CTS1134 - Ch. 6 Wireless Networking

Ace your homework & exams now with Quizwiz!

When using RFID, what is an ARPT(Active Reader Passive Tag)?

It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission

When using RFID, what is an ARPT (Active Reader Passive Tag)?

It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

What is the purpose of the Layer 2 LLC sublayer?

It is used to handle multiplexing, flow and error control, and reliability.

What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?​

1.3 Gbps

By default, the pathping command sends how many pings per hop?​

100

Near-field communication devices send data at what fixed frequency?

13.56 MHz

In an 802.11 data frame, what is the maximum amount of data that can be sent?

2312 bytes

802.11ac Wave 2 devices can theoretically support how much maximum throughput?

3.47 Gbps

Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds?​

300 feet

How many data streams are used 802.11ac Wave 2 devices?

4 data streams

How many data streams are used in 802.11ac Wave 2 devices?

4 data streams

How many data streams are used in 802.11ac Wave 2 devices?​

4 data streams

Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:​

5.9 GHz

In an 802.11 data frame, what is the size of the frame check sequence field?

6 bytes

What is the maximum theoretical throughput of 802.11n?​

600 Mbps

Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?​

802.11ac

Which of the following statements regarding the 802.11ac standard is NOT accurate?

802.11ac access points function more like a hub than a switch.

The wireless spectrum, as defined by FCC, spans between which two frequencies?

9 kHz and 300 GHz

The wireless spectrum, as defined by the FCC, spans between which two frequencies?

9 kHz and 300 GHz

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious public access point

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious public access point.

Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal?

All of the above

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

Channel bonding

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

Class 1

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100m?

Class 1

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?​

Control frames

​What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?

Diffraction

Select the component of enterprise level structured cabling that serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling:

Entrance Facility

A CSSID is an installation configuration variable for an AP

False

All wireless signals are carried through fiber cable by electromagnetic waves.

False

An ad hoc arrangement would work well for a WLAN with many users.

False

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

False

MAC layer frame subtypes: management frames, control frames, security frames, and data frames

False

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. (T/F)

False

The 802.11 data frame contains two address fields

False

The LLC sublayer is primarily concerned with managing MAC addresses in message frames.

False

Wireless Topologies: Ad hoc, Infrastructure, Star-Bus, and Mesh

False

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

Wi-Fi Analyzer

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

Wi-Fi analyzer

Select below the network topology that is not a valid wireless network topology:​

bus

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

control frames

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?​

control frames

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

multiple input-multiple output (MIMO)

A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?

probe frame

What type of device can be used to access the quality of a wireless signal?

spectrum analyzer

What type of device can be used to assess the quality of a wireless signal?

spectrum analyzer

How does the 802.11 data frame indicate how a large packet should be fragmented?​

the sequence control field indicates how packets will be subdivided.

All wireless signals are carried through the air by electromagnetic waves.

true

An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.

true

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

true

The Wireless Personal Area Network(WPAN) is defined in the 802.15 standard.

true

The most secure Wi-Fi communication is made possible by combing a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.

true

In an 802.11 data frame, what is the size of the frame check sequence field?​

​6 bytes (frame check sequence field)

Which 802.11 standard was the first to utilize the 5 GHz band?​

​802.11a

How does the 802.11 data frame indicate how a large packet should be fragmented?​

​The sequence control field indicates how packets will be subdivided

what is the purpose of the Layer 2 LLC sublayer?

It is used to handle multiplexing, flow and error control, and reliability.

​At what layer of the OSI model would a TCP or UDP header be added to a payload?

Layer 4

What type of routing protocol enables routers to communicate beyond neighboring routers, allowing each router to create a map of an entire network?​

Link State

This 802.11n innovation increases the throughput and range of an access point by using more than one antenna to transmit.

MIMO

Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?​

MIMO

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

MIMO (Multiple Input Multiple Output)

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

Management Frames

____ signals follow a number of different paths to their destination because of reflection, diffraction, and scattering.

Multipath

An unauthorized access point is known as a rogue access point

True

Antennas are used for both the transmission and reception of wireless signals.

