the null frame called the ____ null frame,

Management Frame

These are all examples of what type of frame? ■■ Beacon ■■ Probe request ■■ Probe response ■■ Authentication ■■ Association request ■■ Association response

Data Frame

These are all examples of what type of frame? ■■ Data ■■ QoS data ■■ Null data

Control Frame

These are all examples of what type of frame? ■■ RTS ■■ CTS ■■ CTS to Self ■■ PS-Poll ■■ ACK

Deauthentication & Disassociation

These are notifications, NOT request.

IBSS

This WLAN operation mode uses no access points and consists of only wireless devices or client computers.

Basic Service Set (BSS)

This mode consists of an access point connected to a network infrastructure and its associated wireless devices.

True

True or False? Because WEP is mandatory with IEEE 802.11 shared-key authentication, it makes a system vulnerable to intrusion.

True

True or False? For infrastructure devices such as access points, the SSID parameter is manually set on the access point.

True

True or False? Some devices allow for multiple SSIDs, which use multiple BSSIDs for a single radio.

True

True or False? The BSS consisting of one access point is a common implementation in many homes, SOHO, or small to medium businesses (SMBs).

True

True or False? The IEEE 802.11 standard requires all access points to respond to a broadcast probe request that contains a null SSID value.

B. Independent

When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set? A. Active B. Independent C. Passive D. Infrastructure

A. 32 characters maximum C. Is case sensitive

Which items describe a service set identifier (SSID)? (Choose two.) A. 32 characters maximum B. 64 characters maximum C. Is case sensitive D. Is not case sensitive

centralized control & security management

With IBSS networks, there is no ____ ____ and no ____ _____ features.

BSS

With a ____ setup, each access point is connected to a distribution system.

C. ERP protection

You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection

C. Dynamic rate switching

You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term? A. Dynamic frequency selection B. Transmit power control C. Dynamic rate switching D. Transmit save mode

Data

____ frames are used to carry data payload or Layer 3 information between wireless devices.

Control

____ frames are used to control access to the wireless medium by allowing devices to the medium and acknowledge data.

Management

____ frames are used to manage the network.

Authentication

____ in general is defined as verifying or confirming an identity.

Deauthentication

____ occurs when an existing authentication is no longer valid.

Wireless network discovery

_____ _____ _____ is the process of a client device scanning for wireless networks and identifying the parameters of the network, including the SSID, supported data rates, and security settings.

Disassociation

_____ occurs when an association to an access point is terminated.

Independent basic service set (IBSS) Basic service set (BSS) Extended service set (ESS)

ad hoc mode and infrastructure mode can be broken down into the what three different configuration sets?

Extended Service Set (ESS)

set of one or more interconnected basic service sets (BSSs) that appears as a single BSS to the Logical Link Control (LLC) layer at any station (STA) associated with one of those BSSs.


संबंधित स्टडी सेट्स

Grow Your Business with Google Ads: Module 1

View Set

5.1.7 Security Pro Practice Questions

View Set

CDO 750, Lecture 8-- Perception of Loudness & Intensity Discrimination

View Set