Network + Chapt 6 Quiz Flashcards
What are the most common frequencies used on Wi–Fi networks?
a. 2.4 GHz, 5 GHz
b. 506 KHz, 1635 KHz c. 2 GHz, 5.4 GHz d. 535 KHz, 1606 KHz
a. 2.4 GHz, 5 GHz
What type of antenna is best used for creating a wireless point–to–point link?
a. Multipath
b. Omnidirectional c. Reflective d. Unidirectional
d. Unidirectional
What should you look for in a wireless signal to ensure that the signal is strong and has little interference?
a. Low attenuation
b. High attenuation c. Low SNR d. High SNR
d. High SNR
What characteristic of wireless signals is caused by objects with small dimensions and rough surfaces?
a. Bounce
b. Reflection c. Scattering d. Diffraction
c. Scattering
Which WLAN layout should you use if you do not have an AP?
a. Infrastructure
b. Mesh c. Ring d. Ad hoc
d. Ad hoc
Which WLAN layout uses several APs that work as peer devices on the same network?
a. Infrastructure
b. Ring c. Mesh d. Ad hoc
c. Mesh
What method is used by 802.11 devices to access a shared medium?
a. CSMA/CA
b. CSMA/CD c. Token passing d. Polling
a. CSMA/CA
What does your mobile device need to do before it can access the Internet at a Wi–Fi hot spot?
a. Broadcast the SSID
b. Send a CTS signal c. Make an association d. Configure ad hoc
c. Make an association
What type of 802.11 frame is used for media access and includes RTS frames?
a. Management frames
b. Data frames c. Acknowledgement frames d. Control frames
d. Control frames
Which wireless innovation allows an AP to service multiple clients simultaneously?
a. Channel bonding
b. MIMO c. MU–MIMO d. Frame aggregation
c. MU–MIMO
What should you do before placing access points for a new WLAN?
a. Select frequency
b. Site survey c. Configure channels d. Set SSID
b. Site survey
How should you configure an AP when it must provide remote access to a wired network?
a. Multilayer switch
b. With an ESSID c. Ad hoc mode d. Wireless bridge
d. Wireless bridge
What process allows a network technician to install an application onto a user’s mobile device to give the device trusted access to certain portions of the network?
a. On–boarding
b. Heat map c. Off–boarding d. Remote wipe
a. On–boarding
Which security technique prevents an AP from authenticating a device that has not been approved?
a. Encryption
b. MAC filtering c. SSID broadcast d. Authentication
b. MAC filtering
Which 802.11 encryption method uses a shared key for authenticating users and exchanging data and can be cracked in a few minutes?
a. WPA
b. WEP c. 802.11i d. WPA2
b. WEP