Deck 5 Flashcards
What are the characteristics of the IEEE 802.11g wireless standard?
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Maximum data signaling rate of 54 Mbps
2.4 GHz frequency range
The characteristic features of the IEEE 802.11n (WiFi 4) wireless standard include?
Multiple Input / Multiple Output (MIMO)
2.4 GHz frequency band
5.0 GHz frequency band
Maximum data signaling rate of up to 600 Mbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac (WiFi 5) wireless standard?
5.0 GHz frequency band
Maximum data signaling rate of up to 6.933 Gbps
Multi-User Multiple Input / Multiple Output (MU-MIMO)
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
What are the characteristics of the IEEE 802.11ax (WiFi 6) wireless standard?
5.0 GHz frequency band
Multi-User Multiple Input / Multiple Output (MU-MIMO)
2.4 GHz frequency band
Maximum data signaling rate of up to 9.607 Gbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method.
A wireless network operating in an infrastructure mode with the use of more than one WAP is referred to as?
ESS.
A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is known as?
Ad-hoc mode
Peer-to-peer mode
IBSS (Independent Basic Service Set is a service set that allows wireless devices or stations to communicate with each other without any medium or central device. It does not contain or include any access points).
Which of the following wireless network types enables roaming?
ESS.
Which of the following answers refer(s) to a wireless antenna type(s) used for point-to-point links?
Dish Antenna.
Unidirectional Antenna.
Yagi Antennae.
Not Dipole Antenna.
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES.
Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?
AES-CCMP.
Advanced Encryption Standard- Counter Mode Cipher Block Chaining Message Authentication Code Protocol is an encryption protocol designed for wireless LANs that implements the IEEE 802.11i amendment.
Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode?
PSK.
WPA2 Personal Mode uses AES and a PSK for authentication. WPA2 Personal Mode is more secure than WPA and WEP however, it is less secure than WPA2 Enterprise mode which uses more complex authentication.
What are the characteristic features of WPA/WPA2 Enterprise mode?
Suitable for large corporate networks
Requires RADIUS authentication server.
LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards.
True.
Which of the following answers refer to the 2G/3G mobile telecommunications standards?
CDMA.
GSM.
CDMA or Code Division Multiple Access:
A channel access method used by various radio communications allowing several transmitters to send information simultaneously over a single channel.
GSM or Global System for Mobile Communications is a European standard for 2G.
Not CSMA. CSMA or Carrier Sense Multiple Access is a MAC protocol used in networks to avoid collisions.
An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as:
MIB.