Final Flashcards
Which wireless topology provides citywide wireless coverage? A. WMAN B. WLAN C. WPAN D.WAN E. WWAN
A. WMAN
What type of wireless topology is defined by the 802.11 standard? A. WAN B. WLAN C. WWAN D. WMAN E. WPAN
B. WLAN
802.11 collision detection is handled using which technology?
A. Network allocation vector (NAV)
B. Clear channel assessment (CCA)
C. Duration/ ID value
D. Receiving an ACK from the destination station
E. Positive collision detection cannot be determined.
E. Positive collision detection cannot be determined.
ACK and CTS frames follow which interframe space? A. EIFS B. DIFS C. PIFS D. SIFS E. LIFS
D. SIFS
The Wi-Fi Alliance certification called Wi-Fi Multimedia (WMM) is based on which media access method defined by the 802.11-2007 standard? A. DCF B. PCF C. EDCA D. HCCA E. HSRP
C. EDCA
Hybrid Coordination Function (HCF) defines what allotted period of time in which a station can transmit multiple frames? A. Block acknowledgement B. Polling C. Virtual carrier-sense D. Physical carrier-sense E. TXOP
E. TXOP
Which field in the MAC header of an 802.11 frame resets the NAV timer for all listening 802.11 stations? A. NAV B. Frame control C. Duration/ ID D. Sequence number E. Strictly ordered bit
C. Duration/ ID
The EDCA medium access method provides for the prioritization of traffic via priority tags that are identical to the 802.1D priority tags. What are the EDCA priority tags known as? A. TXOP B. UP levels C. Priority levels D. Priority bits E. PT
B. UP levels
Which of the following contains the information found inside an IP packet? A. MPDU B. PPDU C. PSDU D. MSDU E. MMPDU
D. MSDU
After a station sees its AID in the TIM, what is typically the next frame that the station transmits? A. Data B. PS-Poll C. ATIM D. ACK
B. PS-Poll
When a station sends an RTS, the Duration/ID field notifies the other stations that they
must set their NAV timers to which of the following values?
A. 213 microseconds
B. The time necessary to transmit the DATA and ACK frames
C. The time necessary to transmit the CTS frame
D. The time necessary to transmit the CTS, DATA, and ACK frames
D. The time necessary to transmit the CTS, DATA, and ACK frames
WMM-PS is based on which 802.11-2007 power-management method? A. S-APSD B. U-APSD C. PSMP D. SM Power Save E. PS-Poll
B. U-APSD
Which radio formats can be used by 802.11 technology? (Choose all that apply.) A. CF B. Secure Digital C. PCMCIA D. Mini PCI E. expressCard F. Proprietary G. All of the above
G. All of the above.
Which option best describes a layer 3 device used to secure an Internet connection for a small number of wireless users? A. VPN router B. Wireless workgroup bridge C. Wireless mesh router D. Residential wireless gateway E. Wireless hub
D. Residential wireless gateway
A ___________________ uses a proprietary layer 2 roaming protocol, and a ______________ utilizes a proprietary layer 2 encryption.
A. Wireless mesh access point, enterprise encryption gateway
B. enterprise wireless gateway, WLAN controller
C. WLAN controller, CC-AP
D. CC-AP enterprise wireless gateway
E. WLAN array, CC-AP
A. Wireless mesh access point, enterprise encryption gateway
What term best describes a WLAN architecture where the integration service (IS) and distribution system services (DSS) are handled by a WLAN controller while generation of certain 802.11 management and control frames are handled by a lightweight AP? A. Cooperative control B. Distributed data forwarding C. Distributed hybrid architecture D. Distributed WLAN architecture E. Split MAC
E. Split MAC
What would be needed for multiple basic service sets (BSSs) to exist within the same coverage area of a single access point and in which all the client stations would be segmented in separate layer 2/3 domains but all communicate within a single layer 1 RF domain? A. Virtual BSSIDs B. SSIDs C. VLANs D. Autonomous APs E. None of the above.
A. Virtual BSSIDs
Several users are complaining that their VoWiFi phones keep losing connectivity. The WLAN administrator notices that the frame transmissions of the VoWiFi phones are corrupted when listened to with a protocol analyzer near the access point, but are not corrupted when listened to with the protocol analyzer near the VoWiFi phone. What is the most likely cause of this problem? A. RF interference B. Multipath C. Hidden node D. Adjacent cell interference E. Mismatched power settings.
E. Mismatched power settings
A single user is complaining that her VoWiFi phone has choppy audio. The WLAN administrator notices that the user’s MAC address has a retry rate of 25 percent when observed with a protocol analyzer. However, all the other users have a retry rate of about 5 percent when also observed with the protocol analyzer. What is the most likely cause of this problem? A. Near/far B. Multipath C. Co-channel interference D. Hidden node E. Low SNR
D. Hidden node
What type of interference is caused by overlapping cover cells with overlapping frequencies? A. Inter-symbol interference B. Adjacent cell interference C. All-band interference D. Narrowband interference E. Co-channel interference
B. Adjacent cell interference.
Based on RSSI metrics, concentric zones of variable data rate coverage exist around an access point due to the upshifting and downshifting of client stations between data rates. What is the correct name of this process, according to the IEEE 802.11-2007 standard? (Choose all that apply.) A. Dynamic rate shifting B. Dynamic rate switching C. Automatic rate selection D. Adaptive rate selection E. All of the above
B. Dynamic rate switching
Which of these weather conditions is a concern when deploying a long-distance point-to-point bridge link? (Choose all that apply A. Wind B. Rain C. Fog D. Changes in air temperature E. All of the above
E. All of the above
In a multiple channel architecture (MCA) design, what is the greatest number of nonoverlapping channels that can be deployed in the 2.4 GHz ISM band? A. 3 B. 12 C. 11 D. 14 E. 4
A. 3
128-bit WEP encryption uses a user-provided static key of what size? A. 104 bytes B. 64 bits C. 124 bits D. 128 bits E. 104 bits
E. 104 bits