Chapter 8 Flashcards

1
Q

Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other? (Choose two.)

  1. 11a
  2. 11b
  3. 11ac
  4. 11g
A

B, D. Both 802.11b and 802.11g operate in the 2.4 GHz range and use similar transmission standards. Many devices on the market are listed as 802.11b/g, meaning they will work with either system. Alternatively, 802.11a and 802.11ac operate in the 5 GHz range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of the SSID?

To secure communication between a web server and a browser
To secure communication between a server and a remote host
To serve as a parameter used to identify a network and configure a wireless connection
To serve as a type of password used to secure a wireless connection

A

C. A service-set identifier (SSID) is the unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, it is the network name. When you are using Windows to connect to a wireless network, all available wireless networks will be listed by their SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are features that allow 802.11ac to achieve higher data throughput? (Choose two.)

MIMO
Beamforming
Channel bonding
Code division multiplexing

A

A, C. The two technologies that 802.11ac employs to achieve high throughput are channel bonding and MIMO. Channel bonding is the combination of multiple smaller channels into one large channel for greater bandwidth. MIMO is enhanced over 802.11n to allow for more multiple inputs and outputs. 802.11ac also uses beamforming, but that helps the range, not the throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most secure wireless encryption standard for 802.11 networks?

WEP
WPA
WPA2
SAFER+

A

C. WEP was the original encryption standard developed for Wi-Fi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. SAFER+ is used to encrypt Bluetooth communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What level of QoS is designated for interactive voice and video?

1
4
5
6

A

C. QoS level 5 is designated for interactive voice and video, with less than 100ms delay. Level 1 is for background applications and is low priority. Level 4 is known as controlled load, which is lower priority than interactive voice and video. Level 6 only has 10ms latency but is reserved for control traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure? (Choose all that apply.)

Change the default administrator name and password.
Change the SSID.
Enable WEP.
Configure it to channel 11.

A

A, B. You should always change the default administrator name and password as well as the default SSID when installing a new wireless router. Enabling encryption is also a good idea, but WPA and WPA2 are better options than WEP. The channel has nothing to do with security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?

DSL
Dial-up
Satellite
BRI ISDN
PRI ISDN
A

A. Of the options listed, DSL provides the fastest speed. DSL can easily provide 12 Mbps downloads. Dial-up is limited to 56 Kbps, and BRI ISDN (128 Kbps) and PRI (about 1.5 Mbps) don’t even come close. Satellite is also much slower than DSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which service allows users with private IP addresses to access the Internet using a public IP address?

DHCP
DNS
DMZ
NAT

A

D. Network Address Translation (NAT) allows users to have a private IP address and still access the Internet with a public IP address. NAT is installed on a router and translates the private IP address into a public address for the user to access the Internet. DHCP assigns IP configuration information to clients. DNS resolves hostnames to IP addresses. A DMZ is an area on a network between an external router and an internal router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues?

2, 5, and 7
1, 8, and 14
1, 6, and 11
3, 6, and 9

A

C. There are 14 communication channels in the 2.4 GHz range, but only the first 11 are configurable. The three non-overlapping channels are 1, 6, and 11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are setting up a wireless network. Which wireless standards would give the users over 40 Mbps throughput? (Choose all that apply.)

  1. 11ac
  2. 11b
  3. 11g
  4. 11n
A

A, C, D. Three standards listed—802.11ac (1,300 Mbps), 802.11g (54 Mbps), and 802.11n (600 Mbps)—give users the required throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have been asked to configure a network for a small office. The wireless router is installed, and now you need to connect the client computers. What do you enter on the client computers to connect to the router?

The administrator password
The security passphrase
The client’s MAC address
The default router password

A

B. To join the network, client computers need to find the SSID, ensure that the security settings are correct (to match the router), and enter the security passphrase. As an administrator, you should have configured this passphrase to be different from the router’s administrator password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following technologies can operate in the 125 kHz to 134 kHz range?

Bluetooth
RFID
NFC
LTE

A

B. Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz; NFC is 13.56 MHz; and LTE is between 600 MHz and 6 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are advantages to using dial-up Internet service? (Choose two.)

High speed
Broad availability
Low cost
High security

A

B, C. Dial-up Internet is archaic by today’s standards, but it is widely available (anywhere there is phone service), and it’s generally lower in cost than other Internet access methods. It’s definitely not high speed, and its security is really no different from that of broadband Internet access methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key?

WEP
TKIP
AES
CCMP

A

B. WEP could use a 64-bit or 128-bit security key, but it was a static key. TKIP introduced a dynamic per-packet key. AES and CCMP came after TKIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?

The user with 802.11b will access the network at 11 Mbps, while the users with 802.11g will access the network at 54 Mbps.
The user with 802.11b will not be able to communicate on the network.
The user with 802.11b will access the network at 11 Mbps. The users with 802.11g will access the network at 54 Mbps, unless they are communicating with the 802.11b device, which will be at 11 Mbps.
All users will access the network at 11 Mbps.

A

D. The good news is that 802.11g is backward compatible with 802.11b. The bad news is, if you run in a mixed environment, all devices that communicate with the WAP (or router) will be forced to slow down to accommodate the older technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When enabled, which feature of a wireless router allows only specified computers to access the network?

Port forwarding
WPS
SSID
MAC filtering

A

D. MAC filtering is a security option that can specify that only computers with specific MAC (hardware) addresses can access the network. Port forwarding is a feature of firewalls. WPS is an easy setup mechanism for wireless networks. SSID is the wireless network name.

17
Q

A firewall operates by using a set of rules known as what?

SLA
ACL
Whitelist
DMZ

A

B. The set of rules for access on a firewall is called an access control list (ACL). An SLA is an agreement on service level for QoS. A whitelist may be part of an ACL but is not the set of rules. A DMZ is a subnet located between an external network router and an internal router.

18
Q

You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?

WEP
WPA
WPA2
TKIP

A

C. If your router is using AES, the clients will need to use WPA2. TKIP is a protocol utilized by WPA. WEP is the weakest of the encryption options.

19
Q

Besides 802.11 standards, which wireless communication methods work in the 2.4 GHz range? (Choose all that apply.)

Bluetooth
Z-Wave
Satellite
5G mmWave
Zigbee
NFC
A

A, E. Bluetooth and Zigbee also operate in the 2.4 GHz range. Z-Wave operates in the 800 MHz and 900 MHz ranges; satellite uses satellite waves; 5G cellular mmWave is between 24 GHz and 86 GHz; and NFC uses 13.56 MHz.

20
Q

Which of the following broadband technologies provides two dedicated, digital data channels that can be combined for greater throughput?

DSL
Cable
Satellite
BRI ISDN
PRI ISDN
A

D. Basic rate interface ISDN (BRI ISDN) provides two separate 64 Kbps B channels for data transmissions. These channels can be combined to increase throughput. A PRI ISDN uses 23 B channels. DSL, cable, and satellite do not offer multiple dedicated digital channels.