Chapter 6: Wireless Networking Flashcards

1
Q

802.11ac Wave 2 devices can theoretically support how much maximum throughput?
Group of answer choices

3.47 Gbps

600 Mbps

6.93 Gbps

1.3 Gbps

A

3.47 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?
Group of answer choices

ping frame

association request

probe frame

beacon frame

A

probe frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Diffraction has what affect on a wireless signal’s propagation?
Group of answer choices

The signal is returned back towards the source of the original signal.

The signal is split into secondary waves that continue in the direction in which they split.

The signal is redirected into multiple directions.

The signal is completely absorbed by the diffracting material.

A

The signal is split into secondary waves that continue in the direction in which they split.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Healing messages are a feature of what smart home protocol?
Group of answer choices

Z-Wave

Bluetooth

ZigBee

ANT+

A

Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the 802.11 data frame indicate how a large packet should be fragmented?
Group of answer choices

The sequence control field indicates how packets will be subdivided.

The frame check sequence dictates the calculated packet size.

The duration field determines how long the station can transmit a packet, which then determines how it is divided.

It uses the preamble header to estimate the ideal packet size.

A

The sequence control field indicates how packets will be subdivided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many data streams are used in 802.11ac Wave 2 devices?
Group of answer choices

3 data streams

2 data streams

4 data streams

8 data streams

A

4 data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?
Group of answer choices

basic service set

modified service set

generic service set

extended service set

A

basic service set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Linux, what command can be used for viewing and setting wireless interface parameters?
Group of answer choices

wlanconf

wifid

ifconfig

iwconfig

A

iwconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In an 802.11 data frame, what is the size of the frame check sequence field?
Group of answer choices

8 bytes

4 bytes

6 bytes

2 bytes

A

6 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Near-field communication devices send data at what fixed frequency?
Group of answer choices

8.65 MHz

13.56 MHz

21.39 MHz

47.1 MHz

A

13.56 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
Group of answer choices

spread spectrum frequency hopping

channel bonding

frame aggregation

multiple input-multiple output (MIMO)

A

multiple input-multiple output (MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The wireless spectrum, as defined by the FCC, spans between which two frequencies?
Group of answer choices

3 MHz and 300 GHz

9 kHz and 300 GHz

3 kHz and 500 GHz

125 kHz and 150 GHz

A

9 kHz and 300 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
Group of answer choices

data frames

control frames

management frames

extended frames

A

management frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the Layer 2 LLC sublayer?
Group of answer choices

It is used to manage low-level encryption on a network.

It is used to handle multiplexing, flow and error control, and reliability.

It performs management of the physical layer’s modulation techniques.

It is used to manage MAC addresses in message frames.

A

It is used to handle multiplexing, flow and error control, and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What scenario describes an evil twin attack?
Group of answer choices

A malicious access point is configured with the SSID of a non-malicious public access point.

An attacker is actively attempting to brute force the PIN of a WPS enabled access point.

A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.

A hacker is actively sending wireless probes to discover available wireless networks.

A

A malicious access point is configured with the SSID of a non-malicious public access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?
Group of answer choices

announcement packet

beacon frame

broadcast frame

alert message

A

beacon frame

17
Q

When troubleshooting wireless issues, what statement is accurate?
Group of answer choices

A WPA key can be used to associate with a WEP configured access point.

Access points that use overlapping channels can cause interference with each other if they are too close.

Simultaneous wired and wireless network connections do not affect the ability to communicate on the network.

Access point power levels should always be configured to output as much power as possible.

A

Access points that use overlapping channels can cause interference with each other if they are too close.

18
Q

When using RFID, what is an ARPT (Active Reader Passive Tag)?
Group of answer choices

It is a tag that requires an active reader, but still contains a battery in the tag.

It is a tag that is activated by an active reader, and uses power from the reader’s radio to power its transmission.

It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely.

It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.

A

It is a tag that is activated by an active reader, and uses power from the reader’s radio to power its transmission.

19
Q

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?
Group of answer choices

Class A

Class 1

Class X

Class 2

A

Class 2

20
Q

Which of the following statements regarding the 802.11ac standard is NOT accurate?
Group of answer choices

802.11ac operates on the 5-GHz band.

802.11ac access points function more like a hub than a switch.

The standard was officially approved in early 2014.

802.11ac access points can handle multiple transmissions at one time over the same frequency.

A

802.11ac access points function more like a hub than a switch.