module 4.3 Flashcards

1
Q

Which of the following are characteristics of Bluetooth? (Select two.)

Ad hoc connections

Line-of-sight transmission

Red spectrum light waves

5.75 GHz radio wireless

2.4 GHz radio wireless

A

2.4 GHz radio wireless, Ad hoc connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

802.1x

Bluetooth

802.11a

802.11b

802.11gc

A

802.11a

802.11gc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is used on a wireless network to identify the network name?

SSID

MAC address

WPA2 passphrase

WEP key

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA

WEP

Kerberos

WPA2

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device.

They use an 802.11n wireless network.
The wireless network is broadcasting an SSID of Linksys.
The wireless network uses WPA2 with AES security.
Directional access points are positioned around the periphery of the building.
Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)

Disable SSID broadcast.

Configure the wireless network to use WPA with TKIP security.

Implement omnidirectional access points.

Upgrade to an 802.11g wireless network.

Change the SSID to something other than the default.

A

Change the SSID to something other than the default.

Disable SSID broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Refusal of client connections based on MAC address

Encryption

Authentication

Filtering of traffic based on packet characteristics

Identification of the network

Centralized access for clients

A

Encryption

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following provides security for wireless networks?

CSMA/CD

WAP

802.3u

802.11a

WPA2

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

802.11b

5 GHz

802.11g

2.4 GHz

A

5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gary has finished installing a wireless router for his neighbor’s small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

802.11g

802.11a

802.11n

802.11b

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is checking a customer’s wireless network performance and has determined it was using 802.11g. The technician’s recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Less attenuation

802.11g uses older technology

More overlapping channels

Improved performance

A

Improved performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly