IS350 Exam 2
What is the strongest security protocol for 802.11 today?
802.11i
What 802 Working Group creates Ethernet standards?
802.3
Frequency is measured in terms of _______.
Hertz (Hz)
Ethernet standards are specified at the __________ layer.
Physical (not internet)
NAT enhances security by _______.
Preventing sniffers from learning internal IP addresses
802.11i PSK initial authentication mode was created for ________
Residences with single access point
Wireless access points typically link wireless clients to _______.
Servers on the wired network
What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?
Shadow zones (dead zones)
Physical layer standards govern ________.
Signaling (with the answer choices of frames packets and all of these)
In 802.11i PSK mode, the pass phrase should be at least ____ characters long.
20
In the mask 255.255.255.0, how many 1s are there?
24
Which offers stronger security?
802.11i
NAT ______.
Both allows a firm to have more internal IP addresses and provides some security
802.11i provides ____
Both confidentiality and message integrity
Ethernet standards are specified at the __________ layer.
Both physical and data link
Physical layer standards govern ___________.
Both signaling and physical connectors
Which of the following is a risk in 802.11i PSK mode?
Both unauthorized sharing of the preshared key and A weak passphrase maybe selected
Trunk links connect switches to ___________ switches.
Core
What type of switch connects switches to other switches?
Core switches
802.11i 802.1X initial authentication mode was created for ___.
Corporations with multiple access points
The path a message takes from the source host to the destination device in an Ethernet network is a ____________.
Data Link
After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.
Different pairwise session keys
_______ is the official name for Ethernet addresses.
EUI-48
Ethernet addresses were formerly called ________ addresses.
MAC
_____ is a wireless network standard.
OSI
Wi-Fi normally uses a(n) _______.
Omnidirectional antenna
Ethernet forwarding devices are __________.
Switches
In the IPv4 address 1.2.3.4, what is the network part?
We cannot say.
Wi-Fi is a term used by the ________.
Wi-Fi Alliance
Which of the following IPv4 addresses would be used for Internet transmission?
128.171.x.x
If I simplify the address 2001:0ed2:056b:00d3:00c0:abcd:0bcd:0fe0, I get _____.
2001:ed2:56b:d3:c0:abcd:bcd:fe0
If a firm has many access points, it should use ________ initial authentication mode in 802.11i
802.1X
In what initial authentication mode of 802.11i is a central authentication server is used?
802.1X
Simple installation rules are sufficient to reduce propagation problems to nonissues in _____.
802.3
NAT _____.
Allows a firm to have more internal IP addresses (not reduces cost)
In a large company, you want _______.
As small a routing prefix as you can have
Nearly all public Wi-Fi hotspots encrypt your transmissions.
FALSE
For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so.
False
In a Wi-Fi LAN, wireless hosts generally send frames directly to one another?
False
In NAT, the _____ creates new external source IP addresses and port numbers.
Firewall
Ethernet messages are __________.
Frame
Wireless radio transmission speed is usually measured in terms of _____.
Frequency
Most wireless systems operate in the _____ range.
GHz (or MHz, not sure)
What organization (most specifically) creates Ethernet standards?
IEEE
Router sockets for wire and optical fiber cords are called ________.
Interfaces
Communication after authentication is protected most strongly if the ___ initial authentication is used.
It does not matter which initial authentication mode is used
In 802.1x initial authentication mode, the VERIFIER is the ________.
None of these
A local area network operates _______
On a customer premises
Ethernet standards are set at the ______.
Physical layer
The wifi alliance calls 802.11i ____
WPA2
Compared to wired transmission, propagation problems in radio transmissions are ______.
Worse
Which of the following is a private IP address range?
10.x.x.x
Express the mask /24 in dotted decimal notation
255.255.255.0
The total length of an IPv4 address is _____ bits.
32 bits
The network part of an IPv4 address is _____ bits long.
8 bits
We use the terms Wi-Fi and _______ interchangeably in this book
802.11
Wi-fi Standards come from the ____ Working Group.
802.11
If a signal has a strength of 100 mW at 10 meters, how strong will it be at 100 meters?
About 0.1
If the signal strength from an omnidirectional radio source is 100 mW at 10 meters, how strong will it be at 30 meters, ignoring absorptive attenuation?
About 11 mW
If a signal has a strength of 100 mW at 10 meters, how strong will it be at 40 meters?
About 6 mW
What propagation problem is especially bad in moist air?
Absorptive attenuation
__________links connect users to workgroup switches
Access
In 802.11i, protection is provided between the client and the ___
Access point
Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00
Ae00:00ff:feff:ff0
If another wireless device is near, but in an unknown direction, it is better to use ____.
An omnidirectional antenna
__________ links connect switches to other switches
Trunk
The protection of communication between a wireless client and the access point is ___
Link Security
The most serious problem with wireless transmission in WLANs is ____.
Multipath interference
_____ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.
NAT
Ethernet standards are specified at the ___________ layer
Neither internet nor transport
If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________.
Neither still protected by a firewall nor still protected by encryption
In 802.11i ________, hosts must know a shared initial key.
PSK initial authentication mode
UDP is a standard for ____.
Packet delivery
After authentication in 80.11 PSK mode, a wireless client communicates with the access point via a(n) ___ key
Pairwise session
In digital signaling there is (are) ________ state(s).
Small number of
Which of the following is one of the three parts of an IPv4 address?
Subnet part
DNS is a ______ protocol.
Supervisory
For cost reasons, you should _____ where you can, _____ where you must.
Switch; route
Wireless network standards operate at _______.
The data link layer
TCP/IP standards are set at the ______.
Transport layer
In this book, we use the terms Ethernet and 802.3 interchangeably
True
In 802.1x initial authentication mode, the authenticator is the _____
Wireless access point
What type of switch connects users to the network?
Workgroup switches