Chapt 7 Flashcards
Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other? (Choose two.)
802.11a, 802.11b, 802.11ac, 802.11g
802.11b and 802.11g
B, D. Both 802.11b and 802.11g operate in the 2.4 GHz range and use similar transmission standards. Some legacy devices are listed as 802.11b/g, meaning they will work with either system. Alternatively, 802.11a and 802.11ac operate in the 5 GHz range.
What is the primary function of the SSID?
A) To secure communication between a web server and a browser
B) To secure communication between a server and a remote host
C) To serve as a parameter used to identify a network and configure a wireless connection
D) To serve as a type of password used to secure a wireless connection
To serve as a parameter used to identify a network and configure a wireless connection.
A service‐set identifier (SSID) is the unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, it is the network name. When you are using Windows to connect to a wireless network, all available wireless networks are listed by their SSID.
Which of the following are features that allow 802.11ac to achieve higher data throughput? (Choose two.)
MIMO, Beamforming, Channel bonding, Code division multiplexing
MIMO and Channel bonding
A, C. The two technologies that 802.11ac employs to achieve high throughput are channel bonding and MIMO. Channel bonding is the combination of multiple smaller channels into one large channel for greater bandwidth. MIMO is enhanced over 802.11n to allow for multiple inputs and outputs. 802.11ac also uses beamforming, but that helps the range, not the throughput.
Which of the following is the most secure wireless encryption standard for 802.11 networks?
WEP, WPA, WPA2, SAFER+
WPA2.
WEP was the original encryption standard developed for Wi‐Fi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. WPA3 is of course the safest, but it’s not one of the options. SAFER+ is used to encrypt Bluetooth communications.
You are upgrading a wireless network from Wi-Fi 5 over to Wi-Fi 6. Which of the following statements is not correct?
A) Users should get faster speeds.
B) Network range will be similar.
C) Fewer users will be able to use each access point.
D) Devices may have lower power usage while connecting to the network.
Fewer users will be able to use each access point..
Wi‐Fi 6 is faster than Wi‐Fi 5, and the network range is similar. More users should be able to access each access point, not fewer. Devices may have lower power usage in Wi‐Fi 6 due to a new sleep feature.
You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure? (Choose all that apply.)
Change the default administrator name and password.
Change the SSID.
Enable WEP.
Configure it to channel 11.
Change the default administrator name and password.
Change the SSID.
You should always change the default administrator name and password as well as the default SSID when installing a new wireless router. Enabling encryption is also a good idea, but WPA, WPA2, and WPA3 are better options than WEP. The channel has nothing to do with security.
You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?
DSL, Cable, Satellite, Fiber
Fiber.
Of the options listed, fiber provides the best speed. DSL and cable provide similar speeds but can’t match fiber. Satellite is the slowest of the options listed.
Which service allows users with private IP addresses to access the Internet using a public IP address?
DHCP, DNS, DSL, NAT
NAT.
Network Address Translation (NAT) allows users to have a private IP address and still access the Internet with a public IP address. NAT is installed on a router and translates the private IP address into a public address for the user to access the Internet. DHCP assigns IP configuration information to clients. DNS resolves hostnames to IP addresses. DSL is a type of broadband Internet access.
You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues?
2, 5, and 7
1, 8, and 14
1, 6, and 11
3, 6, and 9
1, 6, and 11.
There are 14 communication channels in the 2.4 GHz range, but only the first 11 are configurable. The three nonoverlapping channels are 1, 6, and 11.
You are setting up a wireless network. Which wireless standards would give the users over 40 Mbps throughput? (Choose all that apply.)
802.11ac, 802.11b, 802.11g, 802.11n
802.11ac, 802.11g, 802.11n
A, C, D. Three standards listed—802.11ac (1,300 Mbps), 802.11g (54 Mbps), and 802.11n (600 Mbps)—give users the required throughput. 802.11ax would do so as well, although it’s not an option.
You have been asked to configure a network for a small office. The wireless router is installed, and now you need to connect the client computers. What do you enter on the client computers to connect to the router?
The administrator password
The security passphrase
The client’s MAC address
The default router password
The security passphrase.
To join the network, client computers need to find the SSID, ensure that the security settings are correct (to match the router), and enter the security passphrase. As an administrator, you should have configured this passphrase to be different from the router’s administrator password.
Which of the following technologies can operate in the 125 kHz to 134 kHz range?
Bluetooth, RFID, NFC, LTE
RFID.
Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz, NFC is 13.56 MHz, and LTE is between 600 MHz and 6 GHz.
Due to channel interference, you are upgrading a wireless network from Wi-Fi 5 to Wi-Fi 6. Which feature of Wi-Fi 6 reduces channel interference?
OFDMA, BSS coloring, MU-MIMO, DFS
BSS coloring.
The feature of Wi‐Fi 6 that reduces channel interference is Basic Service Set (BSS) coloring, which adds a field to the wireless frame that distinguishes it from others. Orthogonal Frequency Division Multiple Access (OFDMA) is a modulation technique that improves speed because it allows transmission to multiple clients at once. MU‐MIMO also increases speed because in Wi‐Fi 6 it works for uplink connections as well as downlink ones. Dynamic Frequency Selection (DFS) was introduced with 802.11n, and it detects radar interference and adjusts frequencies accordingly.
Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key?
WEP, TKIP, AES, CCMP
TKIP.
WEP could use a 64‐bit or 128‐bit security key, but it was a static key. TKIP introduced a dynamic per‐packet key. AES and CCMP came after TKIP.
You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?
A) The user with 802.11b will access the network at 11 Mbps, while the users with 802.11g will access the network at 54 Mbps.
B) The user with 802.11b will not be able to communicate on the network.
C) The user with 802.11b will access the network at 11 Mbps. The users with 802.11g will access the network at 54 Mbps, unless they are communicating with the 802.11b device, which will be at 11 Mbps.
D) All users will access the network at 11 Mbps.
All users will access the network at 11 Mbps.
The good news is that 802.11g is backward compatible with 802.11b. The bad news is, if you run in a mixed environment, all devices that communicate with the WAP (or router) will be forced to slow down to accommodate the older technology.
When enabled, which feature of a wireless router allows only specified computers to access the network?
Port forwarding, WPS, SSID, MAC filtering
MAC filtering.
MAC filtering is a security option that can specify that only computers with specific MAC (hardware) addresses can access the network. Port forwarding is a feature of firewalls. WPS is an easy setup mechanism for wireless networks. SSID is the wireless network name.
A firewall operates by using a set of rules known as what?
SLA, ACL, NAT, APIPA
ACL.
The set of rules for access on a firewall is called an access control list (ACL). An SLA is an agreement on service level for QoS. NAT translates private IP addresses into public ones. APIPA assigns an IP address to a client that can’t reach the DHCP server.
You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?
WEP, WPA, WPA2, TKIP
WPA2.
If your router is using AES, the clients need to use WPA2. TKIP is a protocol utilized by WPA. WEP is the weakest of the encryption options.
Besides 802.11 standards, which wireless communication methods may also work in the 2.4 GHz range? (Choose all that apply.)
Bluetooth, Satellite, Long-range fixed wireless, mmWave, NFC
Bluetooth and Long-range fixed wireless.
Bluetooth also operates in the 2.4 GHz range, and long‐range fixed wireless can if it uses unlicensed frequencies. Satellite uses satellite waves; 5G cellular mmWave is between 24 GHz and 86 GHz, and NFC uses 13.56 MHz.
You are configuring a SOHO client to use TCP/IP. Which parameter is needed to tell the client where to communicate to get on the Internet?
Static address, Dynamic address, APIPA, Gateway
Gateway.
The gateway, also known as a default gateway, is the address to the router to take a client to the next network (or Internet). Gateways can be configured with a static assignment or dynamically through a DHCP server. APIPA will automatically configure a client with IP address information if it’s set to get its configuration from a DHCP server but none is available. APIPA‐configured clients can’t get on the Internet.
the wireless networking standard of 802.11a operates at a frequency of ____ and supports a speed of ____
5GHZ and 54Mbps
the wireless networking standard of 802.11n operates at a frequency of ____ and supports a speed of ____
2.4 and 5 GHz and up to 600Mbps
the wireless networking standard of 802.11b operates at a frequency of ____ and supports a speed of ____
2.4GHz and 11Mbps
the wireless networking standard of 802.11g operates at a frequency of ____ and supports a speed of ____
2.4GHz and 54Mbps
on a 2.4GHz wifi network, what are the three nonoverlapping channels
1, 6, 11
wireless 802.11b/g routers have a range of approximately _____ indoors and ____ outdoors
40m and 140m
a 10BaseT network uses _____ cabling and can transmit data at a speed of _____
twisted pair or UTP at 10Mbps
the four common types of broadband are ____
DSL, cable, satellite, and fiber optic
the most secure encryption protocol for 802.11 is ____
WPA3
wireless networks use ____ to identify themselves
SSID (service set identifiers)
two examples of 4G technology are ___
LTE (long term evolution) and
WiMAX (worldwide interoperability for microwave access)
firewalls filter packets based on a set of rules called a(n) ____
ACL (access control list)
UTP (unshielded twisted pair) cable has a maximum segment length of ___
100m
the method that translates between private and non-routable IP addresses and public IP addresses is ____
NAT (network address translation)
WPA2 (wifi protected access 2) employs what security method?
AES-CCMP (Advanced Encryption Standard Counter Mode with Cipher Block Chaining Message Authentication)
a firewall configuration where every computer is denied access except certain computers on a list is called a ____ list
white ( or allow)
cable TV and networking can use different types of ____ cable
coaxial
the oldest type of twisted pair cabling that can support speeds of 1 Gbps is ___
Cat5e
dial-up networking is limited to a speed of _____
56Kbps
another name for a hub on a wireless network is a _____
WAP (wireless access point)
to only allow access to certain computers on your wireless router, you can use ____ filtering.
MAC (media access control)
the T in 100BaseT refers to what?
twisted pair cabling