Review Questions Network+ Module 6

Ace your homework & exams now with Quizwiz!

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained? A) -80 dBm B) -70 dBm C) -50 dBm D) -30 dBm

A) -80 dBm

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection? A) 2.4 GHz-2.4835 GHz B) 5.1 GHz-5.8 GHz C) 824 MHz-896 MHz D) 1850 MHz-1990 MHz

A) 2.4 GHz-2.4835 GHz

What was the first 802.11 standard to implement channel bonding? A) 802.11n B) 802.11ax C) 802.11g D) 802.11ac

A) 802.11n Beginning with 802.11n, two adjacent 20-MHz channels can be combined, or bonded, to make a 40-MHz channel.

Which protocol replaced TKIP for WPA2? A) CCMP B) WEP C) RADIUS D) RC4

A) CCMP

Which of following statements is false? A) Each Wi-Fi channel contains multiple frequency bands. B) Wi-Fi functions on two different frequency bands. C) Each Wi-Fi channel contains multiple frequencies. D) Wi-Fi spreads its data across all available frequencies within a wide channel.

A) Each Wi-Fi channel contains multiple frequency bands. A band covers a frequency range that is further subdivided into channels; therefore, a Wi-Fi channel cannot contain multiple frequency bands.

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device? A) IBSS B) ESSID C) BSS D) ESS

A) IBSS

JW Communications has hired you to install a Wi-Fi network on its floor. To provide a seamless network connection, you have decided to install a centralized wireless controller to manage AP redundancy by directing wireless traffic to alternate APs when an AP fails. Which of the following protocols will you apply in order to direct all the wireless frames to the controller? A) LWAPP B) POP3 C) ICMP D) EAP

A) LWAPP LWAPP (Lightweight Access Point Protocol) is a protocol that directs all access points to the controller by adding an extra header to the frames.

Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver's end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client's device's RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario. A) Mark the rating as not good B) Mark the rating as excellent C) Mark the rating as acceptable D) Mark the rating as good

A) Mark the rating as not good

What is the service that offers a central authentication point for wireless, mobile, and remote users called? A) RADIUS B) WPA C) EAP D) AES

A) RADIUS

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? A) RSSI B) Channel C) EIRP D) Band

A) RSSI

Which off-boarding policy can protect proprietary corporate information if a smartphone is lost? A) Remote wipe B) Trusted access C) OS update requirements D) Site survey

A) Remote wipe

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. It's SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? A) Rogue AP B) War driving C) Evil twin D) Hidden node

A) Rogue AP

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James had decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue. A) Use Geofencing security technique B) Use captive portal C) Establish a guest network with a separate SSID D) Use wireless client isolation

A) Use Geofencing security technique

Which of the following security threats involves an interception of the network keys communicated between clients and access points? A) WPA attack B) War chalking C) WPS attack D) War Driving

A) WPA attack

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario. A) Wrong SSID B) Encryption protocol mismatch C) Incorrect passphrase D) Long AP association time

A) Wrong SSID

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue. A) 300 GHz-300,000 GHz B) 5.925 GHz-7.125 GHz C) 2.457 GHz D) 2.4 GHz-2.4835 GHz

B) 5.925 GHz-7.125 GHz Wi-Fi 802.11ax, aka Wi-Fi 6e, operates within this frequency and maximizes the throughput. This will help Jasmine to fix the issue.

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check? A) Sequence Control B) Trailer C) Data D) Frame Control

B) Trailer

Which Wi-Fi encryption standard was designed to use AES encryption? A) WPA B) WPA2 C) WEP D) WEP2

B) WPA2

What is the frequency range for Bluetooth communications? A) 1850 MHz-1990 MHz B) 300 GHz-300,000 GHz C) 2.4 GHz-2.4835 GHz D) 5.1 GHz-5.8 GHz

C) 2.4 GHz-2.4835 GHz

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band? A) 802.11ac B) 802.11a C) 802.11ax D) 802.11b

C) 802.11ax

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation? A) 802.11a B) 802.11n C) 802.11g D) 802.11ax

D) 802.11ax

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? A) 802.11g B) 802.11ac C) 802.11b D) 802.11ax

D) 802.11ax

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with? A) Directional antennas transmit wireless signals along a single direction. B) TV and radio stations use omnidirectional antennas C) The geographical area that an antenna or wireless system can reach is know as its range. D) A more negative RSSI value indicates a higher quality of signal.

D) A more negative RSSI value indicates a higher quality of signal.

Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi? A) Wi-Fi analyzer B) Captive portal C) Wireless LAN controller D) Spectrum analyzer

D) Spectrum analyzer

Tim has been contacted to install a wireless connection at the head office of Travis Roadways. The head office is located between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI level required for Tim to establish the connection function as per the requirements. A) The RSSI level should at least be -90 dBm B) The RSSI level should at least be -80 dBm C) The RSSI level should at least be -70 dBm D) The RSSI level should at least be -50 dBm

D) The RSSI level should at least be -50 dBm

Which of the following wireless technologies does not use the 2.4 GHz band? A) Z-Wave B) Bluetooth C) ZigBee D) Wi-Fi

A) Z-Wave

Which wireless technology is used to track fitness activity levels and geographic movement? A) Infrared B) ANT+ C) NFC D) Bluetooth

B) ANT+

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction? A) Refraction B) Diffraction C) Scattering D) Reflection

B) Diffraction

Which of the following versions of EAP uses PKI certificates to exchange public keys and authenticate both supplicant and the server? A) PEAP B) EAP-TLS C) EAP-FAST D) EAP-MSCHAPv2

B) EAP-TLS

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario. A) Interface B) Fading C) Refraction D) Attenuation

B) Fading

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue? A) He should check whether the geofencing security option has been enabled. B) He should check whether captive portal reminders have been set up. C) He should check for guest network preferences. D) He should check if the antenna has been misplaced.

B) He should check whether the captive portal reminders have been set up.

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose? A) BSS B) IBSS C) SSID D) ESS

B) IBSS

Which problem would a low RSSI level indicate? A) Mismatched standards B) Insufficient wireless coverage C) Incorrect pass phrase D) Encryption protocol mismatch

B) Insufficient wireless coverage

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? A) Layer 4 B) Layer 3 C) Layer 2 D) Layer 1

B) Layer 3

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator? A) Authentication B) MAC filtering C) Encryption algorithm D) WPA

B) MAC filtering

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in 802.11 data frame will you check for this information? A) Frame Control B) Sequence Control C) Trailer D) Data

B) Sequence Control The Sequence Control field is used to indicate how a large packet is subdivided into smaller packets for more reliable delivery.

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity? A) Trusted access B) Site survey C) OS update requirements D) Remote wipe

B) Site survey

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps? A) 802.11n B) 802.11ax C) 802.11b D) 802.11a

C) 802.11b

Which standard adapted EAP to WLANs? A) 802.11g B) 802.11i C) 802.1X D) 802.3

C) 802.1X

Which of the following statements is true? A) A satellite dish receives signals equally from any direction. B) A fish Aquarian full of clear water won't negatively affect a Wi-Fi signal. C) A Wi-Fi client connects to a range extender that connects to an AP. D) A smartphone always directs its signal toward the closest cell tower.

C) A Wi-Fi client connects to a range extender that connects to an AP.

Which Carrier Sense technology is used on wireless networks to reduce collisions? A) CSMA/CD B) EAPoL C) CSMA/CA D) SSID

C) CSMA/CA

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario? A) Wireless client isolation B) Guest network C) Captive portal D) Geofencing

C) Captive portal

Which type of identifier allows wireless clients to roam freely from AP to AP? A) BSSID B) IP address C) ESSID D) Transmitter address

C) ESSID

Which function of WPA/WPA2 security ensures data cannot be read in transit? A) Message integrity B) Authentication C) Encryption D) Key distribution

C) Encryption

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? A) Guest network B) Captive portal C) Evil twin D) Brute force attack

C) Evil twin

Mr. Haywire has just bought a set of wireless security cameras for his backyard. Howard, a network professional, has been sent by the store to set up the security cameras. While configuring and setting up the cameras, Howard notices that he is unable to configure the in-house Wi-Fi network with the cameras because of some frequency issues. Analyze what Howard should do in this situation. A) He should check if an incorrect passphrase might be the cause of this error. B) He should check if the SSID is wrong. C) He should set up an AP that offers a Wi-Fi standard on that band. D) He should check if encryption protocol mismatch caused this error.

C) He should set up an AP that offers a Wi-Fi standard on that band. Some wireless devices are designed to use only one Wi-Fi band.

Which one of the following wireless transmission types requires a clear LOS to function? A) Bluetooth B) NFC C) IR D) Wi-Fi

C) IR

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here? A) Interference B) Simultaneous wired and wireless connections C) Insufficient wireless coverage D) Channel overlap

C) Insufficient wireless coverage

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error. A) Insufficient wireless coverage might be the cause B) Lack of firmware updates might be the cause C) Interference seems to be the cause D) Attenuation might lead to loss in signals

C) Interference seems to be the cause

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario? A) EAP-FAST B) EAP-TLS C) PEAP D) EAP-MSCHAPv2

C) PEAP

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered? A) War driving B) WPA attack C) WPS attack D) War chalking

C) WPS attack

Which device on the network will require the greatest throughout capacity? A) Smart speaker B) Wireless LAN controller C) Wireless bridge D) Smart thermostat

C) Wireless bridge

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation? A) Spectrum analyzer B) RADIUS C) Captive portal D) Wi-Fi analyzer

D) Wi-Fi analyzer


Related study sets

Abraham Lincoln (Ch. 14) - History

View Set

Chapter 53: Nursing Care of a Family when a Child has a Malignancy

View Set

5 Characteristics of Marianist Universities

View Set

Georgia Driving Practice Test 2021

View Set

LCSW Law & Ethic Practice Test 2

View Set

Fundamentals of Human Neuropsychology

View Set

Chapter 3: Charts: Depicting Data Visually

View Set

6.3: Defense Against Infectious Disease

View Set

Visual Basic 2 Test 1 Chapter 1 & 2

View Set