Chapter 6 Flashcards
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction? A) reflection B) bounce C) diffraction D) scattering
C) diffraction
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal? A) reflection B) bounce C) diffraction D) scattering
D) scattering
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with? A) ifconfig B) iwconfig C) wlanconfig D) ipconfig
B) iwconfig
How many address fields exist in an 802.11 frame? A) 2 B) 3 C) 4 D) 6
C) 4
Select the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs: A) 5.1 GHz B) 5.3 GHz C) 5.4 GHz D) 5.9 GHz
D) 5.9 GHz
Which of the following is not a valid wireless network topology? A) bus B) infrastructure C) mesh D) ad hoc
A) bus
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds? A) 100 feet B) 200 feet C) 300 feet D) 600 feet
C) 300 feet
At what layer of the OSI model do the 802.11 standards vary? A) Physical layer B) Network layer C) Data link layer D) Transport layer
A) Physical layer
Which 802.11 standard was the first to utilize the 5 GHz band? A) 802.11b B) 802.11a C) 802.11g D) 802.11n
B) 802.11a
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band? A) 802.11a B) 802.11b C) 802.11n D) 802.11ac
D) 802.11ac
What is the maximum theoretical throughput of 802.11n? A) 54 Mbps B) 65 Mbps C) 600 Mbps D) 1.3 Gbps
C) 600 Mbps
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point? A) broadcast frame B) hello packet C) beacon frame D) announcement message
C) beacon frame
In IEEE terminology, a group of stations that share an access point are said to be part of what option below? A) extended service set B) basic service set C) modified service set D) generic service set
B) basic service set
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? A) management frames B) control frames C) data frames D) extended frames
A) management frames
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames? A) management frames B) control frames C) data frames D) extended frames
B) control frames
How does the 802.11 data frame indicate how a large packet should be fragmented?
A) It uses the preamble header
B) The frame check sequence dictates packet size
C) The sequence control field indicates how packets will be subdivided
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided
C) The sequence control field indicates how packets will be subdivided
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers A) MIMO B) channel bonding C) frame aggregation D) radio duplexing
A) MIMO
In an 802.11 data frame, what is the size of the frame check sequence field? A) 2 bytes B) 4 bytes C) 6 bytes D) 8 bytes
C) 6 bytes
How many data streams are used in 802.11ac Wave 2 devices? A) 2 data streams B) 3 data streams C) 4 data streams D) 8 data streams
C) 4 data streams
What is the max theoretical throughput of the 802.11ac wireless technology when using wave 1 devices? A) 600 Mbps B) 1.3 Gbps C) 3.47 Gbps D) 6.93 Gbps
B) 1.3 Gbps
The wireless spectrum, as defined by the FCC, spans between which two frequencies? A) 2 KHz B) 9 KHz C) 300 GHz D) 500 GHz
B) 9 KHz
C) 300 GHz
What two frequencies are used for most wireless networks? A) 900 MHz B) 2.4 GHz C) 4.9 GHz D) 5 GHz
B) 2.4 GHz
D) 5 GHz
At which two layers do wireless LANs operate? A) Layer 1 B) Layer 2 C) Layer 3 D) Layer 4
A) Layer 1
B) Layer 2
Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data, or download data without permission? A) bluesniffing B) bluejacking C) bluespoofing D) bluesnarfing
B) bluejacking
D) bluesnarfing
What two terms describe a wireless network topology in which access points work as peer devices on the same network? A) mesh WLAN B) infrastructure WLAN C) wireless gateway D) wireless mess network (WMN)
A) mesh WLAN
D) wireless mess network (WMN)
All wireless signals are carried through the air by electromagnetic waves.
(A) True
(B) False
True
Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor.
(A) True
(B) False
False
Multipath signaling is a significant cause of fading.
(A) True
(B) False
True
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.
(A) True
(B) False
False
The WPS PIN is vulnerable to brute force attacks.
(A) True
(B) False
(A)
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction? (A) reflection (B) bounce (C) diffraction (D) scattering
Answer : (C)
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal? (A) reflection (B) bounce (C) diffraction (D) scattering
Answer : (D)
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with? (A) ifconfig (B) iwconfig (C) wlanconfig (D) ipconfig
Answer : (B)
How many address fields exist in an 802.11 frame? (A) 2 (B) 3 (C) 4 (D) 6
Answer : (C)
Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs: (A) 5.1 GHz (B) 5.3 GHz (C) 5.4 GHz (D) 5.9 GHz
Answer : (D)
Which of the following is not a valid wireless network topology? (A) bus (B) infrastructure (C) mesh (D) ad hoc
Answer : (A)
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds? (A) 100 feet (B) 200 feet (C) 300 feet (D) 600 feet
Answer : (C)