Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which two statements characterize wireless network security? (Choose two.) Wireless networks offer the same security features as wired networks offer. Wireless guest mode provides open access to a protected LAN. With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. An attacker needs physical access to at least one network device to launch an attack.

-With SSID broadcast disabled, an attacker must know the SSID to connect. -Using the default IP address on an access point makes hacking easier.

What are three advantages of wireless over wired LAN technology? (Choose three.) -lower on-going costs -longer transmission distance -ease of installation -ease of expansion -higher level of security

-lower on-going costs -ease of installation -ease of expansion

Which type of network technology is used for low-speed communication between peripheral devices? Bluetooth Ethernet 802.11 channels

Bluetooth

Which type of networking technology is used to share an Internet connection wirelessly between two mobile devices? Ethernet Bluetooth cellular satellite

Bluetooth

Which type of device provides an Internet connection through the use of a phone jack? -cable modem -DSL modem -satellite modem -Wi-Fi AP

DSL modem

What type of device is commonly connected to the Ethernet ports on a home wireless router? -DSL modem -cable modem -wireless antenna -LAN device

LAN device

(QUESTION IS ON ANSWER SIDE) ------- C

Refer to the exhibit. Which router port connects to the modem provided by the service provider?

A user wants to connect to a wireless network at a shopping center. What wireless network setting tells the user the name of the network? -domain name -SSID -passphrase -hostname

SSID

What is CSMA/CA on a network? -an access method that is used by wireless technology to avoid duplicate SSIDs -an access method that is used by any technology that has excessive collisions -an access method that is used by wired Ethernet technology to avoid collisions -an access method that is used by wireless technology to avoid collisions

an access method that is used by wireless technology to avoid collisions

What are two types of wired high-speed Internet connections? (Choose two.) cable satellite cellular DSL dial-up

cable DSL

What wireless router configuration would stop outsiders from using your home network? -IP address -encryption -router location -network name

encryption

What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet? -MAC address filtering -guest SSID -encryption -authentication

guest SSID

What type of authentication do most access points use by default? -open -PSK -WEP -EAP

open

What purpose would a home user have for implementing Wi-Fi?​ -to hear various radio stations -to connect a keyboard to a PC -to connect wireless headphones to a mobile device -to create a wireless network usable by other devices

to create a wireless network usable by other devices

True or False? Most mobile devices have the ability to connect to a Wi-Fi network. true false

true

When is a client considered to be "authenticated" when using MAC address filtering to control network access to a wireless network? -when the client gives the access point the correct secret key -when the client sends the MAC address to the access point -when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client -when the access point sends the MAC address to the server and receives notification that the MAC address is a valid one

when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client


Set pelajaran terkait

ch. 14 optional homework accounting 2

View Set

NUR 240 EAQ - Management of Care

View Set

MGMT100 Human Relations Mid Term Week 5 Study Guide

View Set

Nursing Fundamentals - Exam 1 Remediation Assignment

View Set

Musculoskeletal Care Modalities questions

View Set

Executive Assistant Interview Questions

View Set

Honors Chemistry Semester 2 Final Exam

View Set

Dosage Calculation 3.0 Oral Medications Test

View Set

Java Chapter 11: Exceptions and Advanced File I/O

View Set