Chapt 7 Flashcards
Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other? (Choose two.)
802.11a, 802.11b, 802.11ac, 802.11g
802.11b and 802.11g
B, D. Both 802.11b and 802.11g operate in the 2.4 GHz range and use similar transmission standards. Some legacy devices are listed as 802.11b/g, meaning they will work with either system. Alternatively, 802.11a and 802.11ac operate in the 5 GHz range.
What is the primary function of the SSID?
A) To secure communication between a web server and a browser
B) To secure communication between a server and a remote host
C) To serve as a parameter used to identify a network and configure a wireless connection
D) To serve as a type of password used to secure a wireless connection
To serve as a parameter used to identify a network and configure a wireless connection.
A service‐set identifier (SSID) is the unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, it is the network name. When you are using Windows to connect to a wireless network, all available wireless networks are listed by their SSID.
Which of the following are features that allow 802.11ac to achieve higher data throughput? (Choose two.)
MIMO, Beamforming, Channel bonding, Code division multiplexing
MIMO and Channel bonding
A, C. The two technologies that 802.11ac employs to achieve high throughput are channel bonding and MIMO. Channel bonding is the combination of multiple smaller channels into one large channel for greater bandwidth. MIMO is enhanced over 802.11n to allow for multiple inputs and outputs. 802.11ac also uses beamforming, but that helps the range, not the throughput.
Which of the following is the most secure wireless encryption standard for 802.11 networks?
WEP, WPA, WPA2, SAFER+
WPA2.
WEP was the original encryption standard developed for Wi‐Fi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. WPA3 is of course the safest, but it’s not one of the options. SAFER+ is used to encrypt Bluetooth communications.
You are upgrading a wireless network from Wi-Fi 5 over to Wi-Fi 6. Which of the following statements is not correct?
A) Users should get faster speeds.
B) Network range will be similar.
C) Fewer users will be able to use each access point.
D) Devices may have lower power usage while connecting to the network.
Fewer users will be able to use each access point..
Wi‐Fi 6 is faster than Wi‐Fi 5, and the network range is similar. More users should be able to access each access point, not fewer. Devices may have lower power usage in Wi‐Fi 6 due to a new sleep feature.
You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure? (Choose all that apply.)
Change the default administrator name and password.
Change the SSID.
Enable WEP.
Configure it to channel 11.
Change the default administrator name and password.
Change the SSID.
You should always change the default administrator name and password as well as the default SSID when installing a new wireless router. Enabling encryption is also a good idea, but WPA, WPA2, and WPA3 are better options than WEP. The channel has nothing to do with security.
You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?
DSL, Cable, Satellite, Fiber
Fiber.
Of the options listed, fiber provides the best speed. DSL and cable provide similar speeds but can’t match fiber. Satellite is the slowest of the options listed.
Which service allows users with private IP addresses to access the Internet using a public IP address?
DHCP, DNS, DSL, NAT
NAT.
Network Address Translation (NAT) allows users to have a private IP address and still access the Internet with a public IP address. NAT is installed on a router and translates the private IP address into a public address for the user to access the Internet. DHCP assigns IP configuration information to clients. DNS resolves hostnames to IP addresses. DSL is a type of broadband Internet access.
You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues?
2, 5, and 7
1, 8, and 14
1, 6, and 11
3, 6, and 9
1, 6, and 11.
There are 14 communication channels in the 2.4 GHz range, but only the first 11 are configurable. The three nonoverlapping channels are 1, 6, and 11.
You are setting up a wireless network. Which wireless standards would give the users over 40 Mbps throughput? (Choose all that apply.)
802.11ac, 802.11b, 802.11g, 802.11n
802.11ac, 802.11g, 802.11n
A, C, D. Three standards listed—802.11ac (1,300 Mbps), 802.11g (54 Mbps), and 802.11n (600 Mbps)—give users the required throughput. 802.11ax would do so as well, although it’s not an option.
You have been asked to configure a network for a small office. The wireless router is installed, and now you need to connect the client computers. What do you enter on the client computers to connect to the router?
The administrator password
The security passphrase
The client’s MAC address
The default router password
The security passphrase.
To join the network, client computers need to find the SSID, ensure that the security settings are correct (to match the router), and enter the security passphrase. As an administrator, you should have configured this passphrase to be different from the router’s administrator password.
Which of the following technologies can operate in the 125 kHz to 134 kHz range?
Bluetooth, RFID, NFC, LTE
RFID.
Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz, NFC is 13.56 MHz, and LTE is between 600 MHz and 6 GHz.
Due to channel interference, you are upgrading a wireless network from Wi-Fi 5 to Wi-Fi 6. Which feature of Wi-Fi 6 reduces channel interference?
