Final Exam Flashcards
The wireless device that is marked X in the following image is a ________. (has smart phone in image).
wireless access point
wireless router
wireless controller
wireless switch
wireless router
The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of both direction and efficiency of a transmission. Gain is commonly measured using the dBi unit of measure.
True
False
True
When a wireless channel uses more than one frequency, the transmission method is called a ________ spectrum.
broad
multi
long
spread
spread
Which of the following is not a variation of spread-spectrum technology?
DSSS
FHSS
DFSS
OFDM
DFSS
Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)
- 11
- 11a
- 11b
- 11g
- 11
802. 11b
WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________.
HBSS, BSS, ESS
IBSS, BSS, RSS
HBSS, BSS, IBSS
IBSS, BSS, ESS
IBSS, BSS, ESS
WLANs use a technology called carrier sense multiple access collision detection (CSMA/CD).
True
False
False
What is the 802.11 2.4-GHz band channel width?
22 MHz
40 MHz
5 MHz
12 MHz
22 MHz
Which channel is not one of the non-overlapping channels when using the 802.11 2.4-GHz band?
1
5
6
11
5
An omnidirectional antenna radiates power at relatively unequal power levels in all directions (somewhat similar to the theoretical isotropic antenna)
True
False
False
Which is not a security threat for WLANs?
Warchalking
Rogue access point
Wardialing
WEP and WPA security cracking
Wardialing
To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except what?
Enabling SSID broadcast
MAC address filtering
Preshared key
IEEE 802.1X
Enabling SSID broadcast
Which of the following is not a WLAN security standard?
WEP
WAP
WPA
WPA2
WAP
WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption.
True
False
False
WLAN security based on a PSK technology is called ________ mode.
personal
private
home
WEP
personal
Which of the following are broad categories of wireless antenna that are based on coverage? (Choose two.)
WLAN SSID Omnidirectional Unidirectional Wired Equivalent Protocol (WEP)
Unidirectional
Omnidirectional
Which of the following is a variation of spread-spectrum technology use in wireless local-area networks? (Choose three.)
WEP Wi-Fi WPA - 2 Direct-sequence spread spectrum (DSSS) Frequency-hopping spread spectrum (FHSS) Orthogonal frequency-division multiplexing (OFDM)
Direct-sequence spread spectrum (DSSS)
Frequency-hopping spread spectrum (FHSS)
Orthogonal frequency-division multiplexing (OFDM)
What transmission method is used with IEEE 802.11ac?
DSS
FHSS
OFDM
FHDM
OFDM
Which IEEE standard is used to authenticate wireless clients?
- 11i
- 3ac
- 2af
- 1X
802.1X
What is the encryption mechanism that is used with the WPA2 security standard?
AES
RC4
SHA-1
MD5
AES
The following image is an example of what type of WAN connection? (3 buildings each with routers connecting to a cloud)
ISDN network, packet-switched connection
Frame Relay network, circuit-switched connection
Frame Relay network, packet-switched connection
ISDN network, circuit switched connection
Frame Relay network, packet-switched connection
The data rate for a T3 link is ________.
45.736 Mbps to 51.84 Mbps
44.736 Mbps to 52.84 Mbps
44.736 Mbps
40 Mbps to 50 Mbps
44.736 Mbps
Which of the following are not examples of wireless media?
Cellular phone
LTE
HSPA+
DSL
DSL