Chapter 6 Flashcards

1
Q
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?
A) reflection
B) bounce
C) diffraction
D) scattering
A

C) diffraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?
A) reflection
B) bounce
C) diffraction
D) scattering
A

D) scattering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?
A) ifconfig
B) iwconfig
C) wlanconfig
D) ipconfig
A

B) iwconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
How many address fields exist in an 802.11 frame?
A) 2
B) 3
C) 4
D) 6
A

C) 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Select the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:
A) 5.1 GHz
B) 5.3 GHz
C) 5.4 GHz
D) 5.9 GHz
A

D) 5.9 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is not a valid wireless network topology?
A) bus
B) infrastructure
C) mesh
D) ad hoc
A

A) bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds?
A) 100 feet
B) 200 feet
C) 300 feet
D) 600 feet
A

C) 300 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
At what layer of the OSI model do the 802.11 standards vary?
A) Physical layer
B) Network layer
C) Data link layer
D) Transport layer
A

A) Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which 802.11 standard was the first to utilize the 5 GHz band?
A) 802.11b
B) 802.11a
C) 802.11g
D) 802.11n
A

B) 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?
A) 802.11a
B) 802.11b
C) 802.11n
D) 802.11ac
A

D) 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What is the maximum theoretical throughput of 802.11n?
A) 54 Mbps
B) 65 Mbps
C) 600 Mbps
D) 1.3 Gbps
A

C) 600 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?
A) broadcast frame
B) hello packet
C) beacon frame
D) announcement message
A

C) beacon frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
In IEEE terminology, a group of stations that share an access point are said to be part of what option below?
A) extended service set
B) basic service set
C) modified service set
D) generic service set
A

B) basic service set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
A) management frames
B) control frames
C) data frames
D) extended frames
A

A) management frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
A) management frames
B) control frames
C) data frames
D) extended frames
A

B) control frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the 802.11 data frame indicate how a large packet should be fragmented?
A) It uses the preamble header
B) The frame check sequence dictates packet size
C) The sequence control field indicates how packets will be subdivided
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided

A

C) The sequence control field indicates how packets will be subdivided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers
A) MIMO
B) channel bonding
C) frame aggregation
D) radio duplexing
A

A) MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
In an 802.11 data frame, what is the size of the frame check sequence field?
A) 2 bytes
B) 4 bytes
C) 6 bytes
D) 8 bytes
A

C) 6 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
How many data streams are used in 802.11ac Wave 2 devices?
A) 2 data streams
B) 3 data streams
C) 4 data streams
D) 8 data streams
A

C) 4 data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
What is the max theoretical throughput of the 802.11ac wireless technology when using wave 1 devices?
A) 600 Mbps
B) 1.3 Gbps
C) 3.47 Gbps
D) 6.93 Gbps
A

B) 1.3 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
A) 2 KHz
B) 9 KHz
C) 300 GHz
D) 500 GHz
A

B) 9 KHz

C) 300 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
What two frequencies are used for most wireless networks?
A) 900 MHz
B) 2.4 GHz
C) 4.9 GHz
D) 5 GHz
A

B) 2.4 GHz

D) 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
At which two layers do wireless LANs operate?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
A

A) Layer 1

B) Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data, or download data without permission?
A) bluesniffing
B) bluejacking
C) bluespoofing
D) bluesnarfing
A

