CompTIA Network+ Exam N10-007 Wireless Networking Quiz

Ace your homework & exams now with Quizwiz!

Bluetooth

A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called: • 802.11 • NFC • Bluetooth • Z-Wave

TKIP

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: • PEAP • TKIP • CCMP • WPA2

CSMA/CA

A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: • CWDM • CSMA/CD • CDMA • CSMA/CA

WLAN

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is known as: • MAN • WLAN • LAN • VLAN

Geofencing

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: • Geofencing • Quarantine network • Geolocation • GPS tagging

SSID

A unique WLAN identifier is commonly referred to as: • EUI • SSID • OUI • CNAME

Denial of Service (DoS) attack

A wireless disassociation attack is a type of: • Downgrade attack • Brute-force attack • Denial of Service (DoS) attack • Cryptographic attack

Infrastructure mode

A wireless networking topology consisting of at least one Access Point (AP) is referred to as: • IEEE 802.3at • Infrastructure mode • IEEE 802.3af • Ad hoc mode • Peer-to-peer mode

Ad hoc mode

A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called: • IEEE 802.3af • Star topology • Ad hoc mode • IEEE 802.3at • Infrastructure mode

SNR

A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: • BRI • SNR • RFI • SVC

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). • True • False

5.0 GHz 2.4 GHz

Frequency bands used by 802.11 networks include: (Select 2 answers) • 5.0 GHz • 5.4 GHz • 2.0 GHz • 2.4 GHz

IEEE 802.11n standard

In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the: • IEEE 802.11a standard • IEEE 802.11b standard • IEEE 802.11g standard • IEEE 802.11n standard • IEEE 802.11ac standard

War driving

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: • War chalking • Spoofing • War driving • Insider threat

Makes a WLAN harder to discover

Disabling SSID broadcast: • Is one of the measures used in the process of securing wireless networks • Makes a WLAN harder to discover • Blocks access to a WAP • Prevents wireless clients from accessing the network

True

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards. • True • False

True

Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. • True • False

20 MHz

The IEEE 802.11a standard specifies a channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz

160 MHz

The IEEE 802.11ac standard specifies a maximum channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz • 160 MHz

802.11b

The IEEE 802.11g standard is backwards compatible with: • 802.11n • 802.11a • 802.11b • 802.11ac

20 MHz

The IEEE 802.11g standard specifies a channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz

802.11g 802.11b 802.11a

The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) • 802.11g • 802.11ac • 802.11b • 802.11a

20 MHz 40 MHz

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) • 20 MHz • 22 MHz • 40 MHz • 80 MHz • 160 MHz

Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps

The characteristic features of the IEEE 802.11n wireless standard include: (Select all that apply) • Multiple Input / Multiple Output (MIMO) • Maximum data signaling rate of 54 Mbps • 2.4 GHz frequency band • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • 5.0 GHz frequency band • Multi-User Multiple Input / Multiple Output (MU-MIMO) • Maximum data signaling rate of up to 600 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed)

Wireless site survey

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: • Penetration testing • Wireless site survey • Vulnerability scanning • End user awareness and training

True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID) appears as a legitimate access point to connecting hosts. • True • False

Suitable for large corporate Requires RADIUS authentication server

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) • Suitable for large corporate networks • Does not require an authentication server • Suitable for all types of wireless LANs • Requires RADIUS authentication server

PSK

Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? • AES • PSK • RC4 • IKE

True

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. • True • False

True

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. • True • False

High signal latency Interference (weather dependent) Relatively high cost in comparison to terrestrial

What are the characteristic features of satellite Internet connections? (Select 3 answers) • High signal latency • Lack of signal interference • Cheaper in comparison to terrestrial links • Interference (weather dependent) • Low signal latency • Relatively high cost in comparison to terrestrial links

Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range

What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • Maximum data signaling rate of 54 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • 2.4 GHz frequency range • Maximum data signaling rate of 11 Mbps • 5.0 GHz frequency range

