SG: Ch 8: Installing Wireless and SOHO Networks Flashcards

1
Q

Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key?

A. WEP

B. TKIP

C. AES

D. CCMP

A

B. TKIP

WEP could use a 64-bit or 128-bit security key, but it was a static key. TKIP introduced a dynamic per-packet key. AES and CCMP came after TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure? (Choose all that apply.)

A. Change the default administrator name and password.

B. Change the SSID.

C. Enable WEP.

D. Configure it to channel 11.

A

A. Change the default administrator name and password.

B. Change the SSID.

You should always change the default administrator name and password as well as the default SSID when installing a new wireless router. Enabling encryption is also a good idea, but WPA and WPA2 are better options than WEP. The channel has nothing to do with security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?

A. DSL

B. Dial-up

C. Satellite

D. BRI ISDN

E. PRI ISDN

A

A. DSL

Of the options listed, DSL provides the fastest speed. DSL can easily provide 12 Mbps downloads. Dial-up is limited to 56 Kbps, and BRI ISDN (128 Kbps) and PRI (about 1.5 Mbps) don’t even come close. Satellite is also much slower than DSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Besides 802.11 standards, which wireless communication methods work in the 2.4 GHz range? (Choose all that apply.)

A. Bluetooth

B. Z-Wave

C. Satellite

D. 5 G mmWave

E. Zigbee

F. NFC

A

A. Bluetooth

E. Zigbee

Bluetooth and Zigbee also operate in the 2.4 GHz range. Z-Wave operates in the 800 MHz and 900 MHz ranges; satellite uses satellite waves; 5 G cellular mmWave is between 24 GHz and 86 GHz; and NFC uses 13.56 MHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are setting up a wireless network. Which wireless standards would give the users over 40 Mbps throughput? (Choose all that apply.)

A. 802.11ac

B. 802.11b

C. 802.11 g

D. 802.11n

A

A. 802.11ac

C. 802.11 g

D. 802.11n

Three standards listed—802.11ac (1,300 Mbps), 802.11 g (54 Mbps), and 802.11n (600 Mbps)—give users the required throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are running an 802.11 g wireless router in mixed mode. You have three 802.11 g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?

A. The user with 802.11b will access the network at 11 Mbps, while the users with 802.11 g will access the network at 54 Mbps.

B. The user with 802.11b will not be able to communicate on the network.

C. The user with 802.11b will access the network at 11 Mbps. The users with 802.11 g will access the network at 54 Mbps, unless they are communicating with the 802.11b device, which will be at 11 Mbps.

D. All users will access the network at 11 Mbps.

A

D. All users will access the network at 11 Mbps.

The good news is that 802.11 g is backward compatible with 802.11b. The bad news is, if you run in a mixed environment, all devices that communicate with the WAP (or router) will be forced to slow down to accommodate the older technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following technologies can operate in the 125 kHz to 134 kHz range?

A. Bluetooth

B. RFID

C. NFC

D. LTE

A

B. RFID

Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz; NFC is 13.56 MHz; and LTE is between 600 MHz and 6 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What level of QoS is designated for interactive voice and video?

A. 1

B. 4

C. 5

D. 6

A

C. 5

QoS level 5 is designated for interactive voice and video, with less than 100 ms delay. Level 1 is for background applications and is low priority. Level 4 is known as controlled load, which is lower priority than interactive voice and video. Level 6 only has 10 ms latency but is reserved for control traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary function of the SSID?

A. To secure communication between a web server and a browser

B. To secure communication between a server and a remote host

C. To serve as a parameter used to identify a network and configure a wireless connection

D. To serve as a type of password used to secure a wireless connection

A

C. To serve as a parameter used to identify a network and configure a wireless connection

A service-set identifier (SSID) is the unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, it is the network name. When you are using Windows to connect to a wireless network, all available wireless networks will be listed by their SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are installing a single 802.11 g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues?