B) bluejacking

D) bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
``` What two terms describe a wireless network topology in which access points work as peer devices on the same network? A) mesh WLAN B) infrastructure WLAN C) wireless gateway D) wireless mess network (WMN) ```
A) mesh WLAN | D) wireless mess network (WMN)
26
All wireless signals are carried through the air by electromagnetic waves. (A) True (B) False
True
27
Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor.​ (A) True (B) False
False
28
Multipath signaling is a significant cause of fading.​ (A) True (B) False
True
29
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.​ (A) True (B) False
False
30
The WPS PIN is vulnerable to brute force attacks.​ (A) True (B) False
(A)
31
``` ​What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction? (A) ​reflection (B) ​bounce (C) ​diffraction (D) ​scattering ```
Answer : (C)
32
``` What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?​ (A) ​reflection (B) ​bounce (C) ​diffraction (D) ​scattering ```
Answer : (D)
33
``` Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?​ (A) ​ifconfig (B) ​iwconfig (C) ​wlanconfig (D) ​ipconfig ```
Answer : (B)
34
``` How many address fields exist in an 802.11 frame?​ (A) ​2 (B) ​3 (C) ​4 (D) ​6 ```
Answer : (C)
35
``` Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:​ (A) ​5.1 GHz (B) ​5.3 GHz (C) ​5.4 GHz (D) ​5.9 GHz ```
Answer : (D)
36
``` Which of the following is not a valid wireless network topology? (A) ​bus (B) ​infrastructure (C) mesh​ (D) ​ad hoc ```
Answer : (A)
37
``` Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds?​ (A) ​100 feet (B) ​200 feet (C) ​300 feet (D) ​600 feet ```
Answer : (C)
38
``` ​At what layer of the OSI model do the 802.11 standards vary? (A) ​Physical layer (B) ​Network layer (C) ​Data link layer (D) ​Transport layer ```
Answer : (A)
39
``` Which 802.11 standard was the first to utilize the 5 GHz band?​ (A) ​802.11b (B) ​802.11a (C) ​802.11g (D) ​802.11n ```
Answer : (B)
40
``` Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?​ (A) ​802.11a (B) ​802.11b (C) ​802.11n (D) ​802.11ac ```
Answer : (D)
41
``` What is the maximum theoretical throughput of 802.11n?​ (A) ​54 Mbps (B) ​65 Mbps (C) ​600 Mbps (D) ​1.3 Gbps ```
Answer : (C)
42
``` What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point? (A) broadcast frame​ (B) ​hello packet (C) ​beacon frame (D) ​announcement message ```
Answer : (C)
43
``` In IEEE terminology, a group of stations that share an access point are said to be part of what option below? (A) extended service set (B) ​basic service set (C) ​modified service set (D) ​generic service set ```
Answer : (B)
44
``` ​What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? (A) ​management frames (B) ​control frames (C) ​data frames D) ​extended frames ```
Answer : (A)
45
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?​ (A) ​management frames (B) ​control frames (C) ​data frames (D) ​extended frames
Answer : (B)
46
How does the 802.11 data frame indicate how a large packet should be fragmented?​ (A) ​It uses the preamble header (B) ​The frame check sequence dictates packet size (C) ​The sequence control field indicates how packets will be subdivided (D) ​The duration field determines how long the station can transmit a packet, which then determines how it is divided.
Answer : (C)
47
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?​ (A) ​MIMO (B) ​channel bonding (C) ​frame aggregation (D) ​radio duplexing
Answer : (A)
48
``` In an 802.11 data frame, what is the size of the frame check sequence field?​ (A) ​2 bytes (B) ​4 bytes (C) ​6 bytes (D) ​8 bytes ```
Answer : (C)
49
``` How many data streams are used in 802.11ac Wave 2 devices?​ (A) ​2 data streams (B) ​3 data streams (C) ​4 data streams (D) ​8 data streams ```
Answer : (C)
50
``` What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?​ (A) ​600 Mbps (B) ​1.3 Gbps (C) ​3.47 Gbps (D) ​6.93 Gbps ```
Answer : (B)
51
_________________ is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.
​Answer : Infrared (IR)
52
The proportion of noise to the strength of a signal is called the _________________.​
Answer : signal-to-noise ratio (SNR or S/N)
53
Access points that include routing functions are also called _______________.​
Answer : wireless routers Answer : wireless gateways
54
__________________ is a form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).​
Answer : NFC (near field communication)
55
All 802.11 standards use ______________ signaling, meaning a wireless station can only transmit or receive, but cannot do both simultaneously.​
Answer : half-duplex
56
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Answer: B. Layer 3
57
Which three wireless transmission types require a clear LOS to function?
Answer: C. Wi-Fi
58
Which Bluetooth class has the highest power output?
Answer: A. Class 1
59
A hacker takes advantage of a Bluetooth connection to send a virus to a user’s phone. What kind of security breach has occurred?
Answer: D. Bluejacking
60
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
Answer: C. NFC (near-field communication)
61
A student has completed his part of a group research paper, and needs to share it with a classmate. He sees the classmate as they’re crossing the parking lot between classes. Which WLAN architecture could they use to transfer the file from one laptop to the other?
Answer: A. Ad hoc
62
Which 802.11 standard can be used in both the 2.4-GHz and the 5-GHz bands?
Answer: B. 802.11n
63
All wireless signals are carried through the air by electromagnetic waves.
Answer: True
64
The ____________________ is a continuum of the electromagnetic waves used for data and voice communication.
Answer: wireless spectrum
65
____________________ are used for both the transmission and reception of wireless signals.
Answer: Antennas
66
