Chapter 6: Wireless Networking Flashcards
802.11ac Wave 2 devices can theoretically support how much maximum throughput?
Group of answer choices
3.47 Gbps
600 Mbps
6.93 Gbps
1.3 Gbps
3.47 Gbps
A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?
Group of answer choices
ping frame
association request
probe frame
beacon frame
probe frame
Diffraction has what affect on a wireless signal’s propagation?
Group of answer choices
The signal is returned back towards the source of the original signal.
The signal is split into secondary waves that continue in the direction in which they split.
The signal is redirected into multiple directions.
The signal is completely absorbed by the diffracting material.
The signal is split into secondary waves that continue in the direction in which they split.
Healing messages are a feature of what smart home protocol?
Group of answer choices
Z-Wave
Bluetooth
ZigBee
ANT+
Z-Wave
How does the 802.11 data frame indicate how a large packet should be fragmented?
Group of answer choices
The sequence control field indicates how packets will be subdivided.
The frame check sequence dictates the calculated packet size.
The duration field determines how long the station can transmit a packet, which then determines how it is divided.
It uses the preamble header to estimate the ideal packet size.
The sequence control field indicates how packets will be subdivided.
How many data streams are used in 802.11ac Wave 2 devices?
Group of answer choices
3 data streams
2 data streams
4 data streams
8 data streams
4 data streams
In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?
Group of answer choices
basic service set
modified service set
generic service set
extended service set
basic service set
In Linux, what command can be used for viewing and setting wireless interface parameters?
Group of answer choices
wlanconf
wifid
ifconfig
iwconfig
iwconfig
In an 802.11 data frame, what is the size of the frame check sequence field?
Group of answer choices
8 bytes
4 bytes
6 bytes
2 bytes
6 bytes
Near-field communication devices send data at what fixed frequency?
Group of answer choices
8.65 MHz
13.56 MHz
21.39 MHz
47.1 MHz
13.56 MHz
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
Group of answer choices
spread spectrum frequency hopping
channel bonding
frame aggregation
multiple input-multiple output (MIMO)
multiple input-multiple output (MIMO)
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
Group of answer choices
3 MHz and 300 GHz
9 kHz and 300 GHz
3 kHz and 500 GHz
125 kHz and 150 GHz
9 kHz and 300 GHz
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
Group of answer choices
data frames
control frames
management frames
extended frames
management frames
What is the purpose of the Layer 2 LLC sublayer?
Group of answer choices
It is used to manage low-level encryption on a network.
It is used to handle multiplexing, flow and error control, and reliability.
It performs management of the physical layer’s modulation techniques.
It is used to manage MAC addresses in message frames.
It is used to handle multiplexing, flow and error control, and reliability.
What scenario describes an evil twin attack?
Group of answer choices
A malicious access point is configured with the SSID of a non-malicious public access point.
An attacker is actively attempting to brute force the PIN of a WPS enabled access point.
A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.
A hacker is actively sending wireless probes to discover available wireless networks.
A malicious access point is configured with the SSID of a non-malicious public access point.