Fundamentals Networking Tech Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many data streams are used in 802.11ac Wave 2 devices? a.2 data streams b.3 data streams c.8 data streams d.4 data streams

4 data streams

In an 802.11 data frame, what is the size of the frame check sequence field? a.8 bytes b.2 bytes c.4 bytes d.6 bytes

6 bytes

In an 802.11 data frame, what is the size of the frame check sequence field? a.8 bytes b.4 bytes c.6 bytes d.2 bytes

6 bytes

The wireless spectrum, as defined by the FCC, spans between which two frequencies? a.3 kHz and 500 GHz b.3 MHz and 300 GHz c.9 kHz and 300 GHz d.125 kHz and 150 GHz

9 kHz and 300 GHz

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions? a.Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM) b.Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) c.Carrier Sense Multiple Access with Collision Detection (CSMA/CD) d.Carrier Sense Single Access with Collision Adaptation (CSSA/CA)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions? a. Carrier Sense Single Access with Collision Adaptation (CSSA/CA) b. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) c. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) d. Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP. True False

False

Infrared technology utilizes an LED that emits light with shorter wavelengths than red light. True False

False

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. True False

False

The LLC sublayer is primarily concerned with managing MAC addresses in message frames. True False

False

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use? a.protocol analyzer b.Wi-Fi analyzer c.spectrum analyzer d.air scanner

Wi-Fi analyzer

Near-field communication devices send data at what fixed frequency? a.13.56 MHz b.8.65 MHz c.47.1 MHz d.21.39 MHz

13.56 MHz

In an 802.11 data frame, what is the maximum amount of data that can be sent? a.2312 bytes b.9000 bytes c.4582 bytes d.1500 bytes

2312 bytes

802.11ac Wave 2 devices can theoretically support how much maximum throughput? a.1.3 Gbps b.6.93 Gbps c.600 Mbps d.3.47 Gbps

3.47 Gbps

802.11ac Wave 2 devices can theoretically support how much maximum throughput? a.6.93 Gbps b.600 Mbps c.1.3 Gbps d.3.47 Gbps

3.47 Gbps

Which of the following statements regarding the 802.11ac standard is NOT accurate? a.802.11ac access points function more like a hub than a switch. b.802.11ac operates on the 5-GHz band. c.The standard was officially approved in early 2014. d.802.11ac access points can handle multiple transmissions at one time over the same frequency.

802.11ac access points function more like a hub than a switch.

Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters. True False

False

What optional protocol can be used in 802.11 to reserve the medium for one node's use? a.HA/RA (Hold Airtime/Reserved Airtime) b.RTS/CTS (Request to Send/Clear to Send) c.RAR/CTU (Reserve Airtime Request/Clear to Use) d.RT/FT (Request Time/Fair Time)

RTS/CTS (Request to Send/Clear to Send)

All wireless signals are carried through the air by electromagnetic waves. True False

True

An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet. True False

True

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack. True False

True

The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard. True False

True

The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively. True False

True

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following? a.modified service set b.extended service set c.generic service set d.basic service set

basic service set

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP? a.alert message b.beacon frame c.broadcast frame d.announcement packet

beacon frame

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP? a.announcement packet b.broadcast frame c.alert message d.beacon frame

beacon frame

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation? a.spread spectrum frequency hopping b.channel bonding c.frame aggregation d.multiple input-multiple output (MIMO)

multiple input-multiple output (MIMO)

A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points? a.association request b.ping frame c.probe frame d.beacon frame

probe frame

What type of device can be used to assess the quality of a wireless signal? a.frequency hopper b.Wi-Fi analyzer c.spectrum analyzer d.channel scanner

spectrum analyzer

What scenario describes an evil twin attack? a.A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents. b.An attacker is actively attempting to brute force the PIN of a WPS enabled access point. c.A hacker is actively sending wireless probes to discover available wireless networks. d.A malicious access point is configured with the SSID of a non-malicious public access point.

A malicious access point is configured with the SSID of a non-malicious public access point.

What scenario describes an evil twin attack? a.An attacker is actively attempting to brute force the PIN of a WPS enabled access point. b.A malicious access point is configured with the SSID of a non-malicious public access point. c.A hacker is actively sending wireless probes to discover available wireless networks. d.A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.

A malicious access point is configured with the SSID of a non-malicious public access point.

When troubleshooting wireless issues, what statement is accurate? a.A WPA key can be used to associate with a WEP configured access point. b.Access points that use overlapping channels can cause interference with each other if they are too close. c.Simultaneous wired and wireless network connections do not affect the ability to communicate on the network. d.Access point power levels should always be configured to output as much power as possible.

Access points that use overlapping channels can cause interference with each other if they are too close.

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m? a.Class X b.Class A c.Class 2 d.Class 1

Class 1

How does refraction affect the propagation of a wireless transmission? a.It causes the signal to be absorbed by the refracting material. b.It distorts the signal as it travels into and through a different transmission medium. c.It splits the signal into secondary waves that continue in the direction in which they split. d.It causes the signal to be returned back towards the source of the origin.

It distorts the signal as it travels into and through a different transmission medium.

When using RFID, what is an ARPT (Active Reader Passive Tag)? a.It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely. b.It is a tag that requires an active reader, but still contains a battery in the tag. c.It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission. d.It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.

It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

What is the purpose of the Layer 2 LLC sublayer? a.It is used to handle multiplexing, flow and error control, and reliability. b.It is used to manage low-level encryption on a network. c.It is used to manage MAC addresses in message frames. d.It performs management of the physical layer's modulation techniques.

It is used to handle multiplexing, flow and error control, and reliability.

At what layer of the OSI model do the 802.11 standards vary? a.Physical layer b.Network layer c.Transport layer d.Data link layer

Physical layer

You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network? a.The client is only able to get line of sight with an omnidirectional antenna. b.The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g. c.The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID. d.The client is using a network adapter with outdated firmware.

The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.

You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network? a. The client is using a network adapter with outdated firmware. b. The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g. c. The client is only able to get line of sight with an omnidirectional antenna. d. The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.

The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.

How does the 802.11 data frame indicate how a large packet should be fragmented? a.The frame check sequence dictates the calculated packet size. b.The sequence control field indicates how packets will be subdivided. c.The duration field determines how long the station can transmit a packet, which then determines how it is divided. d.It uses the preamble header to estimate the ideal packet size.

The sequence control field indicates how packets will be subdivided.

Diffraction has what affect on a wireless signal's propagation? a.The signal is returned back towards the source of the original signal. b.The signal is split into secondary waves that continue in the direction in which they split. c.The signal is completely absorbed by the diffracting material. d.The signal is redirected into multiple directions.

The signal is split into secondary waves that continue in the direction in which they split.

Healing messages are a feature of what smart home protocol? a.ZigBee b.Bluetooth c.ANT+ d.Z-Wave

Z-Wave

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of? a. WPA2-Enterprise b. captive portal c. browser hijacking d. guest network profile

captive portal

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames? a.control frames b.extended frames c.management frames d.data frames

control frames

In Linux, what command can be used for viewing and setting wireless interface parameters? a.wlanconf b.wifid c.iwconfig d.ifconfig

iwconfig

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? a.data frames b.management frames c.extended frames d.control frames

management frames


Set pelajaran terkait

Exam 2 MGMT 4363.501 Policy and Strategy

View Set

Chapter 28: Nursing Management- Lower Respiratory Problems

View Set

Chapter 22: America and the Great War, 1914-1920

View Set

Poli 130: Democratic Backsliding in Venezuela

View Set