Chapter 6 Flashcards

1
Q
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?
A) reflection
B) bounce
C) diffraction
D) scattering
A

C) diffraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?
A) reflection
B) bounce
C) diffraction
D) scattering
A

D) scattering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?
A) ifconfig
B) iwconfig
C) wlanconfig
D) ipconfig
A

B) iwconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
How many address fields exist in an 802.11 frame?
A) 2
B) 3
C) 4
D) 6
A

C) 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Select the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:
A) 5.1 GHz
B) 5.3 GHz
C) 5.4 GHz
D) 5.9 GHz
A

D) 5.9 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is not a valid wireless network topology?
A) bus
B) infrastructure
C) mesh
D) ad hoc
A

A) bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds?
A) 100 feet
B) 200 feet
C) 300 feet
D) 600 feet
A

C) 300 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
At what layer of the OSI model do the 802.11 standards vary?
A) Physical layer
B) Network layer
C) Data link layer
D) Transport layer
A

A) Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which 802.11 standard was the first to utilize the 5 GHz band?
A) 802.11b
B) 802.11a
C) 802.11g
D) 802.11n
A

B) 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?
A) 802.11a
B) 802.11b
C) 802.11n
D) 802.11ac
A

D) 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What is the maximum theoretical throughput of 802.11n?
A) 54 Mbps
B) 65 Mbps
C) 600 Mbps
D) 1.3 Gbps
A

C) 600 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?
A) broadcast frame
B) hello packet
C) beacon frame
D) announcement message
A

C) beacon frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
In IEEE terminology, a group of stations that share an access point are said to be part of what option below?
A) extended service set
B) basic service set
C) modified service set
D) generic service set
A

B) basic service set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
A) management frames
B) control frames
C) data frames
D) extended frames
A

A) management frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
A) management frames
B) control frames
C) data frames
D) extended frames
A

B) control frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the 802.11 data frame indicate how a large packet should be fragmented?
A) It uses the preamble header
B) The frame check sequence dictates packet size
C) The sequence control field indicates how packets will be subdivided
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided

A

C) The sequence control field indicates how packets will be subdivided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers
A) MIMO
B) channel bonding
C) frame aggregation
D) radio duplexing
A

A) MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
In an 802.11 data frame, what is the size of the frame check sequence field?
A) 2 bytes
B) 4 bytes
C) 6 bytes
D) 8 bytes
A

C) 6 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
How many data streams are used in 802.11ac Wave 2 devices?
A) 2 data streams
B) 3 data streams
C) 4 data streams
D) 8 data streams
A

C) 4 data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
What is the max theoretical throughput of the 802.11ac wireless technology when using wave 1 devices?
A) 600 Mbps
B) 1.3 Gbps
C) 3.47 Gbps
D) 6.93 Gbps
A

B) 1.3 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
A) 2 KHz
B) 9 KHz
C) 300 GHz
D) 500 GHz
A

B) 9 KHz

C) 300 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
What two frequencies are used for most wireless networks?
A) 900 MHz
B) 2.4 GHz
C) 4.9 GHz
D) 5 GHz
A

B) 2.4 GHz

D) 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
At which two layers do wireless LANs operate?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
A

A) Layer 1

B) Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data, or download data without permission?
A) bluesniffing
B) bluejacking
C) bluespoofing
D) bluesnarfing
A

B) bluejacking

D) bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
What two terms describe a wireless network topology in which access points work as peer devices on the same network?
A) mesh WLAN
B) infrastructure WLAN
C) wireless gateway
D) wireless mess network (WMN)
A

A) mesh WLAN

D) wireless mess network (WMN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

All wireless signals are carried through the air by electromagnetic waves.
(A) True
(B) False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor.​
(A) True
(B) False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Multipath signaling is a significant cause of fading.​
(A) True
(B) False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.​
(A) True
(B) False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The WPS PIN is vulnerable to brute force attacks.​
(A) True
(B) False

