CIS 224 Unit 12 Check Your Understandings
4
How many address fields are in the 802.11 wireless frame? 2 3 4 5
13
How many channels are available for the 2.4 GHz band in Europe? 11 13 14 24
24
How many channels are available for the 5 GHz band? 11 13 14 24
False
True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks. True False
True
True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients. True False
False
True or False: DTLS is enabled by default on the control and data CAPWAP tunnels. True False
False
True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection. True False
False
True or False: When you need to expand the coverage of a small network, the best solution is to use a range extender. True False
IPv4 by default, but can configure IPv6
What IP versions does CAPWAP support? IPv4 only IPv6 only IPv4 by default, but can configure IPv6 IPv6 by default, but can configure IPv4
17 5246 5247
What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.) 17 136 5246 5247 802.11
136 5246 5247
What UDP ports and IP protocols are used by CAPWAP for IPv6? (Choose three.) 17 136 5246 5247 802.11
Authentication Encryption
What are the best ways to secure WLANs? (Choose two.) Authentication SSID cloaking Encryption MAC address filtering
Active
What is the term for an AP that does not send a beacon, but waits for clients to send probes? Active Infrastructure Ad hoc Passive
Passive
What is the term for an AP that openly advertises its service periodically? Active Infrastructure Ad hoc Passive
MITM
What type of attack is an "evil twin AP" attack? DoS MITM Wireless intruder Radio interference
802.11a 802.11ac
Which 802.11 standards exclusively use the 5 GHz radio frequency? (Choose 2) 802.11a 802.11g 802.11n 802.11ac 802.11ax
RC4
Which encryption method is used by the original 802.11 specification? AES TKIP AES or TKIP RC4
Omnidirectional
Which of the following antennas provide 360 degrees of coverage? Wireless NIC Directional Omnidirectional MIMO
Open
Which of the following authentication methods does not use a password shared between the wireless client and the AP? WEP WPA WPA2 WPA3 Open
WPA Personal WPA2 Personal
Which of the following authentication methods has the user enter a pre-shared password? (Choose two) Open WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise
Access point Switch Router
Which of the following components are integrated in a wireless home router? (Choose three.) Access point Switch Router Range extender
AES
Which of the following encryption methods uses CCMP to recognize if the encrypted and non-encrypted bits have been altered? RC4 TKIP AES
Autonomous AP
Which of the following is a standalone device, like a home router, where the entire WLAN configuration resides on the device? Range extender Autonomous AP Controller-based AP USB Wireless NIC
Bluetooth
Which of the following is an IEEE 802.15 WPAN standard that uses a device-pairing process to communicate? Cellular WiMAX Wi-Fi Bluetooth
Rogue AP
Which of the following is most likely NOT the source of a wireless DoS attack? Radio interference Improperly configured devices Rogue AP Malicious user
OFDMA
Which of the following modulation techniques is used in the new 802.11ax standard? DSSS FHSS OFDM OFDMA
FHSS
Which of the following modulation techniques rapidly switches a signal among frequency channels? DSSS FHSS OFDM OFDMA
DSSS
Which of the following modulation techniques spreads a signal over a larger frequency band? DSSS FHSS OFDM OFDMA
Packet acknowledgments and retransmissions Beacons and probe responses MAC layer data encryption and decryption Frame queueing and packet prioritization
In the split MAC architecture for CAPWAP, which of the following are the responsibility of the AP? (Choose four.) Authentication Packet acknowledgments and retransmissions Beacons and probe responses Association and re-association of roaming clients MAC layer data encryption and decryption Termination of 802.11 traffic on a wired interface Frame translation to other protocols Frame queueing and packet prioritization
Authentication Association and re-association of roaming clients Termination of 802.11 traffic on a wired interface Frame translation to other protocols
In the split MAC architecture for CAPWAP, which of the following are the responsibility of the WLC? (Choose four.) Authentication Packet acknowledgments and retransmissions Beacons and probe responses Association and re-association of roaming clients MAC layer data encryption and decryption Termination of 802.11 traffic on a wired interface Frame translation to other protocols Frame queueing and packet prioritization
In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. In connect mode, the WLC is reachable and performs all its CAPWAP functions.
Which of the following statements are true about modes of operation for a FlexConnect AP? (Choose two.) In connect mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. In standalone mode, the WLC is unreachable and the AP switches local traffic and performs client authentication locally. In connect mode, the WLC is reachable and performs all its CAPWAP functions. In standalone mode, the WLC is reachable and performs all its CAPWAP functions
WLAN
Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies? WPAN WLAN WMAN WWAN
WPAN
Which of the following wireless networks typically uses lower powered transmitters for short ranges? WPAN WLAN WMAN WWAN
ITU-R
Which standards organization is responsible for allocating radio frequencies? IEEE ITU-R Wi-Fi Alliance
Ad hoc
Which wireless topology mode is used by two devices to connect in a peer-to-peer network? Ad hoc Infrastructure Tethering