OFDMA, BSS coloring, MU-MIMO, DFS
BSS coloring.
The feature of Wi‐Fi 6 that reduces channel interference is Basic Service Set (BSS) coloring, which adds a field to the wireless frame that distinguishes it from others. Orthogonal Frequency Division Multiple Access (OFDMA) is a modulation technique that improves speed because it allows transmission to multiple clients at once. MU‐MIMO also increases speed because in Wi‐Fi 6 it works for uplink connections as well as downlink ones. Dynamic Frequency Selection (DFS) was introduced with 802.11n, and it detects radar interference and adjusts frequencies accordingly.
Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key?
WEP, TKIP, AES, CCMP
TKIP.
WEP could use a 64‐bit or 128‐bit security key, but it was a static key. TKIP introduced a dynamic per‐packet key. AES and CCMP came after TKIP.
You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?
A) The user with 802.11b will access the network at 11 Mbps, while the users with 802.11g will access the network at 54 Mbps.
B) The user with 802.11b will not be able to communicate on the network.
C) The user with 802.11b will access the network at 11 Mbps. The users with 802.11g will access the network at 54 Mbps, unless they are communicating with the 802.11b device, which will be at 11 Mbps.
D) All users will access the network at 11 Mbps.
All users will access the network at 11 Mbps.
The good news is that 802.11g is backward compatible with 802.11b. The bad news is, if you run in a mixed environment, all devices that communicate with the WAP (or router) will be forced to slow down to accommodate the older technology.
When enabled, which feature of a wireless router allows only specified computers to access the network?
Port forwarding, WPS, SSID, MAC filtering
MAC filtering.
MAC filtering is a security option that can specify that only computers with specific MAC (hardware) addresses can access the network. Port forwarding is a feature of firewalls. WPS is an easy setup mechanism for wireless networks. SSID is the wireless network name.
A firewall operates by using a set of rules known as what?
SLA, ACL, NAT, APIPA
ACL.
The set of rules for access on a firewall is called an access control list (ACL). An SLA is an agreement on service level for QoS. NAT translates private IP addresses into public ones. APIPA assigns an IP address to a client that can’t reach the DHCP server.
You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?
WEP, WPA, WPA2, TKIP
WPA2.
If your router is using AES, the clients need to use WPA2. TKIP is a protocol utilized by WPA. WEP is the weakest of the encryption options.
Besides 802.11 standards, which wireless communication methods may also work in the 2.4 GHz range? (Choose all that apply.)
Bluetooth, Satellite, Long-range fixed wireless, mmWave, NFC
Bluetooth and Long-range fixed wireless.
Bluetooth also operates in the 2.4 GHz range, and long‐range fixed wireless can if it uses unlicensed frequencies. Satellite uses satellite waves; 5G cellular mmWave is between 24 GHz and 86 GHz, and NFC uses 13.56 MHz.
You are configuring a SOHO client to use TCP/IP. Which parameter is needed to tell the client where to communicate to get on the Internet?
Static address, Dynamic address, APIPA, Gateway
Gateway.
The gateway, also known as a default gateway, is the address to the router to take a client to the next network (or Internet). Gateways can be configured with a static assignment or dynamically through a DHCP server. APIPA will automatically configure a client with IP address information if it’s set to get its configuration from a DHCP server but none is available. APIPA‐configured clients can’t get on the Internet.
the wireless networking standard of 802.11a operates at a frequency of ____ and supports a speed of ____
5GHZ and 54Mbps
the wireless networking standard of 802.11n operates at a frequency of ____ and supports a speed of ____
2.4 and 5 GHz and up to 600Mbps
the wireless networking standard of 802.11b operates at a frequency of ____ and supports a speed of ____
2.4GHz and 11Mbps
the wireless networking standard of 802.11g operates at a frequency of ____ and supports a speed of ____
2.4GHz and 54Mbps
on a 2.4GHz wifi network, what are the three nonoverlapping channels
1, 6, 11
wireless 802.11b/g routers have a range of approximately _____ indoors and ____ outdoors
40m and 140m
a 10BaseT network uses _____ cabling and can transmit data at a speed of _____
twisted pair or UTP at 10Mbps
the four common types of broadband are ____
DSL, cable, satellite, and fiber optic
the most secure encryption protocol for 802.11 is ____
WPA3
wireless networks use ____ to identify themselves
SSID (service set identifiers)
two examples of 4G technology are ___
LTE (long term evolution) and
WiMAX (worldwide interoperability for microwave access)
firewalls filter packets based on a set of rules called a(n) ____
ACL (access control list)
UTP (unshielded twisted pair) cable has a maximum segment length of ___
100m
the method that translates between private and non-routable IP addresses and public IP addresses is ____
NAT (network address translation)
WPA2 (wifi protected access 2) employs what security method?