A

(A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
​What signal propagation phenomena causes a wireless signal to split into secondary waves when
it encounters an obstruction? 
(A) ​reflection 
(B) ​bounce 
(C) ​diffraction 
(D) ​scattering
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?​ 
(A) ​reflection 
(B) ​bounce 
(C) ​diffraction 
(D) ​scattering
A

Answer : (D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?​ 
(A) ​ifconfig 
(B) ​iwconfig 
(C) ​wlanconfig 
(D) ​ipconfig
A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
How many address fields exist in an 802.11 frame?​ 
(A) ​2 
(B) ​3 
(C) ​4 
(D) ​6
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Select below the band that is not one of the four frequency bands used in the 5 GHz range for
wireless LANs:​ 
(A) ​5.1 GHz 
(B) ​5.3 GHz 
(C) ​5.4 GHz 
(D) ​5.9 GHz
A

Answer : (D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following is not a valid wireless network topology? 
(A) ​bus 
(B) ​infrastructure 
(C) mesh​ 
(D) ​ad hoc
A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds?​ 
(A) ​100 feet 
(B) ​200 feet 
(C) ​300 feet 
(D) ​600 feet
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
​At what layer of the OSI model do the 802.11 standards vary? 
(A) ​Physical layer
(B) ​Network layer 
(C) ​Data link layer 
(D) ​Transport layer
A

Answer : (A)

39
Q
Which 802.11 standard was the first to utilize the 5 GHz band?​
(A) ​802.11b 
(B) ​802.11a 
(C) ​802.11g 
(D) ​802.11n
A

Answer : (B)

40
Q
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?​ 
(A) ​802.11a 
(B) ​802.11b 
(C) ​802.11n 
(D) ​802.11ac
A

Answer : (D)

41
Q
What is the maximum theoretical throughput of 802.11n?​ 
(A) ​54 Mbps 
(B) ​65 Mbps 
(C) ​600 Mbps 
(D) ​1.3 Gbps
A

Answer : (C)

42
Q
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?
(A) broadcast frame​ 
(B) ​hello packet 
(C) ​beacon frame 
(D) ​announcement message
A

Answer : (C)

43
Q
In IEEE terminology, a group of stations that share an access point are said to be part of what option below?
(A) extended service set 
(B) ​basic service set 
(C) ​modified service set 
(D) ​generic service set
A

Answer : (B)

44
Q
​What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? 
(A) ​management frames 
(B) ​control frames 
(C) ​data frames 
D) ​extended frames
A

Answer : (A)

45
Q

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?​ (A) ​management frames
(B) ​control frames
(C) ​data frames
(D) ​extended frames

A

Answer : (B)

46
Q

How does the 802.11 data frame indicate how a large packet should be fragmented?​
(A) ​It uses the preamble header
(B) ​The frame check sequence dictates packet size
(C) ​The sequence control field indicates how packets will be subdivided
(D) ​The duration field determines how long the station can transmit a packet, which then determines how it is divided.

A

Answer : (C)

47
Q

Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that
can issue a signal to one or more receivers?​
(A) ​MIMO
(B) ​channel bonding
(C) ​frame aggregation
(D) ​radio duplexing

A

Answer : (A)

48
Q
In an 802.11 data frame, what is the size of the frame check sequence field?​ 
(A) ​2 bytes 
(B) ​4 bytes 
(C) ​6 bytes 
(D) ​8 bytes
A

Answer : (C)

49
Q
How many data streams are used in 802.11ac Wave 2 devices?​ 
(A) ​2 data streams 
(B) ​3 data streams 
(C) ​4 data streams 
(D) ​8 data streams
A

Answer : (C)

50
Q
What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?​ 
(A) ​600 Mbps 
(B) ​1.3 Gbps 
(C) ​3.47 Gbps 
(D) ​6.93 Gbps
A

Answer : (B)

