Final Flashcards

1
Q
Which wireless topology provides citywide wireless coverage?
A. WMAN
B. WLAN
C. WPAN
D.WAN
E. WWAN
A

A. WMAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What type of wireless topology is defined by the 802.11 standard?
A. WAN
B. WLAN
C. WWAN
D. WMAN
E. WPAN
A

B. WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11 collision detection is handled using which technology?
A. Network allocation vector (NAV)
B. Clear channel assessment (CCA)
C. Duration/ ID value
D. Receiving an ACK from the destination station
E. Positive collision detection cannot be determined.

A

E. Positive collision detection cannot be determined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
ACK and CTS frames follow which interframe space?
A. EIFS
B. DIFS
C. PIFS
D. SIFS
E. LIFS
A

D. SIFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
The Wi-Fi Alliance certification called Wi-Fi Multimedia (WMM) is based on which media access method defined by the 802.11-2007 standard?
A. DCF
B. PCF
C. EDCA
D. HCCA
E. HSRP
A

C. EDCA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Hybrid Coordination Function (HCF) defines what allotted period of time in which a station can transmit multiple frames?
A. Block acknowledgement
B. Polling
C. Virtual carrier-sense
D. Physical carrier-sense
E. TXOP
A

E. TXOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which field in the MAC header of an 802.11 frame resets the NAV timer for all listening 802.11 stations?
A. NAV
B. Frame control
C. Duration/ ID
D. Sequence number
E. Strictly ordered bit
A

C. Duration/ ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
The EDCA medium access method provides for the prioritization of traffic via priority tags that are identical to the 802.1D priority tags.  What are the EDCA priority tags known as?
A. TXOP
B. UP levels
C. Priority levels
D. Priority bits
E. PT
A

B. UP levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following contains the information found inside an IP packet?
A. MPDU
B. PPDU
C. PSDU
D. MSDU
E. MMPDU
A

D. MSDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
After a station sees its AID in the TIM, what is typically the next frame that the station transmits?
A. Data
B. PS-Poll
C. ATIM
D. ACK
A

B. PS-Poll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a station sends an RTS, the Duration/ID field notifies the other stations that they
must set their NAV timers to which of the following values?
A. 213 microseconds
B. The time necessary to transmit the DATA and ACK frames
C. The time necessary to transmit the CTS frame
D. The time necessary to transmit the CTS, DATA, and ACK frames

A

D. The time necessary to transmit the CTS, DATA, and ACK frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
WMM-PS is based on which 802.11-2007 power-management method?
A. S-APSD
B. U-APSD
C. PSMP
D. SM Power Save
E.  PS-Poll
A

B. U-APSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which radio formats can be used by 802.11 technology? (Choose all that apply.)
A. CF
B. Secure Digital
C. PCMCIA
D. Mini PCI
E. expressCard
F. Proprietary
G. All of the above
A

G. All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which option best describes a layer 3 device used to secure an Internet connection for a small number of wireless users?
A. VPN router
B. Wireless workgroup bridge
C. Wireless mesh router
D. Residential wireless gateway
E. Wireless hub
A

D. Residential wireless gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ___________________ uses a proprietary layer 2 roaming protocol, and a ______________ utilizes a proprietary layer 2 encryption.
A. Wireless mesh access point, enterprise encryption gateway
B. enterprise wireless gateway, WLAN controller
C. WLAN controller, CC-AP
D. CC-AP enterprise wireless gateway
E. WLAN array, CC-AP

A

A. Wireless mesh access point, enterprise encryption gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What term best describes a WLAN architecture where the integration service (IS) and distribution system services (DSS) are handled by a WLAN controller while generation of certain 802.11 management and control frames are handled by a lightweight AP?
A. Cooperative control
B. Distributed data forwarding
C. Distributed hybrid architecture
D. Distributed WLAN architecture
E. Split MAC
A

E. Split MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
What would be needed for multiple basic service sets (BSSs) to exist within the same coverage area of a single access point and in which all the client stations would be segmented in separate layer 2/3 domains but all communicate within a single layer 1 RF domain?
A. Virtual BSSIDs
B. SSIDs
C. VLANs
D. Autonomous APs
E. None of the above.
A

A. Virtual BSSIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Several users are complaining that their VoWiFi phones keep losing connectivity. The WLAN administrator notices that the frame transmissions of the VoWiFi phones are corrupted when listened to with a protocol analyzer near the access point, but are not corrupted when listened to with the protocol analyzer near the VoWiFi phone. What is the most likely cause of this problem?
A. RF interference
B. Multipath
C. Hidden node
D. Adjacent cell interference
E. Mismatched power settings.
A

