CIS 224 Unit 12 Check Your Understandings

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

4

How many address fields are in the 802.11 wireless frame? 2 3 4 5

13

How many channels are available for the 2.4 GHz band in Europe? 11 13 14 24

24

How many channels are available for the 5 GHz band? 11 13 14 24

False

True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks. True False

True

True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients. True False

False

True or False: DTLS is enabled by default on the control and data CAPWAP tunnels. True False

False

True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection. True False

False

True or False: When you need to expand the coverage of a small network, the best solution is to use a range extender. True False

IPv4 by default, but can configure IPv6

What IP versions does CAPWAP support? IPv4 only IPv6 only IPv4 by default, but can configure IPv6 IPv6 by default, but can configure IPv4

17 5246 5247

What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.) 17 136 5246 5247 802.11

136 5246 5247

What UDP ports and IP protocols are used by CAPWAP for IPv6? (Choose three.) 17 136 5246 5247 802.11

Authentication Encryption

What are the best ways to secure WLANs? (Choose two.) Authentication SSID cloaking Encryption MAC address filtering

Active

What is the term for an AP that does not send a beacon, but waits for clients to send probes? Active Infrastructure Ad hoc Passive

Passive

What is the term for an AP that openly advertises its service periodically? Active Infrastructure Ad hoc Passive

MITM

What type of attack is an "evil twin AP" attack? DoS MITM Wireless intruder Radio interference

802.11a 802.11ac

Which 802.11 standards exclusively use the 5 GHz radio frequency? (Choose 2) 802.11a 802.11g 802.11n 802.11ac 802.11ax

RC4

Which encryption method is used by the original 802.11 specification? AES TKIP AES or TKIP RC4

Omnidirectional

Which of the following antennas provide 360 degrees of coverage? Wireless NIC Directional Omnidirectional MIMO

Open

Which of the following authentication methods does not use a password shared between the wireless client and the AP? WEP WPA WPA2 WPA3 Open

WPA Personal WPA2 Personal

Which of the following authentication methods has the user enter a pre-shared password? (Choose two) Open WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise

Access point Switch Router

Which of the following components are integrated in a wireless home router? (Choose three.) Access point Switch Router Range extender

AES

Which of the following encryption methods uses CCMP to recognize if the encrypted and non-encrypted bits have been altered? RC4 TKIP AES

Autonomous AP

Which of the following is a standalone device, like a home router, where the entire WLAN configuration resides on the device? Range extender Autonomous AP Controller-based AP USB Wireless NIC

Bluetooth

Which of the following is an IEEE 802.15 WPAN standard that uses a device-pairing process to communicate? Cellular WiMAX Wi-Fi Bluetooth

Rogue AP

Which of the following is most likely NOT the source of a wireless DoS attack? Radio interference Improperly configured devices Rogue AP Malicious user

OFDMA

Which of the following modulation techniques is used in the new 802.11ax standard? DSSS FHSS OFDM OFDMA

FHSS

Which of the following modulation techniques rapidly switches a signal among frequency channels? DSSS FHSS OFDM OFDMA

DSSS

Which of the following modulation techniques spreads a signal over a larger frequency band? DSSS FHSS OFDM OFDMA

Packet acknowledgments and retransmissions Beacons and probe responses MAC layer data encryption and decryption Frame queueing and packet prioritization

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the AP? (Choose four.) Authentication Packet acknowledgments and retransmissions Beacons and probe responses Association and re-association of roaming clients MAC layer data encryption and decryption Termination of 802.11 traffic on a wired interface Frame translation to other protocols Frame queueing and packet prioritization

Authentication Association and re-association of roaming clients Termination of 802.11 traffic on a wired interface Frame translation to other protocols

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the WLC? (Choose four.) Authentication Packet acknowledgments and retransmissions Beacons and probe responses Association and re-association of roaming clients MAC layer data encryption and decryption Termination of 802.11 traffic on a wired interface Frame translation to other protocols Frame queueing and packet prioritization

In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. In connect mode, the WLC is reachable and performs all its CAPWAP functions.

Which of the following statements are true about modes of operation for a FlexConnect AP? (Choose two.) In connect mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. In connect mode, the WLC is reachable and performs all its CAPWAP functions. In standalone mode, the WLC is reachable and performs all its CAPWAP functions

WLAN

Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies? WPAN WLAN WMAN WWAN

WPAN

Which of the following wireless networks typically uses lower powered transmitters for short ranges? WPAN WLAN WMAN WWAN

ITU-R

Which standards organization is responsible for allocating radio frequencies? IEEE ITU-R Wi-Fi Alliance

Ad hoc

Which wireless topology mode is used by two devices to connect in a peer-to-peer network? Ad hoc Infrastructure Tethering


Set pelajaran terkait

PSY 350 Michael Varnum ASU Exam 1 Review

View Set

Chapter 17 practice test biology

View Set

finance 310 multiple choice exam 1

View Set

Fundamentos de marketing: Cap 12

View Set

Тема 11. Система видатків бюджету та кошторисне фінансування бюджетних установ

View Set