MC questions Flashcards
The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of both direction and efficiency of a transmission. Gain is commonly measured using the dBi unit of measure.(t/f)
true
When a wireless channel uses more than one frequency, the transmission method is called a ________ spectrum.
- broad
- multi
- long
- spread
spread
Which of the following is not a variation of spread-spectrum technology?
- DSSS
- FHSS
- DFSS
- OFDM
DFSS
WLANs use a technology called carrier sense multiple access collision detection (CSMA/CD).(t/f)
false
Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)
- 802.11
- 802.11a
- 802.11b
- 802.11g
- 11
802. 11b
WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________.
- HBSS, BSS, ESS
- IBSS, BSS, RSS
- HBSS, BSS, IBSS
- IBSS, BSS, ESS
IBSS, BSS, RSS
What is the 802.11 2.4-GHz band channel width?
- 22 MHz
- 40 MHz
- 5 MHz
- 12 MHz
22 MHz
Which channel is not one of the non-overlapping channels when using the 802.11 2.4-GHz band?
- 1
- 5
- 6
- 11
5
An omnidirectional antenna radiates power at relatively unequal power levels in all directions (somewhat similar to the theoretical isotropic antenna).(t/f)
false
Which is not a security threat for WLANs? Warchalking - Rogue access point - Wardialing - WEP and WPA security - cracking
Wardialing
To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except what?
- Enabling SSID broadcast
- MAC address filtering
- Preshared key
- IEEE 802.1X
Enabling SSID broadcast
Which of the following is not a WLAN security standard?
- WEP
- WAP
- WPA
- WPA2
WAP
WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption.(t/f)
false
WLAN security based on a PSK technology is called ________ mode.
- personal
- private
- home
- WEP
personal
Which of the following are broad categories of wireless antenna that are based on coverage? (Choose two.)
- WLAN
- SSID
- Omnidirectional
- Unidirectional
- Wired Equivalent Protocol (WEP)
Omnidirectional
Unidirectional
Which of the following is a variation of spread-spectrum technology use in wireless local-area networks? (Choose three.)
- WEP
- Wi-Fi
- WPA - 2
- Direct-sequence spread spectrum (DSSS)
- Frequency-hopping spread spectrum (FHSS)
- Orthogonal frequency-division multiplexing (OFDM)
- Direct-sequence spread spectrum (DSSS)
- Frequency-hopping spread spectrum (FHSS)
- Orthogonal frequency-division multiplexing (OFDM)
What transmission method is used with IEEE 802.11ac?
- DSSS
- FHSS
- OFDM
- FHDM
OFDM
Which IEEE standard is used to authenticate wireless clients?
- 802.11i
- 802.3ac
- 802.2af
- 802.1X
802.1X
What is the encryption mechanism that is used with the WPA2 security standard?
- AES
- RC4
- SHA-1
- MD5
AES
The data rate for a T3 link is ________.
- 45.736 Mbps to 51.84 Mbps
- 44.736 Mbps to 52.84 Mbps
- 44.736 Mbps
- 40 Mbps to 50 Mbps
44.736 Mbps
Which of the following are not examples of wireless media?
- Cellular phone
- LTE
- HSPA+
- DSL
DSL