CompTIA Network+ Exam N10-007 Wireless Networking Quiz

Ace your homework & exams now with Quizwiz!

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? • EAP-TLS • PEAP • EAP-TTLS • EAP-FAST

EAP-TLS

Which of the following EAP methods offers the highest level of security? • PEAP • EAP-FAST • EAP-TLS • EAP-TTLS

EAP-TLS

A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called: • 802.11 • NFC • Bluetooth • Z-Wave

Bluetooth

Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? • 1 • 5 • 6 • 9 • 11

1 6 11

The IEEE 802.11ac standard specifies a maximum channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz • 160 MHz

160 MHz

Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) • Maximum data signaling rate of 54 Mbps • 5.0 GHz frequency range • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • 2.4 GHz frequency range • Maximum data signaling rate of 11 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed)

2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

The IEEE 802.11a standard specifies a channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz

20 MHz

The IEEE 802.11g standard specifies a channel bandwidth of: • 20 MHz • 22 MHz • 40 MHz • 80 MHz

20 MHz

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) • 20 MHz • 22 MHz • 40 MHz • 80 MHz • 160 MHz

20 MHz 40 MHz

Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? • 20 MHz • 22 MHz • 40 MHz • 80 MHz

22 MHz

Frequency bands used by 802.11 networks include: (Select 2 answers) • 5.0 GHz • 5.4 GHz • 2.0 GHz • 2.4 GHz

5.0 GHz 2.4 GHz

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) • Data signaling rate of up to 600 Mbps • 5.0 GHz frequency band • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • Maximum data signaling rate of up to 6.77 Gbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • Multi-User Multiple Input / Multiple Output (MU-MIMO) • 2.4 GHz frequency band

5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Multi-User Multiple Input / Multiple Output (MU-MIMO)

The IEEE 802.11g standard is backwards compatible with: • 802.11n • 802.11a • 802.11b • 802.11ac

802.11b

The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) • 802.11g • 802.11ac • 802.11b • 802.11a

802.11g 802.11b 802.11a

Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? • CAN • WTLS • UAV • ANT+

ANT+

A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called: • IEEE 802.3af • Star topology • Ad hoc mode • IEEE 802.3at • Infrastructure mode

Ad hoc mode

Which of the following can be the source of RFI and cause disruptions in network connectivity? • Cordless phones • Fluorescent lights • Microwave ovens • Bluetooth devices • All of the above

All of the above

What is the name of an AES-based encryption mode implemented in WPA2? • CCMP • ECB • CBC • TKIP

CCMP

Which of the following answers refers to a channel access method used in 3G cellular networks? • CDMA • CSMA/CD • TDMA • CSMA/CA

CDMA

A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: • CWDM • CSMA/CD • CDMA • CSMA/CA

CSMA/CA

A wireless disassociation attack is a type of: • Downgrade attack • Brute-force attack • Denial of Service (DoS) attack • Cryptographic attack

Denial of Service (DoS) attack

Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) • Unidirectional antenna • Dipole antenna • Yagi antenna • Omnidirectional antenna • Dish antenna

Dipole antenna Omnidirectional antenna

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: • Geofencing • Quarantine network • Geolocation • GPS tagging

Geofencing

What are the characteristic features of satellite Internet connections? (Select 3 answers) • High signal latency • Lack of signal interference • Cheaper in comparison to terrestrial links • Interference (weather dependent) • Low signal latency • Relatively high cost in comparison to terrestrial links

High signal latency Interference (weather dependent) Relatively high cost in comparison to terrestrial

Which IEEE standard provides the implementation basis for most modern WLANs? • IEEE 802.11 • IEEE 802.1x • IEEE 802.3 • IEEE 802.1q

IEEE 802.11

In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the: • IEEE 802.11a standard • IEEE 802.11b standard • IEEE 802.11g standard • IEEE 802.11n standard • IEEE 802.11ac standard

IEEE 802.11n standard

Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls? • NFC • 802.3 • IR • Z-Wave

IR

Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers) • Maximum data signaling rate of 54 Mbps • 5.0 GHz frequency band • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • 2.4 GHz frequency band • Maximum data signaling rate of 11 Mbps • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method

Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

A wireless networking topology consisting of at least one Access Point (AP) is referred to as: • IEEE 802.3at • Infrastructure mode • IEEE 802.3af • Ad hoc mode • Peer-to-peer mode

Infrastructure mode

Disabling SSID broadcast: • Is one of the measures used in the process of securing wireless networks • Makes a WLAN harder to discover • Blocks access to a WAP • Prevents wireless clients from accessing the network

Makes a WLAN harder to discover

What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • Maximum data signaling rate of 54 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed) • 2.4 GHz frequency range • Maximum data signaling rate of 11 Mbps • 5.0 GHz frequency range

Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range

Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? • Multiple Input / Multiple Output (MIMO) • 40 MHz channel width • Multi-User MIMO (MU-MIMO) • Maximum data signaling rate of up to 600 Mbps

Multi-User MIMO (MU-MIMO

The characteristic features of the IEEE 802.11n wireless standard include: (Select all that apply) • Multiple Input / Multiple Output (MIMO) • Maximum data signaling rate of 54 Mbps • 2.4 GHz frequency band • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method • 5.0 GHz frequency band • Multi-User Multiple Input / Multiple Output (MU-MIMO) • Maximum data signaling rate of up to 600 Mbps • Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method (Missed)

Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps

Which type of technology enables contactless payment transactions? • NFC • SDN • PED • WAP

NFC

Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? • Omnidirectional antenna • Dish antenna • Unidirectional antenna • Yagi antenna

Omnidirectional antenna

Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? • AES • PSK • RC4 • IKE

PSK

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? • SSID broadcast • Power level controls • Maximum Transmission Unit (MTU) • Quality of Service (QoS)

Power level controls

Which of the answers listed below refers to an encryption algorithm used in TKIP? • DES • 3DES • AES • RC4

RC4

Which of the following wireless technologies enables identification and tracking of tags attached to objects? • WAF • RFID • GPS • WTLS

RFID

A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: • BRI • SNR • RFI • SVC

SNR

A unique WLAN identifier is commonly referred to as: • EUI • SSID • OUI • CNAME

SSID

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: • Penetration testing • Wireless site survey • Vulnerability scanning • End user awareness and training

Wireless site survey

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) • Suitable for large corporate networks • Does not require an authentication server • Suitable for all types of wireless LANs • Requires RADIUS authentication server

Suitable for large corporate Requires RADIUS authentication server

Which of the answers listed below refers to a channel access method used in 2G GSM networks? • CSMA/CA • TDMA • CSMA/CD • CDMA

TDMA

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: • PEAP • TKIP • CCMP • WPA2

TKIP

Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) • Yagi antenna • Omnidirectional antenna • Dish antenna • Non-directional antenna • Parabolic antenna • Dipole antenna

Yagi antenna Dish antenna Parabolic antenna

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. • True • False

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). • True • False

True

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards. • True • False

True

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. • True • False

True

Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. • True • False

True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID) appears as a legitimate access point to connecting hosts. • True • False

True

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. • True • False

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. • True • False

True

Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? • Protocol analyzer • WAP power level controls • Logical network diagram • Network mapper

WAP power level controls

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is known as: • MAN • WLAN • LAN • VLAN

WLAN

Which of the following would be the best solution for securing a small network lacking an authentication server? • WPA-PSK • WPA2-Enterprise • WPA2-PSK • WPA-Enterprise

WPA2-PSK

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: • War chalking • Spoofing • War driving • Insider threat

War driving

Which network device enables centralized management of WAPs? • VPN concentrator • Load balancer • Multilayer switch • Wireless LAN controller

Wireless LAN controller

Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? • FCoE • SDN • Z-Wave • SIEM

Z-Wave


Related study sets

Biostatistics Diagnostic Accuracy

View Set

(PrepU) Chapter 40: Management of Patients with Gastric and Duodenal Disorders

View Set

Health Promotion Strategies & Interventions Pt#1

View Set

CS 482 - Artificial Intelligence!

View Set

The Thirteen Colonies and the British Empire (1607-1754)

View Set