51
Q

_________________ is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.

A

​Answer : Infrared (IR)

52
Q

The proportion of noise to the strength of a signal is called the _________________.​

A

Answer : signal-to-noise ratio (SNR or S/N)

53
Q

Access points that include routing functions are also called _______________.​

A

Answer : wireless routers Answer : wireless gateways

54
Q

__________________ is a form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).​

A

Answer : NFC (near field communication)

55
Q

All 802.11 standards use ______________ signaling, meaning a wireless station can only transmit or receive, but cannot do both simultaneously.​

A

Answer : half-duplex

56
Q

What is the lowest layer of the OSI model at which wired and wireless transmissions share
the same protocols?

A

Answer: B. Layer 3

57
Q

Which three wireless transmission types require a clear LOS to function?

A

Answer: C. Wi-Fi

58
Q

Which Bluetooth class has the highest power output?

A

Answer: A. Class 1

59
Q

A hacker takes advantage of a Bluetooth connection to send a virus to a user’s phone. What
kind of security breach has occurred?

A

Answer: D. Bluejacking

60
Q

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she
wants to see later that evening. What wireless technology transmitted the data?

A

Answer: C. NFC (near-field communication)

61
Q

A student has completed his part of a group research paper, and needs to share it with a
classmate. He sees the classmate as they’re crossing the parking lot between classes. Which
WLAN architecture could they use to transfer the file from one laptop to the other?

A

Answer: A. Ad hoc

62
Q

Which 802.11 standard can be used in both the 2.4-GHz and the 5-GHz bands?

A

Answer: B. 802.11n

63
Q

All wireless signals are carried through the air by electromagnetic waves.

A

Answer: True

64
Q

The ____________________ is a continuum of the electromagnetic waves used for data and voice communication.

A

Answer: wireless spectrum

65
Q

____________________ are used for both the transmission and reception of wireless signals.

A

Answer: Antennas

66
Q

____ signals follow a number of different paths to their destination because of reflection, diffraction, and scattering.

a. Multipath
b. Opened
c. Closed
d. Variable

A

Answer: A

67
Q

Wireless signals cannot depend on a(n) ____________________ or shielding to protect them from extraneous EMI.

A

Answer: conduit

68
Q

Which type of wireless network consists of wireless nodes that transmit directly to each other via wireless NICs without an intervening connectivity device?

a. mesh WLAN
b. infrastructure WLAN
c. ad hoc WLAN
d. AP WLAN

A

Answer: C

69
Q

The five 802.11 standards (802.11b, 802.11a, 802.11g, 802.11n, 802.11ac) are collectively known as ____.

a. WiMAX
b. Wi-Fi
c. Bluetooth
d. Open

A

Answer: B

70
Q

802.11 networks use the same access method as Ethernet networks.

A

Answer: False

71
Q

The 802.11 standard specifies a frame type at the ____________________ sublayer.

A

Answer: MAC

72
Q

In which of the following best describes an innovation where multiple antennas on an access point may issue a signal to one or more receivers?

a. MIMO
b. MU-MIMO
c. channel bonding
d. frame aggregation

A

Answer: D

73
Q

How is a wireless NIC different from a NIC that requires a cable?

a. A wireless NIC contains an antenna.
b. A wireless NIC contains a chip, which does additional processing at higher levels of the OSI model.
c. A wireless NIC requires an external power source.
d. A wireless NIC requires an external antenna

A

a. A wireless NIC contains an antenna.

74
Q

In which of the following ways does a wireless LAN differ from an Ethernet LAN?

a. A wireless LAN requires additional protocols in the TCP/IP suite.
b. A wireless LAN uses completely different protocols than an Ethernet LAN.
c. A wireless LAN uses different techniques at the Physical layer to transmit data.
d. A wireless LAN uses different techniques at the Data Link layer to transmit frames.