A. 2, 5, and 7

B. 1, 8, and 14

C. 1, 6, and 11

D. 3, 6, and 9

A

C. 1, 6, and 11

There are 14 communication channels in the 2.4 GHz range, but only the first 11 are configurable. The three non-overlapping channels are 1, 6, and 11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When enabled, which feature of a wireless router allows only specified computers to access the network?

A. Port forwarding

B. WPS

C. SSID

D. MAC filtering

A

D. MAC filtering

MAC filtering is a security option that can specify that only computers with specific MAC (hardware) addresses can access the network. Port forwarding is a feature of firewalls. WPS is an easy setup mechanism for wireless networks. SSID is the wireless network name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are advantages to using dial-up Internet service? (Choose two.)

A. High speed

B. Broad availability

C. Low cost

D. High security

A

B. Broad availability

C. Low cost

Dial-up Internet is archaic by today’s standards, but it is widely available (anywhere there is phone service), and it’s generally lower in cost than other Internet access methods. It’s definitely not high speed, and its security is really no different from that of broadband Internet access methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following broadband technologies provides two dedicated, digital data channels that can be combined for greater throughput?

A. DSL

B. Cable

C. Satellite

D. BRI ISDN

E. PRI ISDN

A

D. BRI ISDN

Basic rate interface ISDN (BRI ISDN) provides two separate 64 Kbps B channels for data transmissions. These channels can be combined to increase throughput. A PRI ISDN uses 23 B channels. DSL, cable, and satellite do not offer multiple dedicated digital channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which service allows users with private IP addresses to access the Internet using a public IP address?

A. DHCP

B. DNS

C. DMZ

D. NAT

A

D. NAT

Network Address Translation (NAT) allows users to have a private IP address and still access the Internet with a public IP address. NAT is installed on a router and translates the private IP address into a public address for the user to access the Internet. DHCP assigns IP configuration information to clients. DNS resolves hostnames to IP addresses. A DMZ is an area on a network between an external router and an internal router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most secure wireless encryption standard for 802.11 networks?

A. WEP

B. WPA

C. WPA2

D. SAFER+

A

C. WPA2

WEP was the original encryption standard developed for Wi-Fi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. SAFER+ is used to encrypt Bluetooth communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are features that allow 802.11ac to achieve higher data throughput? (Choose two.)

A. MIMO

B. Beamforming

C. Channel bonding

D. Code division multiplexing

A

A. MIMO

C. Channel bonding

The two technologies that 802.11ac employs to achieve high throughput are channel bonding and MIMO. Channel bonding is the combination of multiple smaller channels into one large channel for greater bandwidth. MIMO is enhanced over 802.11n to allow for more multiple inputs and outputs. 802.11ac also uses beamforming, but that helps the range, not the throughput.

17
Q

You have been asked to configure a network for a small office. The wireless router is installed, and now you need to connect the client computers. What do you enter on the client computers to connect to the router?

A. The administrator password

B. The security passphrase

C. The client’s MAC address

D. The default router password

A

B. The security passphrase

To join the network, client computers need to find the SSID, ensure that the security settings are correct (to match the router), and enter the security passphrase. As an administrator, you should have configured this passphrase to be different from the router’s administrator password.

18
Q

You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?

A. WEP

B. WPA

C. WPA2

D. TKIP

A

C. WPA2

If your router is using AES, the clients will need to use WPA2. TKIP is a protocol utilized by WPA. WEP is the weakest of the encryption options.

19
Q

A firewall operates by using a set of rules known as what?

A. SLA

B. ACL

C. Whitelist

D. DMZ

A

B. ACL

The set of rules for access on a firewall is called an access control list (ACL). An SLA is an agreement on service level for QoS. A whitelist may be part of an ACL but is not the set of rules. A DMZ is a subnet located between an external network router and an internal router.

20
Q

Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other? (Choose two.)

A. 802.11a

B. 802.11b

C. 802.11ac

D. 802.11 g

A

B. 802.11b

D. 802.11 g

Both 802.11b and 802.11 g operate in the 2.4 GHz range and use similar transmission standards. Many devices on the market are listed as 802.11b/g, meaning they will work with either system. Alternatively, 802.11a and 802.11ac operate in the 5 GHz range.