E. Mismatched power settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A single user is complaining that her VoWiFi phone has choppy audio. The WLAN administrator notices that the user’s MAC address has a retry rate of 25 percent when observed with a protocol analyzer. However, all the other users have a retry rate of about 5 percent when also observed with the protocol analyzer. What is the most likely cause of this problem?
A. Near/far
B. Multipath
C. Co-channel interference
D. Hidden node
E. Low SNR
A

D. Hidden node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
What type of interference is caused by overlapping cover cells with overlapping frequencies?
A. Inter-symbol interference
B. Adjacent cell interference
C. All-band interference
D. Narrowband interference
E. Co-channel interference
A

B. Adjacent cell interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Based on RSSI metrics, concentric zones of variable data rate coverage exist around an access point due to the upshifting and downshifting of client stations between data rates. What is the correct name of this process, according to the IEEE 802.11-2007 standard? (Choose all that apply.)
A. Dynamic rate shifting
B. Dynamic rate switching
C. Automatic rate selection
D. Adaptive rate selection
E. All of the above
A

B. Dynamic rate switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of these weather conditions is a concern when deploying a long-distance point-to-point bridge link? (Choose all that apply
A. Wind
B. Rain
C. Fog
D. Changes in air temperature
E. All of the above
A

E. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
In a multiple channel architecture (MCA) design, what is the greatest number of nonoverlapping channels that can be deployed in the 2.4 GHz ISM band?
A. 3
B. 12
C. 11
D. 14
E. 4
A

A. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
128-bit WEP encryption uses a user-provided static key of what size?
A. 104 bytes
B. 64 bits
C. 124 bits
D. 128 bits
E. 104 bits
A

E. 104 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
When using an 802.11 wireless controller solution, which device would be considered the authenticator?
A. Access point
B. RADIUS database
C. LDAP
D. WLAN controller
E. VLAN
A

D. WLAN controller

26
Q
An 802.11 wireless network name is known as which type of address? (Choose all that apply.)
A. BSSID
B. MAC address
C. IP address
D. SSID
E. Extended service set identifier
A

D. SSID

E. Extended service set identifier.

27
Q
Which terms describe an 802.11 topology involving STAs but no access points? (Choose all 
that apply.)
A. BSS
B. Ad hoc
C. DSSS
D. Infrastructure
E. IBSS
F. Peer-to-peer
A

B. Ad hoc
E. IBSS
F. Peer-to-peer

28
Q
What are the only three topologies defined by the 802.11 standard? (Choose all that apply.)
A. Bridge mode
B. Extended service set
C. BSS
D. IBSS
E. FHSS
A

B. Extended service set
C. BSS
D. IBSS

29
Q
What are some nonstandard modes in which an AP radio may be configured? (Choose all 
that apply.)
A. Scanner
B. Root
C. Bridge
D. Nonroot
E. Repeater
A

A. Scanner
C. Bridge
E. Repeater

30
Q

DCF is also known as what? (Choose all that apply.)
A. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
B. Data Control Function
C. Distributed Coordination Function
D. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

A. Carrier Sense Multiple Access with Collision Avoidance

C. Distributed Coordination Function

31
Q
The carrier sense portion of CSMA/CA is performed by using which of the following 
methods? (Choose all that apply.)
A. Virtual carrier-sense
B. Physical carrier-sense
C. Channel sense window
D. Clear channel assessment
A

A. Virtual carrier-sense
B. Physical carrier-sense
D. Clear channel assessment

32
Q
If PCF is implemented, it can function in which of the following network environments? 
(Choose all that apply.)
A. Ad Hoc mode
B. BSS
C. IBSS
D. Infrastructure mode
E. BSA
A

B. BSS

D. Infrastructure mode

33
Q

Which of the following statements about PCF are true? (Choose all that apply.)
A. PCF will work in only a BSS
B. PCF can be used in an IBSS
C. Both the station and access point mus support PCF for it to be used.
D. The access point will alternate between PCF and DCF mode
E. PCF is a form of contention

A

A. PCF will work in only a BSS
C. Both the station and access point must support PCF for it to be used.
D. The access point will alternate between PCF and DCF mode.

