Chapter 6 Flashcards
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction? A) reflection B) bounce C) diffraction D) scattering
C) diffraction
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal? A) reflection B) bounce C) diffraction D) scattering
D) scattering
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with? A) ifconfig B) iwconfig C) wlanconfig D) ipconfig
B) iwconfig
How many address fields exist in an 802.11 frame? A) 2 B) 3 C) 4 D) 6
C) 4
Select the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs: A) 5.1 GHz B) 5.3 GHz C) 5.4 GHz D) 5.9 GHz
D) 5.9 GHz
Which of the following is not a valid wireless network topology? A) bus B) infrastructure C) mesh D) ad hoc
A) bus
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds? A) 100 feet B) 200 feet C) 300 feet D) 600 feet
C) 300 feet
At what layer of the OSI model do the 802.11 standards vary? A) Physical layer B) Network layer C) Data link layer D) Transport layer
A) Physical layer
Which 802.11 standard was the first to utilize the 5 GHz band? A) 802.11b B) 802.11a C) 802.11g D) 802.11n
B) 802.11a
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band? A) 802.11a B) 802.11b C) 802.11n D) 802.11ac
D) 802.11ac
What is the maximum theoretical throughput of 802.11n? A) 54 Mbps B) 65 Mbps C) 600 Mbps D) 1.3 Gbps
C) 600 Mbps
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point? A) broadcast frame B) hello packet C) beacon frame D) announcement message
C) beacon frame
In IEEE terminology, a group of stations that share an access point are said to be part of what option below? A) extended service set B) basic service set C) modified service set D) generic service set
B) basic service set
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? A) management frames B) control frames C) data frames D) extended frames
A) management frames
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames? A) management frames B) control frames C) data frames D) extended frames
B) control frames
How does the 802.11 data frame indicate how a large packet should be fragmented?
A) It uses the preamble header
B) The frame check sequence dictates packet size
C) The sequence control field indicates how packets will be subdivided
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided
C) The sequence control field indicates how packets will be subdivided
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers A) MIMO B) channel bonding C) frame aggregation D) radio duplexing
A) MIMO
In an 802.11 data frame, what is the size of the frame check sequence field? A) 2 bytes B) 4 bytes C) 6 bytes D) 8 bytes
C) 6 bytes
How many data streams are used in 802.11ac Wave 2 devices? A) 2 data streams B) 3 data streams C) 4 data streams D) 8 data streams
C) 4 data streams
What is the max theoretical throughput of the 802.11ac wireless technology when using wave 1 devices? A) 600 Mbps B) 1.3 Gbps C) 3.47 Gbps D) 6.93 Gbps
B) 1.3 Gbps
The wireless spectrum, as defined by the FCC, spans between which two frequencies? A) 2 KHz B) 9 KHz C) 300 GHz D) 500 GHz
B) 9 KHz
C) 300 GHz
What two frequencies are used for most wireless networks? A) 900 MHz B) 2.4 GHz C) 4.9 GHz D) 5 GHz
B) 2.4 GHz
D) 5 GHz
At which two layers do wireless LANs operate? A) Layer 1 B) Layer 2 C) Layer 3 D) Layer 4
A) Layer 1
B) Layer 2
Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data, or download data without permission? A) bluesniffing B) bluejacking C) bluespoofing D) bluesnarfing
B) bluejacking
D) bluesnarfing
What two terms describe a wireless network topology in which access points work as peer devices on the same network? A) mesh WLAN B) infrastructure WLAN C) wireless gateway D) wireless mess network (WMN)
A) mesh WLAN
D) wireless mess network (WMN)
All wireless signals are carried through the air by electromagnetic waves.
(A) True
(B) False
True
Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor.
(A) True
(B) False
False
Multipath signaling is a significant cause of fading.
(A) True
(B) False
True
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.
(A) True
(B) False
False
The WPS PIN is vulnerable to brute force attacks.