CCMP

What is the name of an AES-based encryption mode implemented in WPA2? • CCMP • ECB • CBC • TKIP

IEEE 802.11

Which IEEE standard provides the implementation basis for most modern WLANs? • IEEE 802.11 • IEEE 802.1x • IEEE 802.3 • IEEE 802.1q

Power level controls

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? • SSID broadcast • Power level controls • Maximum Transmission Unit (MTU) • Quality of Service (QoS)

Wireless LAN controller

Which network device enables centralized management of WAPs? • VPN concentrator • Load balancer • Multilayer switch • Wireless LAN controller

EAP-TLS

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? • EAP-TLS • PEAP • EAP-TTLS • EAP-FAST

Yagi antenna Dish antenna Parabolic antenna

Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) • Yagi antenna • Omnidirectional antenna • Dish antenna • Non-directional antenna • Parabolic antenna • Dipole antenna

Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers) • Maximum data signaling rate of 54 Mbps • 5.0 GHz frequency band • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • 2.4 GHz frequency band • Maximum data signaling rate of 11 Mbps • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method

TDMA

Which of the answers listed below refers to a channel access method used in 2G GSM networks? • CSMA/CA • TDMA • CSMA/CD • CDMA

22 MHz

Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? • 20 MHz • 22 MHz • 40 MHz • 80 MHz

Omnidirectional antenna

Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? • Omnidirectional antenna • Dish antenna • Unidirectional antenna • Yagi antenna

IR

Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls? • NFC • 802.3 • IR • Z-Wave

Z-Wave

Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? • FCoE • SDN • Z-Wave • SIEM

RC4

Which of the answers listed below refers to an encryption algorithm used in TKIP? • DES • 3DES • AES • RC4

1 6 11

Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? • 1 • 5 • 6 • 9 • 11

EAP-TLS

Which of the following EAP methods offers the highest level of security? • PEAP • EAP-FAST • EAP-TLS • EAP-TTLS

2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) • Maximum data signaling rate of 54 Mbps • 5.0 GHz frequency range • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • 2.4 GHz frequency range • Maximum data signaling rate of 11 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed)

CDMA

Which of the following answers refers to a channel access method used in 3G cellular networks? • CDMA • CSMA/CD • TDMA • CSMA/CA

ANT+

Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? • CAN • WTLS • UAV • ANT+

Multi-User MIMO (MU-MIMO

Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? • Multiple Input / Multiple Output (MIMO) • 40 MHz channel width • Multi-User MIMO (MU-MIMO) • Maximum data signaling rate of up to 600 Mbps

5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Multi-User Multiple Input / Multiple Output (MU-MIMO)

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) • Data signaling rate of up to 600 Mbps • 5.0 GHz frequency band • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • Maximum data signaling rate of up to 6.77 Gbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • Multi-User Multiple Input / Multiple Output (MU-MIMO) • 2.4 GHz frequency band

Dipole antenna Omnidirectional antenna

Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) • Unidirectional antenna • Dipole antenna • Yagi antenna • Omnidirectional antenna • Dish antenna

All of the above

Which of the following can be the source of RFI and cause disruptions in network connectivity? • Cordless phones • Fluorescent lights • Microwave ovens • Bluetooth devices • All of the above

WAP power level controls

Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? • Protocol analyzer • WAP power level controls • Logical network diagram • Network mapper

RFID

Which of the following wireless technologies enables identification and tracking of tags attached to objects? • WAF • RFID • GPS • WTLS

WPA2-PSK

Which of the following would be the best solution for securing a small network lacking an authentication server? • WPA-PSK • WPA2-Enterprise • WPA2-PSK • WPA-Enterprise

NFC

Which type of technology enables contactless payment transactions? • NFC • SDN • PED • WAP

True

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. • True • False

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. • True • False


Related study sets

ITA mezzi di trasporto, aggettivi

View Set

RADTC100: Ch. 17 - Infection Control

View Set

Topic 10: Reactions of Alkanes, alkenes, alcohols

View Set

APUSH Chapter 14 (Civil War; 1861 - 1865)

View Set