CIS 321 Exam 2 Multiple Choice

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Wi-Fi, 2.4 GHz and 5 GHz refer _______.

....

What is the strongest security protocol for 802.11 today?

802.11i

What initial authentication mode does 802.11i use?

802.1X , PSK

The 802.11 standard has two mechanisms for media access control. One of the two, _________ is reliable, mandatory, and more efficient and faster.

CSMA/CA+ACK

A VPN provides __________.

End to end security

________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time.

Media access control

___________ have SSIDs.

Wireless access points

Wide bandwidth channels that permit high speed data transmission are known as __________ channels.

broadband

A security might use SNMP Get commands to ________ and SNMP Set commands to _______.

collect information to look for a rogue access point, change an access point's power

If Wi-Fi supported the basic printing profile, ________.

documents could be printed without downloading drivers

The most serious problem with wireless transmission in WLANs is ___________.

multipath interference

Wi-Fi direct ________ uses access points.

never

Wi-Fi normally uses a(n) ______.

omnidirectional antenna

Bluetooth uses __________ operation.

one to one

802.11i PSK initial authentication mode was created for ________ and 802.11i 802.1X initial authentication mode was created for ________.

residences with a single access point, corporations with multiple access points

A ________ is an unauthorized internal access point.

rogue

In general, the fewer the channels, __________.

the greater the likelihood of interference between access points

Which of the following is a risk in 802.11i PSK mode?

unauthorized sharing of the preshared key, a weak passphrase may be selected

In 802.1x initial authentication mode, the authenticator is the ________. A. wireless client

wireless access point

Which of the following is an ad hoc networking protocol?

zigbee and z-wave

_______ is among the most widely used 802.11 transmission standards used today and dominates Wi-Fi sales.

802.11ac

Spread spectrum transmission is used in WLANs because _________ and ___________.

It is required by regulators, is a reliable transmission

A group of devices on a desk that communicate wirelessly is called a ________.

PAN

Wireless access points typically link wireless clients to ________.

servers on the wired networks

What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?

shadow zones(dead zones)

WLANs normally use ____________ because they allow greater flexibility.

unlicensed bands

When two devices communicate using NFC, how close must they be?

a few inches

What propagation problem is especially bad in moist air?

absorptive attenuation

In 802.11i, protection, confidentiality, and message integrity are provided between the client and the ________.

access point

Site surveys should be done ___________.

after the initial provisional placement of access points, periodically afterwards

Which of the following is usually set up by a hacker outside the building?

an evil twin access point

In Bluetooth LE, ________ provide information.

beacons

Wireless radio transmission speed is usually measured in terms of ______ which is measured in terms of ______.

frequency, hertz

MIMO _____________.

increases transmission speed , increases transmission distance

IoT transmissions usually involve ________.

low transmission distances

Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band.

more bandwidth

The 60 GHz unlicensed service band offers ________ compared to lower-frequency service bands.

more speed per channel

What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?

5 MHz

Wi-Fi Standards come from the ________ Working Group.

802.11


Set pelajaran terkait

The Point and ATI Practice Quizzes

View Set