IS350 Exam 2

Ace your homework & exams now with Quizwiz!

What is the strongest security protocol for 802.11 today?

802.11i

What 802 Working Group creates Ethernet standards?

802.3

Frequency is measured in terms of _______.

Hertz (Hz)

Ethernet standards are specified at the __________ layer.

Physical (not internet)

NAT enhances security by _______.

Preventing sniffers from learning internal IP addresses

802.11i PSK initial authentication mode was created for ________

Residences with single access point

Wireless access points typically link wireless clients to _______.

Servers on the wired network

What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?

Shadow zones (dead zones)

Physical layer standards govern ________.

Signaling (with the answer choices of frames packets and all of these)

In 802.11i PSK mode, the pass phrase should be at least ____ characters long.

20

In the mask 255.255.255.0, how many 1s are there?

24

Which offers stronger security?

802.11i

NAT ______.

Both allows a firm to have more internal IP addresses and provides some security

802.11i provides ____

Both confidentiality and message integrity

Ethernet standards are specified at the __________ layer.

Both physical and data link

Physical layer standards govern ___________.

Both signaling and physical connectors

Which of the following is a risk in 802.11i PSK mode?

Both unauthorized sharing of the preshared key and A weak passphrase maybe selected

Trunk links connect switches to ___________ switches.

Core

What type of switch connects switches to other switches?

Core switches

802.11i 802.1X initial authentication mode was created for ___.

Corporations with multiple access points

The path a message takes from the source host to the destination device in an Ethernet network is a ____________.

Data Link

After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.

Different pairwise session keys

_______ is the official name for Ethernet addresses.

EUI-48

Ethernet addresses were formerly called ________ addresses.

MAC

_____ is a wireless network standard.

OSI

Wi-Fi normally uses a(n) _______.

Omnidirectional antenna

Ethernet forwarding devices are __________.

Switches

In the IPv4 address 1.2.3.4, what is the network part?

We cannot say.

Wi-Fi is a term used by the ________.

Wi-Fi Alliance

Which of the following IPv4 addresses would be used for Internet transmission?

128.171.x.x

If I simplify the address 2001:0ed2:056b:00d3:00c0:abcd:0bcd:0fe0, I get _____.

2001:ed2:56b:d3:c0:abcd:bcd:fe0

If a firm has many access points, it should use ________ initial authentication mode in 802.11i

802.1X

In what initial authentication mode of 802.11i is a central authentication server is used?

802.1X

Simple installation rules are sufficient to reduce propagation problems to nonissues in _____.

802.3

NAT _____.

Allows a firm to have more internal IP addresses (not reduces cost)

In a large company, you want _______.

As small a routing prefix as you can have

Nearly all public Wi-Fi hotspots encrypt your transmissions.

FALSE

For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so.

False

In a Wi-Fi LAN, wireless hosts generally send frames directly to one another?

False

In NAT, the _____ creates new external source IP addresses and port numbers.

Firewall

Ethernet messages are __________.

Frame

Wireless radio transmission speed is usually measured in terms of _____.

Frequency

Most wireless systems operate in the _____ range.

GHz (or MHz, not sure)

What organization (most specifically) creates Ethernet standards?

IEEE

Router sockets for wire and optical fiber cords are called ________.

Interfaces

Communication after authentication is protected most strongly if the ___ initial authentication is used.

It does not matter which initial authentication mode is used

In 802.1x initial authentication mode, the VERIFIER is the ________.

None of these

A local area network operates _______

On a customer premises

Ethernet standards are set at the ______.

Physical layer

The wifi alliance calls 802.11i ____

WPA2

Compared to wired transmission, propagation problems in radio transmissions are ______.

Worse

Which of the following is a private IP address range?

10.x.x.x

Express the mask /24 in dotted decimal notation

255.255.255.0

The total length of an IPv4 address is _____ bits.

32 bits

The network part of an IPv4 address is _____ bits long.

8 bits

We use the terms Wi-Fi and _______ interchangeably in this book

802.11

Wi-fi Standards come from the ____ Working Group.

802.11

If a signal has a strength of 100 mW at 10 meters, how strong will it be at 100 meters?

About 0.1

If the signal strength from an omnidirectional radio source is 100 mW at 10 meters, how strong will it be at 30 meters, ignoring absorptive attenuation?

About 11 mW

If a signal has a strength of 100 mW at 10 meters, how strong will it be at 40 meters?

About 6 mW

What propagation problem is especially bad in moist air?

Absorptive attenuation

__________links connect users to workgroup switches

Access

In 802.11i, protection is provided between the client and the ___

Access point

Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00

Ae00:00ff:feff:ff0

If another wireless device is near, but in an unknown direction, it is better to use ____.

An omnidirectional antenna

__________ links connect switches to other switches

Trunk

The protection of communication between a wireless client and the access point is ___

Link Security

The most serious problem with wireless transmission in WLANs is ____.

Multipath interference

_____ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

NAT

Ethernet standards are specified at the ___________ layer

Neither internet nor transport

If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________.

Neither still protected by a firewall nor still protected by encryption

In 802.11i ________, hosts must know a shared initial key.

PSK initial authentication mode

UDP is a standard for ____.

Packet delivery

After authentication in 80.11 PSK mode, a wireless client communicates with the access point via a(n) ___ key

Pairwise session

In digital signaling there is (are) ________ state(s).

Small number of

Which of the following is one of the three parts of an IPv4 address?

Subnet part

DNS is a ______ protocol.

Supervisory

For cost reasons, you should _____ where you can, _____ where you must.

Switch; route

Wireless network standards operate at _______.

The data link layer

TCP/IP standards are set at the ______.

Transport layer

In this book, we use the terms Ethernet and 802.3 interchangeably

True

In 802.1x initial authentication mode, the authenticator is the _____

Wireless access point

What type of switch connects users to the network?

Workgroup switches


Related study sets

Chapter 10: Exercise for Health and Fitness

View Set

GACE: Major American Authors & Summary of Works

View Set

Environmental Systems and Controls Final

View Set