(A) True
(B) False
(A)
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction? (A) reflection (B) bounce (C) diffraction (D) scattering
Answer : (C)
What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal? (A) reflection (B) bounce (C) diffraction (D) scattering
Answer : (D)
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with? (A) ifconfig (B) iwconfig (C) wlanconfig (D) ipconfig
Answer : (B)
How many address fields exist in an 802.11 frame? (A) 2 (B) 3 (C) 4 (D) 6
Answer : (C)
Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs: (A) 5.1 GHz (B) 5.3 GHz (C) 5.4 GHz (D) 5.9 GHz
Answer : (D)
Which of the following is not a valid wireless network topology? (A) bus (B) infrastructure (C) mesh (D) ad hoc
Answer : (A)
Ideally, stations must remain within what range of an access point in order to maintain optimal transmission speeds? (A) 100 feet (B) 200 feet (C) 300 feet (D) 600 feet
Answer : (C)
At what layer of the OSI model do the 802.11 standards vary? (A) Physical layer (B) Network layer (C) Data link layer (D) Transport layer
Answer : (A)
Which 802.11 standard was the first to utilize the 5 GHz band? (A) 802.11b (B) 802.11a (C) 802.11g (D) 802.11n
Answer : (B)
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band? (A) 802.11a (B) 802.11b (C) 802.11n (D) 802.11ac
Answer : (D)
What is the maximum theoretical throughput of 802.11n? (A) 54 Mbps (B) 65 Mbps (C) 600 Mbps (D) 1.3 Gbps
Answer : (C)
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point? (A) broadcast frame (B) hello packet (C) beacon frame (D) announcement message
Answer : (C)
In IEEE terminology, a group of stations that share an access point are said to be part of what option below? (A) extended service set (B) basic service set (C) modified service set (D) generic service set
Answer : (B)
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? (A) management frames (B) control frames (C) data frames D) extended frames
Answer : (A)
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames? (A) management frames
(B) control frames
(C) data frames
(D) extended frames
Answer : (B)
How does the 802.11 data frame indicate how a large packet should be fragmented?
(A) It uses the preamble header
(B) The frame check sequence dictates packet size
(C) The sequence control field indicates how packets will be subdivided
(D) The duration field determines how long the station can transmit a packet, which then determines how it is divided.
Answer : (C)
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that
can issue a signal to one or more receivers?
(A) MIMO
(B) channel bonding
(C) frame aggregation
(D) radio duplexing
Answer : (A)
In an 802.11 data frame, what is the size of the frame check sequence field? (A) 2 bytes (B) 4 bytes (C) 6 bytes (D) 8 bytes
Answer : (C)
How many data streams are used in 802.11ac Wave 2 devices? (A) 2 data streams (B) 3 data streams (C) 4 data streams (D) 8 data streams
Answer : (C)
What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices? (A) 600 Mbps (B) 1.3 Gbps (C) 3.47 Gbps (D) 6.93 Gbps
Answer : (B)
_________________ is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.
Answer : Infrared (IR)
The proportion of noise to the strength of a signal is called the _________________.
Answer : signal-to-noise ratio (SNR or S/N)
Access points that include routing functions are also called _______________.
Answer : wireless routers Answer : wireless gateways
__________________ is a form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).
Answer : NFC (near field communication)
All 802.11 standards use ______________ signaling, meaning a wireless station can only transmit or receive, but cannot do both simultaneously.
Answer : half-duplex
What is the lowest layer of the OSI model at which wired and wireless transmissions share
the same protocols?
Answer: B. Layer 3
Which three wireless transmission types require a clear LOS to function?
Answer: C. Wi-Fi
Which Bluetooth class has the highest power output?
Answer: A. Class 1
A hacker takes advantage of a Bluetooth connection to send a virus to a user’s phone. What
kind of security breach has occurred?
Answer: D. Bluejacking
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she
wants to see later that evening. What wireless technology transmitted the data?
Answer: C. NFC (near-field communication)
A student has completed his part of a group research paper, and needs to share it with a
classmate. He sees the classmate as they’re crossing the parking lot between classes. Which
WLAN architecture could they use to transfer the file from one laptop to the other?
Answer: A. Ad hoc
Which 802.11 standard can be used in both the 2.4-GHz and the 5-GHz bands?
Answer: B. 802.11n
All wireless signals are carried through the air by electromagnetic waves.
Answer: True
The ____________________ is a continuum of the electromagnetic waves used for data and voice communication.
Answer: wireless spectrum
____________________ are used for both the transmission and reception of wireless signals.
Answer: Antennas
____ signals follow a number of different paths to their destination because of reflection, diffraction, and scattering.
a. Multipath
b. Opened
c. Closed
d. Variable
Answer: A
Wireless signals cannot depend on a(n) ____________________ or shielding to protect them from extraneous EMI.
Answer: conduit
Which type of wireless network consists of wireless nodes that transmit directly to each other via wireless NICs without an intervening connectivity device?
a. mesh WLAN
b. infrastructure WLAN
c. ad hoc WLAN
d. AP WLAN
Answer: C
The five 802.11 standards (802.11b, 802.11a, 802.11g, 802.11n, 802.11ac) are collectively known as ____.
a. WiMAX
b. Wi-Fi
c. Bluetooth
d. Open
Answer: B
802.11 networks use the same access method as Ethernet networks.