34
Q

Currently, WMM is based on EDCA and provides for traffic prioritization via which of the
following access categories? (Choose all that apply.)
A. WMM Voice priority
B. WMM Video priority
C. WMM Audio priority
D. WMM Best Effort priority
E. WMM Background priority

A

A. WMM Voice priority
B. WMM Video priority
D. WMM Best Effort priority
E. WMM Background priority

35
Q
What are the two reasons that 802.11 radios use physical carrier-sense? (Choose two.)
A. Synchronize incoming transmissions.
B. Synchronize outgoing transmissions.
C. Reset the NAV.
D. Start the random back-off timer.
E. Assess the RF medium
A

A. Synchronize incoming transmissions.

E. Assess the RF medium

36
Q
What CSMA/CA mechanism is used for medium contention? (Choose all that apply.)
A. NAV
B. Interframe spacing
C. CCA
D. Random back-off timer
E. Contention window
A

D. Random back-off timer

E. Contention window

37
Q

What is the difference between association frames and reassociation frames? (Choose all
that apply.)
A. Association frames are management frames, whereas reassociation frames are
control frames.
B. Reassociation frames are only used in fast BSS transition.
C. Association frames are used exclusively for roaming.
D. Reassociation frames contain the BSSID of the original AP.
E. Only association frames are used to join a BSS.

A

B. Reassociation frames are only used in fast BSS transition

D. Reassociation frames contain the BSSID of the original AP

38
Q
Which of the following are protection mechanisms? (Choose all that apply.)
A. NAV back-off
B. RTS/CTS
C. RTS-to-Self
D. CTS-to-Self
E. WEP encryption
A

B. RTS/CTS

D. CTS-to-Self

39
Q

The presence of what type of transmissions can trigger the protection mechanism within an
ERP basic service set? (Choose all that apply.)
A. Association of an HR-DSSS client
B. Association of an ERP-OFDM client
C. HR-DSSS beacon frame
D.ERP beacon frame with the NonERP_Present bit set to 1
E. Association of an FHSS client

A

A. Association of an HR-DSSS client
C. HR-DSSS beacon frame
D. ERP beacon frame with the NonERP_Present bit set to 1

40
Q
Which of the following information is included in a probe response frame? (Choose all  
that apply.)
A. Time stamp
B. Supported data rates
C. Service set capabilities
D. SSID
E. Traffic indication map
A

A. Time stamp
B. Supported data rates
C. Service set capabilities
D. SSID

41
Q

When is an ERP (802.11g) access point required by the IEEE 802.11-2007 standard to respond
to probe request frames from nearby HR-DSSS (802.11b) stations? (Choose all that apply.)
A. When the probe request frames contain a null SSID value.
B. When the access point supports only ERP-OFDM data rates
C. When the access point supports only HR/DSSS data rates
D. When the Power Management bit is set to 1
E. When the probe request frames contain the correct SSID value.

A

A. When the probe request frames contain a null SSID value

E. When the probe request frames contain the correct SSID value.

42
Q

Which of the following are true about scanning? (Choose all that apply.)
A. Stations must transmit probe requests in order to learn about local access points.
B. The 802.11 standard allows access points to ignore probe requests for security reasons.
C. There are two types of scanning: passive and active.
D. It is common for stations to continue to send probe requests after being associated to an access point.

A

C. There are two types of scanning: passive and active.

D. It is common for stations to continue to send probe requests after being associated to an access point.

43
Q
Which terms best describe components of a centralized WLAN architecture in which all the intelligence resides in a centralized device and pushes the configuration settings down to the access points? (Choose all that apply.)
A. WLAN controller 
B.  Wireless network management system
C. enterprise wireless gateway 
D. Cooperative control AP 
E. Lightweight AP
A

A. WLAN controller

E. Lightweight AP

44
Q
What options best describe components of a WLAN intelligent edge architecture? (Choose all that apply.)
A. Lightweight access point 
B. Autonomous AP
C. WLAN controller 
D. VPN router 
E. WNMS
A

B. Autonomous AP

D. VPN router

45
Q
What are some of the parameters of a WLAN profile that can be configured on a WLAN controller? (Choose all that apply.)
A. SSID
B. Channel 
C. VLAN 
D. WMM 
E. WPA-2
A

A. SSID
C. VLAN
D. WMM
E. WPA-2

46
Q
What are the required components of a VoWiFi architecture using WMM quality-of-service mechanisms? (Choose all that apply.)
A. VoWiFi phone 
B. WLAN controller 
C. QoS server 
D. Lightweight access point 
E. PBX
A

A. VoWiFi phone
B. WLAN controller
D. Lightweight access point
E. PBX

47
Q
What type of solution must be deployed to provide continuous connectivity when a client station roams across layer 3 boundaries? (Choose all that apply.)
A. Nomadic roaming solution
B. Proprietary layer 3 roaming solution 
C. Seamless roaming solution 
D. Mobile IP solution 
E.  Fast secure roaming solution
A