AES-CCMP (Advanced Encryption Standard Counter Mode with Cipher Block Chaining Message Authentication)
a firewall configuration where every computer is denied access except certain computers on a list is called a ____ list
white ( or allow)
cable TV and networking can use different types of ____ cable
coaxial
the oldest type of twisted pair cabling that can support speeds of 1 Gbps is ___
Cat5e
dial-up networking is limited to a speed of _____
56Kbps
another name for a hub on a wireless network is a _____
WAP (wireless access point)
to only allow access to certain computers on your wireless router, you can use ____ filtering.
MAC (media access control)
the T in 100BaseT refers to what?
twisted pair cabling
WPA (wifi protected access) employs what security method?
TKIP (temporal key integrity protocol)
what technology is designed to be “plug and play” for network devices?
UPnP (universal plug and play)
In order to connect to the wireless hub or router, the client needs to know the ____ of the network.
service-set identifier (SSID)
802.11 networks use the ____ ____ ___ ___ ___ ___ access method
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
_____ is the audio range in which the technology broadcasts
Frequency
______ are sub-divisions within a frequency.
channels
_______, which refers to how the computer converts digital information into signals that can be transmitted over the air
modulation
______ accomplishes communication by hopping the transmission over a range of predefined frequencies
FHSS, DSSS, OFDM
Frequency-hopping spread spectrum (FHSS)
______ accomplishes communication by adding the data that is to be transmitted to a higher-speed transmission.
FHSS, DSSS, OFDM
Direct-sequence spread spectrum (DSSS)
______ accomplishes communication by breaking the data into subsignals and transmitting them simultaneously
FHSS, DSSS, OFDM
Orthogonal frequency division multiplexing (OFDM)
The 802.11a standard provides WLAN bandwidth of up to ______ in the _____ frequency spectrum
54Mbps at 5GHz
The 802.11b standard provides WLAN bandwidth of up to _____ in the _____ frequency spectrum
11Mbps at 2.4GHz
The 802.11g standard provides WLAN bandwidth of up to _____ in the _____ frequency spectrum
54Mbps at 2.4GHz
The 802.11n standard provides WLAN bandwidth of up to _____ in the _____ frequency spectrum
600Mbps at 2.4GHz and 5GHz
______, which can allow for range increases by sending the wireless signal in the specific direction of the client, as opposed to broadcasting it omnidirectionally.
beamforming
The 802.11ac standard provides WLAN bandwidth of up to _____ in the _____ frequency spectrum
6.9Gbps at 5GHz
The 802.11ax standard provides WLAN bandwidth of up to _____ in the _____ frequency spectrum
9.6Gbps at 2.4GHz and 5GHz
Bluetooth Class 1 has a range of _____ and uses ____ (units) of power
100m and 100mW
Bluetooth Class 2 has a range of _____ and uses ____ (units) of power
10m and 2.5mW
Bluetooth Class 3 has a range of _____ and uses ____ (units) of power
1m and 1mW
Bluetooth Class 4 has a range of _____ and uses ____ (units) of power
0.5m and 0.5mW
______ is a point-to-point technology that uses directional antennas to send and receive network signals.
Long-range fixed wireless
An _____ system is made of three components: tag, reader, and antenna.
RFID
near-field communication (NFC) is designed to facilitate information sharing and, in particular, contactless payment. It transmits at ______ frequency
13.56 MHz
FTTH the cables are 100 percent fiber from their data centers to your home
fiber-to-the-home (FTTH)
FTTC This runs fiber to the phone or cable company’s utility box near the street and then runs copper from there to your house.
fiber-to-the-curb (FTTC)
FTTN the fiber runs only from their network to the junction box at the entrance to your neighborhood or possibly to your curb
fiber-to-the-node (FTTN)
eMBB
Enhanced Mobile Broadband (eMBB)
List the six different Internet connection types.
DSL, cable, fiber, satellite, cellular,
and wireless Internet service provider (WISP).
Cat 5 - Standard - max speed - max distance
Cat 5
100BaseTX
100 Mbps
100 meters
Cat 5e - Standard - max speed - max distance
Cat 5e
1000BaseT
1 Gbps
100 meters
Cat 6 - Standard - max speed - max distance
Cat 6
10GBaseT
10 Gbps
55 meters
Cat 6a - Standard - max speed - max distance
Cat 6a
10GBaseT
10 Gbps
100 meters
Cat 3 - Standard - max speed - max distance
Cat 3
10BaseT
10 Mbps
100 meters (∼300 feet)
Mulit Mode Fiber standard, max speed, max distance
10GBaseSR
10Gbps
300m
Single Mode Fiber standard, max speed, max distance
10GBaseLR
10Gbps
10Km
10GBaseER cable type, max speed, max distance
single mode fiber, 10Gbps, 40Km
Instead of using switches and hubs, wireless networks use either a _____ or a _____ to provide central connectivity.
wireless access point (WAP) or a wireless router
TKIP is associated with what wireless security standard?
