Chapter 12 Flashcards
(20 cards)
Which of the following is a frequency defined by 802.11 committees for w
1.9 GHz
900 MHz
2.4 GHz
10 GHz
2.4 GHz
Which of the following features does WPA2 supply on a wireless network?
Encryption
Network identification
Centralized access points for clients
Client-connection refusal based on MAC address
Encryption
Which of the following 802.11 wireless standards operates in the 6-GHz f
802.11ax
802.11b
802.11a
802.11ac
802.11ax
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
Question options:
Disable SSID broadcast.
Use a form of authentication other than open authentication.
Change the default SSID.
Implement WPA2 Personal.
Disable SSID broadcast.
You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process?
Question options:
On the wireless access point and each wireless device.
On the wireless access point.
On a certificate authority (CA).
On a RADIUS server.
On a RADIUS server.
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building:
A wireless television distribution system running at 2.4 GHz.
A wireless phone system running at 5.8 GHz.
A wireless phone system running at 900 MHz.
An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range.
An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range.
Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
Question options
The 802.11a wireless network
The 900 MHz wireless phone system
The wireless TV system
The 5.8 GHz wireless phone system
The wireless TV system
Which satellite internet technology is popular for home & expanding in business, especially in remote areas?
Question options:
Geostationary Orbital Satellites
Low Earth Orbital (LEO) Satellites
High Earth Orbital (HEO) Satellites
Microwave Satellite Broadband
Microwave Satellite Broadband
Which technology is used by the 802.11ac standard to increase network bandwidth?
Question options:
Four MIMO radio streams
Eight MIMO radio streams
Data compression
40 MHz bonded channels
Eight MIMO radio streams
Which of the following provides security for wireless networks?
Question options:
802.11a
CSMA/CD
WAP
WPA
WPA
What term describes signal interference that is created intentionally by an attacker?
Question options:
Deauthentication
Interfering
Jamming
Data emanation
Jamming
Which type of communication path-sharing technology do all 802.11 standards for wireless networking support?
Question options:
CSMA/CA
CSMA/CD
Token passing
Polling
CSMA/CA
Which type of antenna transmits and receives signals in multiple orientations?
Question options:
MIMO
Unidirectional
Omnidirectional
Dual-Polarized
Dual-Polarized
You are designing an update to your client’s wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps.
Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users’ workstations. She has also indicated that the system must continue to function during the transition period.
Which 802.11 standard will work BEST in this situation?
Question options:
802.11g
802.11n
802.11b
802.11x
802.11n
Which of the following is true of a wireless network SSID?
Question options:
Is a 48-bit value that identifies an AP.
Coordinates all communications between wireless devices.
Enables wireless interconnection of multiple APs.
Groups wireless devices together into the same logical network
Enables wireless interconnection of multiple APs.
What is the “peak data rate” for 5G cellular technology?
Question options:
Up to 150 Mbps
Up to 300 Mbps
Up to 20 Gbps
Up to 5 Gbps
Up to 20 Gbps
You need to add security for your wireless network. You would like to use the most secure method.
Which method should you implement?
Question options:
WPA2
Kerberos
WPA
WEP
WPA2
Which of the following purposes do wireless site surveys fulfill?
Question options:
Identify existing or potential sources of interference.
Identify the recommended 100 degree separation angle for alternating access points.
Document existing infrared traffic in the 5.4 GHz spectrum.
Determine the amount of bandwidth required in various locations
Identify existing or potential sources of interference.
Your company security policy states that wireless networks are not to be used because of the potential security risk they present.
One day you find that an employee has connected a wireless access point to the network in his office.
Which type of security risk is this?
Question options:
Physical security
Phishing
On-path attack
Rogue access point
Rogue access point
Which term describes the practice of driving around an area in a car to detect open Wi-Fi nodes to attack?
Question options:
Netdriving
Warchalking
Wardriving
Sniffing
Wardriving
Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?
Question options:
802.11a
802.11n
802.11b
802.11ax
802.11b