B. Proprietary layer 3 roaming solution

D. Mobile IP solution

48
Q
What variables might affect range in an 802.11 WLAN? (Choose all that apply.)
A. Transmission power 
B. CSMA/CA 
C. Encryption 
D. Antenna gain 
E. Physical environment
A

A. Transmission power
D. Antenna gain
E. Physical environment

49
Q

What can be done to fix the hidden node problem? (Choose all that apply.
A. Increase the power on the access point.
B. Move the hidden node station.
C. Increase power on all client stations.
D. Remove the obstacle.
E. Decrease power on the hidden node station.

A

B. Move the hidden node station.
C. Increase power on all client stations.
D. Remove the obstacle.

50
Q
What scenarios might result in a hidden node problem? (Choose all that apply.)
A. Distributed antenna system 
B. Too large coverage cell 
C. Too small coverage cell 
D. Physical obstruction 
E. Co-channel interference
A

A. Distributed antenna system
B. Too large coverage cell
D. Physical obstruction

51
Q
Which of the following can cause roaming problems? (Choose all that apply.)
A. Too little cell coverage overlap
B. Too much cell coverage overlap 
C. Free space path loss 
D. CSMA/CA 
E. Hidden node
A

A. Too little cell coverage overlap

B. Too much cell coverage overlap

52
Q

What are some problems that can occur when an access point is transmitting at full power? (Choose all that apply.)
A. Hidden node
B. Adjacent cell interference
C. Co-channel interference
D. Mismatched power between the AP and the clients
E. Intersymbol interference

A

A. Hidden node
C. Co-channel interference
D. Mismatched power between the AP and the clients

53
Q
Which wireless security standards and certifications call for the use of CCMP/AES encryption? (Choose all that apply.)
A. WPA
B. 802.11-2007
C. 802.1X
D. WPA2
E. 802.11 legacy
A

B. 802.11-2007

D. WPA2

54
Q

Jimmy has been hired as a consultant to secure the Donahue Corporation’s WLAN infrastructure. He has been asked to choose a solution that will both protect the company’s equipment from theft and hopefully protect the access point’s configuration interfaces from outside attackers. What recommendations would be appropriate? (Choose all that apply.)
A. Mounting all access points in lockable enclosure units
B. IPSec VPN
C. Configuring all access points via Telnet.
D. Configuring access points from the wired side using HTTPS or Secure Command Shell
E. 802.1X/EAP

A

A. Mounting all access points in lockable enclosure units
D. Configuring access points from the wired side using HTTPS or Secure Command Shell
E. 802.1X/EAP

55
Q
Which security solutions may be used to segment a wireless LAN? (Choose all that apply.)
A. VLAN
B. WEP
C. RBAC
D. CCMP/AES
E. TKIP/RC4
A

A. VLAN

C. RBAC

56
Q

What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.)
A. Access to network resources
B. Verification of access point credentials
C. Dynamic authentication
D. Dynamic encryption-key generation
E. Verification of user credentials

A

A. Access to network resources
D. Dynamic encryption-key generation
E. Verification of user credentials

57
Q
Which technologies use the RC4 cipher? (Choose all that apply.)
A. Static WEP
B. Dynamic WEP
C. CCMP
D. TKIP
E. MPPE
A

A. Static WEP
B. Dynamic WEP
D. TKIP
E. MPPE

58
Q

What must occur before dynamic TKIP/RC4 or CCMP/AES encryption keys are generated? (Choose all that apply.)
A. 802.1X/EAP authentication and 4-Way Handshake
B. Open System authentication and 4-Way Handshake
C. Shared Key authentication and 4-Way Handshake
D. PSK authentication and 4-Way Handshake

A

A. 802.1X/EAP authentication and 4-Way Handshake

D. PSK authentication and 4-Way Handshake

59
Q
Identify some aspects of the Temporal Key Integrity Protocol. (Choose all that apply.)
A. 128-bit temporal key
B. 24-bit Initialization Vector
C. Message Integrity Check
D. 48-bit IV
E. Diffe-Hellman Exchange
A

A. 128-bit temporal key
C. Message Integrity Check
D. 48-bit IV

60
Q
Identify the security solutions that are defined by WPA2. (Choose all that apply.)
A. 802.1X/EAP authentication
B. Dynamic WEP encryption
C. Optional CCMP/AES encryption
D. Passphrase authentication
E. DES encryption
A

A. 802.1X/EAP authentication

D. Passphrase authentication