CCNA LAN Switching and Wireless Chapter 4

Ace your homework & exams now with Quizwiz!

Match the following. Use "not scored" to denote an unused option: __ A dictionary attack for password cracking __ An AP connected or enabled by an attacker to capture client data in transit. __ A series of cyclic disassociate commands that causes all clients in the BSS to disconnect __ A repeated flood of the BSS with clear-to-send frames to a bogus client A. spoofed disconnect DoS B. CTS flood DoS C. MITM

not scored C. MITM A. spoofed disconnect DoS B. CTS flood DoS

Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did? A. MITM B. SPS C. MIMO D. WPS

C. MIMO

Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability of 802.11 products? A. IEEE B. FCC C. ITU-R D. Wi-Fi Alliance

D. Wi-Fi Alliance

If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.) A. 1 B. 3 C. 5 D. 6 E. 8 F. 11

A. 1 D. 6 F. 11

Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.) A. 802.11b B. 802.11n C. 802.11ac D. 802.11a E. 802.11g

A. 802.11b B. 802.11n E. 802.11g

Which statement defines the control frame operation between two stations? A. After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.​ B. A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.​ C. If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection.​ D. A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.

A. After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.​

Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet? A. ESS B. BSS C. IBISS D. ad hoc WLAN E. WiFi Direct

A. ESS

What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate in a corporate environment? A. Some corporate AP models can operate in either autonomous mode or controller-based mode. B. Controller-based APs are used in the corporate environment, and they are server-dependent devices that require an initial configuration to operate. C. Autonomous APs are used only in the home environment, and they incorporate the functions of a router, switch, and AP into one device.​ D. Cisco corporate APs do not support PoE.

A. Some corporate AP models can operate in either autonomous mode or controller-based mode.

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation? A. rogue access point B. spoofing C. cracking D. denial of service

A. rogue access point

What is an advantage of SSID cloaking?​ A. It is the best way to secure a wireless network. B. Clients will have to manually identify the SSID to connect to the network.​ C. SSIDs are very difficult to discover because APs do not broadcast them.​ D. It provides free Internet access in public locations where knowing the SSID is of no concern.

B. Clients will have to manually identify the SSID to connect to the network.​

A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this? A. Change to WPA2 authentication. B. Deploy a Wi-Fi Range Extender. C. Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band. D. Upgrade the firmware on the AP.

B. Deploy a Wi-Fi Range Extender.

Which security mode is the least secure choice when a home wireless router is configured? A. WPA B. WEP C. WPA2-Personal D. WPA2

B. WEP

Which type of management frame may regularly be broadcast by an AP? A. authentication B. beacon C. probe response D. probe request

B. beacon

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms? A. Yagi B. omnidirectional C. directional D. dish

B. omnidirectional

For which discovery mode will an AP generate the most traffic on a WLAN? A. open mode B. passive mode C. active mode D. mixed mode

B. passive mode

What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment? A. It is used to send data over a half-duplex connection. B. It is used in a full-duplex environment to detect collisions. C. It allows a client to detect whether or not a channel is clear prior to transmission. D. It allows the client to change transmission channels.

C. It allows a client to detect whether or not a channel is clear prior to transmission.

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network? A. Disable DHCP on the access point and assign static addresses to the wireless clients. B. Replace the wireless NICs on the computers that are experiencing slow connections. C. Split the traffic between the 2.4 GHz and 5 GHz frequency bands. D. Upgrade the firmware on the wireless access point.

C. Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) A. RADIUS authentication server B. repeater C. access point D. WLAN controller E. Ethernet switch

C. access point E. Ethernet switch

A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point? A. data frame B. beacon frame C. management frame D. control frame

C. management frame

Launch PT Hide and Save PT Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the SSID of the connected network and which message is displayed in the browser window? A. SSID: Home-Network Message: Well done!​ B. SSID: Home-Network Message: Good job! C. SSID: Home-Net Message:Congratulations! You did it!​ D. SSID: Home-Net Message:Congratulations! You were able to connect it!

D. SSID: Home-Net Message:Congratulations! You were able to connect it!

During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP? A. encryption B. authentication C. discovery D. association E. probing

D. association

Match the following. Use "not scored" to denote an unused option: __ The client send a beacon frame to the AP. __ The AP sends a challenge text to the client. __ The AP authenticates the client. __ The client sends an authentication frame to the AP. __ The client encrypts the message. __ The client sends a challenge text to the AP. __ The AP decrypts the message. A. Step 1 B. Step 2 C. Step 3 D. Step 4 E. Step 5

not scored B. Step 2 E. Step 5 A. Step 1 C. Step 3 not scored D. Step 4

Fill in the blank. Do not use abbreviations. Ad hoc wireless topologies sometimes can use a feature called _________ to enable a smartphone to create a personal hotspot.

tethering


Related study sets

The Ill Child in the Hospital and Other Care Settings

View Set

Rocks and minerals for Science Olympiad

View Set

Organizational Behavior Chapter 8: Groups and Teams

View Set

202 Chapter 10 - Conflict and Negotiation in the Workplace

View Set

Earth Science - Lesson 6: Geological time (unit 2)

View Set

Maternity Ch. 27 Hypertensive Disorders

View Set

Chapter 19 Postoperative Nursing Management

View Set

Social Studies 7 Era of Reform Quiz

View Set