N+ Chap 6 RQs
20.40.80.120
802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size channels does 302.11ac support?
Bluesnarfing
A hacker takes advantage of a Bluetooth connection to send a virus to a user's phone. What kind of security breach has occurred.
Ad hoc
A student has completed his part of a group research paper, and needs to share it with a classmate. He sees the classmate as they're crossing the parking lot between classes. Which WLAN architecture could they use to transfer the file from one laptop to the other?
NFC (Near-field Communication)
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
On Boarding
An employee has lost his company-provided phone during a business trip. What process ensures that he can now perform a remote wipe?
Signal-to-Noise Ratio or (SNR or S/N)
Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _______________ because of the high proportion of noise.
Frequency
To exchange information, two antennas must be tuned to the same ________
Heat map
What feature of a site survey maps the Wi-Fi signals and other noise in your location?
Layer 3
What is the lowest layer of the O.S.I. model at which wired and wireless transmissions share the same protocols?
Reflection
When a wireless signal encounters a large obstacle, what happens to the signal?
802.11n
Which 802.11 standard can be used in both the 2.4-GHz and the 5-GHz bands?
CSMA/CD
Which Carrier Sense technology is used on wireless networks to reduce collisions?
Class 1
Which bluetooth class has the highest power output?
5-GHz band consists of 24 unlicensed bands
Which frequency band offers 24 unlicensed communications channels in the United States?
unidirectional antenna/ directional antenna
Which kind of antenna is used in a point-to-point link?
Wi-Fi
Which one of the following wireless transmission types does NOT require a clear LOS to function?
Wireless networks experience a high number of collisions and require a greater overhead.
Why do wireless networks experience such a great reduction in actual throughput compared with their respective theoretical throughputs?
Evil Twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Guest Networking
You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you set up on her AP to meet her requests?
Rogue Access Point
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?