Lesson 15

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An independent basic service set (IBSS) is also commonly referred to as which one of the following?

Ad hoc network.

Why would a wireless local area network (WLAN) administrator rarely see the "authenticated" step on the access point (AP)?

Because clients pass the authentication stage and immediately proceed into the association stage.

Which term describes the operation mode of a basic service set (BSS)?

Infrastructure mode.

What is a wireless local area network (WLAN) service set?

It describes the basic components of a fully operational WLAN.

Which one of the following power management modes populates a traffic indication map (TIM) in a basic service set (BSS) or extended service set (ESS)?

Power save polling (PSP) mode.

When connecting to a wireless local area network (WLAN), what is the most important point about the service set identifier (SSID)?

That the clients and all access points (AP) must be configured with matching SSIDS.

Why is shared key authentication considered a security risk in a WLAN?

The AP transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key.

As a subscriber enters a hotspot area, what signals their mobile wireless device of an available Wi-Fi network?

The access point (AP) queries all wifeless devices that come within range of their availability for connection.

How does a client locate a wireless local area network (WLAN) when performing passive scanning?

The client listens for beacons until it hears a beacon listing the service set identifier (SSID) of the network it expects to join.

In a segmented wireless local area network (WLAN) that has a different Internet protocol (IP) address for each segment, which solution allows mobile clients to maintain their connectivity when roaming into different segments?

To deploy all access points (AP) on a single virtual local area network (VLAN) using a flat IP subnet for all APs so that no change of IP address for roaming clients occurs and all traffic goes through a central controller.


Set pelajaran terkait

Intro to Criminal Justice Chapters 1-2

View Set

Econ 102 Exam 2 Chapter 6, 8, and 9

View Set

Chapter 1 Section 1: Native American World

View Set

Lewis Chapter 16: Fluid, Electrolyte, and Acid-Base Imbalances, Lewis

View Set