Answer: False
The 802.11 standard specifies a frame type at the ____________________ sublayer.
Answer: MAC
In which of the following best describes an innovation where multiple antennas on an access point may issue a signal to one or more receivers?
a. MIMO
b. MU-MIMO
c. channel bonding
d. frame aggregation
Answer: D
How is a wireless NIC different from a NIC that requires a cable?
a. A wireless NIC contains an antenna.
b. A wireless NIC contains a chip, which does additional processing at higher levels of the OSI model.
c. A wireless NIC requires an external power source.
d. A wireless NIC requires an external antenna
a. A wireless NIC contains an antenna.
In which of the following ways does a wireless LAN differ from an Ethernet LAN?
a. A wireless LAN requires additional protocols in the TCP/IP suite.
b. A wireless LAN uses completely different protocols than an Ethernet LAN.
c. A wireless LAN uses different techniques at the Physical layer to transmit data.
d. A wireless LAN uses different techniques at the Data Link layer to transmit frames.
c. A wireless LAN uses different techniques at the Physical layer to transmit data
Which of the following are potential disadvantages of wireless LANs as compared with cabled LANs? (Choose all that apply.)
a. Controlling access to a wireless LAN is more difficult.
b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN.
c. The additional protocols required by wireless LANs create additional overhead.
d. Signal strength can be affected by many sources of electronic noise.
a. Controlling access to a wireless LAN is more difficult.
b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN.
d. Signal strength can be affected by many sources of electronic noise.
Why is a wireless signal susceptible to noise?
a. Wireless NICs are usually poorly made.
b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.
c. Wireless NICs do not support the network protocols necessary for error correction.
d. Wireless NICs rely on the upper levels of the OSI model for error correction.
b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.
You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN?
a. Wireless LAN users have the same access as users attached to the Ethernet network.
b. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network.
c. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network without special security software.
d. Wireless LAN users must use their own wireless ISP.
c. Wireless LAN users may surf the Web, but may not access the rest of the bank’s network without special security software.
What term is used to describe when a mobile user moves out of one access point’s range and into the range of another?
a. Reassociation
b. Deassociation
c. Reallocation
d. Extending the service set
Reassociation
What is the administrator’s default account called in Linux?
a. Admin
b. Administrator
c. default
d. root
d. root
Where is the Network Manager service located?
a. /user
b. /sbin/service
c. /etc/NetworkManager
d. /Network/Manager
b. /sbin/service
What Linux command is used to test network connections? a. root
b. sudo
c. ping
d. start
c. ping
Which of the following Wi-Fi standards has the highest effective throughput?
a. 802.11g
b. 802.11a
c. 802.11b
d. 802.11n
d. 802.11n
Wireless access points are assigned a unique name or _____.
a. FHSS
b. DSSS
c. CSMA
d. SSID
d. SSID
What does SSID stand for?
a. Service set identifier
b. Security service Internet domain
c. Security station identification
d. Simple security Internet device
a. Service set identifier
WEP, WPA, and WPA2 are all forms of wireless ______________ .
a. Access
b. Routers
c. Services
d. Encryption
d. Encryption
You can limit access to certain computers with:
a. Encryption
b. MAC filtering
c. Remote administration
d. Using a strong password
b. MAC filtering
A rogue access point set up to look like a legitimate access point is called a(n) ____.
a. Guest network
b. Evil twin
c. Remote bridge
d. Password sniffer
b. Evil twin
A major security weakness of WEP is the fact that it uses a _____ network key.
a. 48-bit
b. Shared
c. Dynamic
d. Single-use
b. Shared
Which wireless networking standard operates in both the 2.4-GHz and 5-GHz bands?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
d. 802.11n
What feature will eliminate the need for a separate electrical outlet for your WAP?
a. PoE
b. WPA
c. WPA2
d. 802.11n
POE
Why is plenum-rated cable often a requirement for ceiling-mounted access points?
a. Ceiling-mounted APs are more than seven feet off the ground.
b. They work at higher speeds.
c. They need to operate at higher temperatures.
d. In the case of a fire, they do not give off toxic fumes.
d. In the case of a fire, they do not give off toxic fumes.
In an enterprise-wide WLAN, coverage can be extended across multiple access points by joining them to the same ____.
a. ESS
b. WPA
c. MAC
d. MIMO
a. ESS
Some wireless access points can associate a client’s MAC address with a port on a switch allowing a client to stay connected to a ____ as it moves throughout an area.
a. DSSS
b. FHSS
c. RTS/CTS
d. VLA
d. VLAN
How many channels are available on the 2.4-GHz band?
a. 6
b. 11
c. 12
d. 24
b. 11