A

c. A wireless LAN uses different techniques at the Physical layer to transmit data

75
Q

Which of the following are potential disadvantages of wireless LANs as compared with cabled LANs? (Choose all that apply.)

a. Controlling access to a wireless LAN is more difficult.
b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN.
c. The additional protocols required by wireless LANs create additional overhead.
d. Signal strength can be affected by many sources of electronic noise.

A

a. Controlling access to a wireless LAN is more difficult.
b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN.
d. Signal strength can be affected by many sources of electronic noise.

76
Q

Why is a wireless signal susceptible to noise?

a. Wireless NICs are usually poorly made.
b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.
c. Wireless NICs do not support the network protocols necessary for error correction.
d. Wireless NICs rely on the upper levels of the OSI model for error correction.

A

b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.

77
Q

You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN?

a. Wireless LAN users have the same access as users attached to the Ethernet network.
b. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network.
c. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network without special security software.
d. Wireless LAN users must use their own wireless ISP.

A

c. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network without special security software.

78
Q

What term is used to describe when a mobile user moves out of one access point’s range and into the range of another?

a. Reassociation
b. Deassociation
c. Reallocation
d. Extending the service set

A

Reassociation

79
Q

What is the administrator’s default account called in Linux?

a. Admin
b. Administrator
c. default
d. root

A

d. root

80
Q

Where is the Network Manager service located?

a. /user
b. /sbin/service
c. /etc/NetworkManager
d. /Network/Manager

A

b. /sbin/service

81
Q

What Linux command is used to test network connections? a. root

b. sudo
c. ping
d. start

A

c. ping

82
Q

Which of the following Wi-Fi standards has the highest effective throughput?

a. 802.11g
b. 802.11a
c. 802.11b
d. 802.11n

A

d. 802.11n

83
Q

Wireless access points are assigned a unique name or _____.

a. FHSS
b. DSSS
c. CSMA
d. SSID

A

d. SSID

84
Q

What does SSID stand for?

a. Service set identifier
b. Security service Internet domain
c. Security station identification
d. Simple security Internet device

A

a. Service set identifier

85
Q

WEP, WPA, and WPA2 are all forms of wireless ______________ .

a. Access
b. Routers
c. Services
d. Encryption

A

d. Encryption

86
Q

You can limit access to certain computers with:

a. Encryption
b. MAC filtering
c. Remote administration
d. Using a strong password

A

b. MAC filtering

87
Q

A rogue access point set up to look like a legitimate access point is called a(n) ____.

a. Guest network
b. Evil twin
c. Remote bridge
d. Password sniffer

A

b. Evil twin

88
Q

A major security weakness of WEP is the fact that it uses a _____ network key.

a. 48-bit
b. Shared
c. Dynamic
d. Single-use

A

b. Shared

89
Q

Which wireless networking standard operates in both the 2.4-GHz and 5-GHz bands?

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n

A

d. 802.11n

90
Q

What feature will eliminate the need for a separate electrical outlet for your WAP?

a. PoE
b. WPA
c. WPA2
d. 802.11n

A

POE

91
Q

Why is plenum-rated cable often a requirement for ceiling-mounted access points?

a. Ceiling-mounted APs are more than seven feet off the ground.
b. They work at higher speeds.
c. They need to operate at higher temperatures.
d. In the case of a fire, they do not give off toxic fumes.

A

d. In the case of a fire, they do not give off toxic fumes.

92
Q

In an enterprise-wide WLAN, coverage can be extended across multiple access points by joining them to the same ____.

a. ESS
b. WPA
c. MAC
d. MIMO

A

a. ESS

93
Q

Some wireless access points can associate a client’s MAC address with a port on a switch allowing a client to stay connected to a ____ as it moves throughout an area.

a. DSSS
b. FHSS
c. RTS/CTS
d. VLA

A

d. VLAN

94
Q

How many channels are available on the 2.4-GHz band?

a. 6
b. 11
c. 12
d. 24

A

b. 11