____ signals follow a number of different paths to their destination because of reflection, diffraction, and scattering. a. Multipath b. Opened c. Closed d. Variable
Answer: A
67
Wireless signals cannot depend on a(n) ____________________ or shielding to protect them from extraneous EMI.
Answer: conduit
68
Which type of wireless network consists of wireless nodes that transmit directly to each other via wireless NICs without an intervening connectivity device? a. mesh WLAN b. infrastructure WLAN c. ad hoc WLAN d. AP WLAN
Answer: C
69
The five 802.11 standards (802.11b, 802.11a, 802.11g, 802.11n, 802.11ac) are collectively known as ____. a. WiMAX b. Wi-Fi c. Bluetooth d. Open
Answer: B
70
802.11 networks use the same access method as Ethernet networks.
Answer: False
71
The 802.11 standard specifies a frame type at the ____________________ sublayer.
Answer: MAC
72
In which of the following best describes an innovation where multiple antennas on an access point may issue a signal to one or more receivers? a. MIMO b. MU-MIMO c. channel bonding d. frame aggregation
Answer: D
73
How is a wireless NIC different from a NIC that requires a cable? a. A wireless NIC contains an antenna. b. A wireless NIC contains a chip, which does additional processing at higher levels of the OSI model. c. A wireless NIC requires an external power source. d. A wireless NIC requires an external antenna
a. A wireless NIC contains an antenna.
74
In which of the following ways does a wireless LAN differ from an Ethernet LAN? a. A wireless LAN requires additional protocols in the TCP/IP suite. b. A wireless LAN uses completely different protocols than an Ethernet LAN. c. A wireless LAN uses different techniques at the Physical layer to transmit data. d. A wireless LAN uses different techniques at the Data Link layer to transmit frames.
c. A wireless LAN uses different techniques at the Physical layer to transmit data
75
Which of the following are potential disadvantages of wireless LANs as compared with cabled LANs? (Choose all that apply.) a. Controlling access to a wireless LAN is more difficult. b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN. c. The additional protocols required by wireless LANs create additional overhead. d. Signal strength can be affected by many sources of electronic noise.
a. Controlling access to a wireless LAN is more difficult. b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN. d. Signal strength can be affected by many sources of electronic noise.
76
Why is a wireless signal susceptible to noise? a. Wireless NICs are usually poorly made. b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable. c. Wireless NICs do not support the network protocols necessary for error correction. d. Wireless NICs rely on the upper levels of the OSI model for error correction.
b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.
77
You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN? a. Wireless LAN users have the same access as users attached to the Ethernet network. b. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network. c. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network without special security software. d. Wireless LAN users must use their own wireless ISP.
c. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network without special security software.
78
What term is used to describe when a mobile user moves out of one access point’s range and into the range of another? a. Reassociation b. Deassociation c. Reallocation d. Extending the service set
Reassociation
79
What is the administrator’s default account called in Linux? a. Admin b. Administrator c. default d. root
d. root
80
Where is the Network Manager service located? a. /user b. /sbin/service c. /etc/NetworkManager d. /Network/Manager
b. /sbin/service
81
What Linux command is used to test network connections? a. root b. sudo c. ping d. start
c. ping
82
Which of the following Wi-Fi standards has the highest effective throughput? a. 802.11g b. 802.11a c. 802.11b d. 802.11n
d. 802.11n
83
Wireless access points are assigned a unique name or _____. a. FHSS b. DSSS c. CSMA d. SSID
d. SSID
84
What does SSID stand for? a. Service set identifier b. Security service Internet domain c. Security station identification d. Simple security Internet device
a. Service set identifier
85
WEP, WPA, and WPA2 are all forms of wireless ______________ . a. Access b. Routers c. Services d. Encryption
d. Encryption
86
You can limit access to certain computers with: a. Encryption b. MAC filtering c. Remote administration d. Using a strong password
b. MAC filtering
87
A rogue access point set up to look like a legitimate access point is called a(n) ____. a. Guest network b. Evil twin c. Remote bridge d. Password sniffer
b. Evil twin
88
A major security weakness of WEP is the fact that it uses a _____ network key. a. 48-bit b. Shared c. Dynamic d. Single-use
b. Shared
89
Which wireless networking standard operates in both the 2.4-GHz and 5-GHz bands? a. 802.11a b. 802.11b c. 802.11g d. 802.11n
d. 802.11n
90
What feature will eliminate the need for a separate electrical outlet for your WAP? a. PoE b. WPA c. WPA2 d. 802.11n
POE
91
Why is plenum-rated cable often a requirement for ceiling-mounted access points? a. Ceiling-mounted APs are more than seven feet off the ground. b. They work at higher speeds. c. They need to operate at higher temperatures. d. In the case of a fire, they do not give off toxic fumes.
d. In the case of a fire, they do not give off toxic fumes.
92
In an enterprise-wide WLAN, coverage can be extended across multiple access points by joining them to the same ____. a. ESS b. WPA c. MAC d. MIMO
a. ESS
93
Some wireless access points can associate a client’s MAC address with a port on a switch allowing a client to stay connected to a ____ as it moves throughout an area. a. DSSS b. FHSS c. RTS/CTS d. VLA
d. VLAN
94
How many channels are available on the 2.4-GHz band? a. 6 b. 11 c. 12 d. 24
b. 11