WPA
AES is associated with what wireless security standard?
WPA2
There are ___ configurable channels in the 2.4 GHz range
11
DMZs are also called ____ _____
screened subnets
____ is a service that translates a private IP address on your internal network to a public IP address on the Internet.
Network Address Translation (NAT)
Which of the following are features that allow 802.11ac to achieve greater range?
MIMO, Beamforming, Channel bonding, Code division multiplexing
Beamforming
NFC operates on _____ MHz.
NFC uses 13.56 MHz.
Ofdma was introduced with which 802.11 standard?
A) 802.11g
B) 802.11n
C) 802.11ac
D) 802.11ax
802.11 ax
OFDMA orthogonal frequency division multiple access
Can handle Communications with several clients at once
Which of these accomplishes communication by breaking the data into sub signals and transmitting them simultaneously?
A) FHSS
B) DSSS
C) OFDM
D) RFID
OFDM - accomplishes communication by breaking the data into sub signals and transmitting them simultaneously. These Transmissions occur at different frequencies or sub-bands.
Which of these accomplishes Communications by hopping the transmission over a range of predefined frequencies?
A) FHSS
B) DSSS
C) OFDM
D) RFID
FHSS frequency hopping spread Spectrum
Which of these accomplishes communication by adding the data to be transmitted to a higher speed transmission. The higher speed transmission contains redundant information to ensure data accuracy. Each packet can then be reconstructed in the event of a disruption.
A) FHSS
B) DSSS
C) OFDM
D) RFID
DSSS - direct sequence spread Spectrum
Which of the following are features that allow 80 2.11ac to achieve higher data throughput?
A) MIMO
B) Beamforming
C) channel bonding
D) CDM
MIMO = multiple input multiple output
Channel bonding
Which of the following Network standards will not work with Category 5 cable?
A) 100 baseT
B) 10 baseT
C) 100 baseFX
D) 100 baseTX
100 baseFX uses fiber optic
100baseTX uses CAT5 and above
10baseT uses cat 3 and above
Which of the following security standards was the first to introduce a dynamic 128 bit per packet security key?
A) WEP
B) TKIP
C) AES
D) CCMP
TKIP
WEP could use a 6-4-bit or 128-bit security key, but it was a static key.
A technician needs to configure a wireless network for a company. Which wireless standard can he choose to get 600 Mbps bandwidth over either the 2.4 GHz or the 5 GHz frequency spectrum?
A) 802.11 b
B) 802.11 n
C) 802.11 a
D) 802.11 g
802.11 n
Which of the following 802.11 standards provides data transmission speeds up to 54 Mbps and is Backward Compatible with a slower technology?
A) 802.11 b
B) 802.11 g
C) 802.11 i
D) 802.11 a
802.11 g
Besides 802.11 standards, which wireless communication methods may work in the 2.4 GHz range?
A) long range fixed Wireless
B) satellite
C) Bluetooth
D) NFC
E) mmWave
Bluetooth
Long range fixed Wireless
mmWave = 24 & 86 Ghz
NFC = 13.56 MHz
Which of the following standard supports a bandwidth of up to 54 Mbps in a 2.4 frequency spectrum?
A) 802.11 a
B) 802.11 i
C) 802.11 b
D) 802.11 g
802.11 g
You are configuring a SOHO client to use TCP IP . Which parameter is needed to tell the client where to communicate to get on to the internet?
A) APIPA
B) dynamic address
C) static address
D) gateway
Gateway
What is the maximum range for a Bluetooth Class 2 device?
A) 1m
B) 0.5m
C) 100m
D) 10m
10m
What is the maximum range for a Bluetooth class 1 device?
A) 1m
B) 0.5m
C) 100m
D) 10m
100m
What is the maximum range for a Bluetooth class 3 device?
A) 1m
B) 0.5m
C) 100m
D) 10m
1m
What is the maximum range for a Bluetooth class 4 device?
A) 1m
B) 0.5m
C) 100m
D) 10m
0.5m
Which of the following Technologies can operate in the 125khz to 134 khc range?
A) RFID
B) Bluetooth
C) LTE
D) NFC
RFID
Which of the following wireless connection types utilize mimo on non-overlapping channels? Choose all that apply.
A) 802.11 b
B) 802.11 ac
C) 802.11 n
D) 802.11 a
802.11 ac
802.11 n
AES is associated with?
A) WPA
B) WEP
C) TKIP
D) WPA2
WPA2