chapter 6a
it is when a cable modem combines multiple channels to increase the amount of traffic that it can comfortably support
802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. what is channel bonding
bluesnarfing
a hacker takes advantage of an open bluetooth connection to send a virus to a user's smartphone. what kind of security breach has occurred
throughput
signal traveling through areas in which many wireless communications systems are in use will exhibit a lower __________ due to the higher proportion of noise
frequency
to exchange information, two antennas must be tuned to the same ____
layer 3
what is the lowest layer of then OSI model at which wired and wireless transmissions share the same protocols
the signal passes through or is absorbed by the object
when a wireless signal encounters a large obstacle, what happens to the signal?
802.11n
which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands
CSMA/CA
which carrier sense technology is used on wireless networks to reduce collisions
unidirectional antenna
which kind of antenna is used in a point to point link especially over long distances
infrared
which one of the following wireless transmission types requires a clear LOS to function
wireless networks use half duplex while wired networks use full duplex
why do wireless networks experience a greater reduction in throughput compared with wired networks
evil twin
you just settled in from some study time at the local coffee shop, and you pause long enough to connect your smartphone to the wifi so you can listen to some music while you study. a you sign in, you realize you clicked on an SSID called Free Coffee and Internet what kind of security trap did you almost fall for
make a guest network, portal page, and install DD-WRT on her home router
you're setting up a home network for your neighbor, who is a music teacher. she has students visiting her home regularly for lessons and wants to provide internet access for their parents while they're waiting on the children. however she's concerned about keeping her own data private. what wireless feature can you configure on her AP to meet her requests?
rogue AP
you've just completed a survey of the wireless signals traversing the airspace in you employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. what kind of threat do you need to report to your boss