module 6 wireless networking
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11ax
What was the first 802.11 standard to implement channel bonding?
802.11n
Which standard adapted EAP to WLANs?
802.1x
Which of the following statements is true?
A Wi-Fi client connects to a range extender that connects to an AP.
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?
RSSI
Which off-boarding policy can protect proprietary corporate information if a smartphone is lost?
Remote wipe
You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?
Rogue AP
Which protocol replaced TKIP for WPA2?
CCMP
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
Which type of identifier allows wireless clients to roam freely from AP to AP?
ESSID
Which of the following statements is false?
Each Wi-Fi channel contains multiple frequency bands.
Which function of WPA/WPA2 security ensures data cannot be read in transit?
Encryption
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil twin
Which one of the following wireless transmission types requires a clear LOS to function?
IR(infrared)
Which problem would a low RSSI level indicate?
Insufficient wireless coverage
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 3
Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi?
Spectrum analyzer
Which Wi-Fi encryption standard was designed to use AES encryption?
WPA2
Which device on the network will require the greatest throughput capacity?
Wireless bridge
Which of the following wireless technologies does not use the 2.4 GHz band?
Z-Wave