True

MU-MIMO allows multiple antennas to serve multiple clients simultaneously

True

Multipath signaling is a significant cause of fading. (T/F)

True

Multipath signaling is a significant cause of fading.​

True

On-boarding is installing an agent on a user's device which gives trusted access to portions of the network

True

The WPS PIN is vulnerable to brute force attacks. (T/F)

True

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

True

The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.

True

Two address fields related to the AP are the transmitter and receiver addresses

True

With 802.11ac a A-MPDU maximum frame size is 4,692,480 bytes

True

A wireless controller is used to initially configure the APs in a mesh network and could optionally manage the APs

True

All wireless signals are carried through the air by electromagnetic waves.

True

A remote wipe will clear a wireless device of all important information

True

When troubleshooting wireless issues, what statement is accurate?

Access points that use overlapping channels can cause interference with each other if they are too close.

In IEEE terminology, a group of stations that share an access point are said to be part of what option below?

Basic service set

Select below the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point:

Beacon Frame

In the 802.11 standard, IEEE specifies what type of access method?

CSMA/CA

Which type of multiplexing is defined by wavelength instead of frequency?​

CWDM

Which of the following techniques help to reduce overhead in 802.11n wireless transmission?

Frame aggregation

​Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?

Half-Duplex

How does refraction affect the propagation of a wireless transmission?

It distorts the signal as it travels into and through a different transmission medium.

How does refraction affect the propagation of a wireless transmission?

It distorts the signals as it travels into and through a different transmission medium.

How will clients obtain the SSID if the SSID broadcast is disabled on your wireless router?

It has to be provided to them

which of the following is not true about multipath signaling? A. The more obstacles a wireless signal reflects or diffracts off, the better chance it has of reaching its destination. B. Multipath signaling uses less energy and results in clearer reception than line-of-sight signaling. C. Given that they follow multiple paths to their destination, signals will arrive at the same destination at slightly different times. D. The more obstacles between a wireless transmitter and receiver, the more signal fading will occur.

Multipath signaling uses less energy and results in clearer reception than line- of-sight signaling.

At what layer of the OSI model do the 802.11 standards vary?

Physical

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

RTS/CTS (Request to Send/Clear to Send)

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

RTS/CTS(Request to Send/Clear to Send)

What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?​

Scattering

Your wireless station detects more than one access point. Which of the factors will it use to determine the access point it will attempt association with?

Signal strength

If your wireless stations are configured to perform passive scanning, what do they need from an access point to initiate association?

The beacon frame

You are troubleshooting client's wireless networking issue. Which of the following will prevent the client from connecting to the network?

The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID

You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?

The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.

How does the 802.11 data frame indicate how a large packet should be fragmented?

The sequence control field indicates how packets will be subdivided.

Diffraction has what affect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split

Diffraction has what affect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split.

Your laptop has its wireless NIC on, has wireless protocols running and is using active scanning. Which action will the device take to find access points?

Transmit a probe frame

A heat map is a feature that maps Wi-Fi signals and other noise in an area and can also pinpoint gaps in coverage

True

A lightweight wireless protocol is used for centralized wireless management

True

Healing messages are a feature of what smart home protocol?

Z-wave

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?

basic service set

What special signal is issued periodically from a AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

beacon frame

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

beacon frame

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

captive portal

​What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?

diffraction

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

false

Infrared technology utilizes an LED that emits light with shorter wavelengths than red light.

false

NFC tags are expensive and cannot be purchased blank, requiring them to be pre-loaded.

false

The LLC sublayer is primarily concerned with managing MAC addresses in message frames.

false

Z-wave transmission have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.

false

In ____ wireless systems, the transmitting antenna focuses its energy directly toward the receiving antenna which results in a point-to-point link.

fixed

In Linux, what command can be used for viewing and setting wireless interface parameters?

iwconfig

Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?​

iwconfig

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

management frames


Related study sets

Verbs | Cancel / Bring / Catch / Increase / Look for / Order / Borrow

View Set

Environmental Science Unit 6 Progress Check: MCQ Part A

View Set

Genetics Chapter 6 Review Questions

View Set