Mod 3: MAC specifications - PE Flashcards

1
Q

[True / False]

Wireless capability gives us the ability to convert 1s and 0s into radio waves, and convert radio waves back into 1s and 0s.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSMA/CA is a protocol that operates in which layer of the OSI model?

  • Layer 1- Physical Layer
  • Layer 2- Data Link Layer
  • Layer 3- Network Layer
  • None of the above
A

Layer 2- Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which technologies, which allow multiple users to send data across a shared medium, do not use Collision Detection or Collision Avoidance?

  • CDMA
  • TDMA
  • CSMA/CD
  • CSMA/CA
  • Answer A & B
A

Answer A & B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

[TRUE / FALSE]

Wireless networks often use a Collision Avoidance (CA) protocol. Where a device will wait a random amount of time, before attempting to send data again, if it recognizes the medium as being busy.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does RTS/CTS stand for?

  • REQUESTED TIME SLOT/CLEARED TIME SLOT
  • REQUEST TO SECURE/CLEAR TO SECURE
  • REQUEST TO SEND/CLEAR TO SEND
  • None of the Above
A

REQUEST TO SEND/CLEAR TO SEND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a device first turns on, it must attempt to connect to a what?

  • Aerial Point
  • Operating Network
  • Access Point
  • None of the Above
A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[TRUE / FALSE]

Open System and Shared Key are two link-level types of authentication defined by IEEE 802.11 standards.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Open System Authentication consists of two communications:

  • Authentication Request/Authentication Response
  • Authentication Sent/Authentication Cleared
  • Authentication Sent/Authentication Received
  • Authentication Request/Authentication Received
A

Authentication Request /Authentication Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During the Shared Key Authentication Phase, the Access Point sends the challenge phrase back in encrypted text.

[True / False]

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the Shared Key Authentication Phase, the Station sends back to the AP the challenge phrase in clear text.

[True / False]

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA/WPA2 complies with the wireless security standard and strongly increases the level of data protection and access control (authentication) for a wireless network.

[True / False]

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Association only occurs on wireless infrastructure networks, not in peer-peer mode.

[True / False]

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A station can associate with multiple AP/routers at one time.

[True / False]

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three 802.11 Frame Types?

  • Management, Control, Data
  • MAC, Control, Data
  • Control, Data, Wifi
  • Beacon, Control, Data
A

Management, Control, Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which frame is used in dealing with clients that are JOINING or LEAVING wireless networks?

  • Control
  • Data
  • Management
  • None of the Above
A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What constantly broadcasts signal from a wireless access point announcing itself to clients?

  • Probe Request
  • Probe Response
  • Beacon
  • None of the Above
A

Beacon

17
Q

Which is used to obtain information from an AP?

  • Probe Response
  • Probe Request
  • Association Request
  • Association Response
A

Probe Request

18
Q

What is used by an AP to send info about its parameters?

  • Probe Response
  • Probe Request
  • Association Request
  • Association Response
A

Probe Response

19
Q

What is sent, once it is authenticated to an SSID?

  • Probe Response
  • Probe Request
  • Association Request
  • Association Response
A

Association Request

20
Q

What is sent back by an AP, in order to accept or deny association?

  • Probe Response
  • Probe Request
  • Association Request
  • Association Response
A

Association Response

21
Q

Data Frames carry the payload and actual data being sent from the upper layers of the OSI model.

[True / False]

A

True

22
Q

Which layer of the OSI model are MAC addresses found?

  • Layer 1
  • Layer 2
  • Layer 3
  • Layer 4
A

Layer 2

23
Q

MAC addresses are not the PHYSICAL address of the device.

[True / False]

A

False

24
Q

Wireless communication frames will include MAC addresses for each device.

[True / False]

A

True

25
Q

The destination device will ALWAYS be the receiver device.

[True / False]

A

False