Wireless Standards Flashcards
What type of antenna, used in wireless APs and wireless routers in SOHO
locations, radiates power equally in all directions?
a. Unidirectional
b. Yagi
c. Parabolic
d. Omnidirectional
Answer: d. The key to this question is the fact that power is being radiated in
all directions relatively equally.
When you’re using the 2.4GHz band for multiple access points in a WLAN in
the United States, which nonoverlapping channels should you select? (Choose
three.)
a. 0
b. 1
c. 5
d. 6
e. 10
f. 11
g. 14
Answer: b, d, f. The nonoverlapping channels in the United States are 1, 6,
and 11.
What technology do WiFi devices use to decide when they gain access to the
wireless media?
a. SPF
b. CSMA/CA
c. RSTP
d. DUAL
Answer: b. WLANs use carrier-sense multiple access with collision avoidance.
Which IEEE 802.11 variant supports a maximum speed of 54Mbps and uses
the 2.4GHz band?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
Answer: c. This scenario describes 802.11g.
Which of the following does IEEE 802.11n use to achieve high throughput
using multiple antennas for transmission and reception?
a. MIMO
b. DSSS
c. FHSS
d. LACP
Answer: a. Multiple input, multiple output is the technology described here.
A WLAN formed directly between wireless clients (without the use of a
wireless AP) is referred to as what type of WLAN?
a. Enterprise mode
b. IBSS
c. Personal mode
d. BSS
Answer: b. An independent BSS (IBSS) is formed directly between wireless
clients.
When extending the range for a 2.4GHz WLAN, you can use nonoverlapping
channels for adjacent coverage cells. However, there should be some overlap
in coverage between those cells (using nonoverlapping channels) to prevent a
connection from dropping as a user roams from one coverage cell to another.
What percentage of coverage overlap is recommended for these adjacent cells?
a. 5% to 10%
b. 10% to 15%
c. 15% to 20%
d. 20% to 25%
Answer: b. The recommended amount of overlap is 10% to 15%.
If a WLAN does not need a user to provide credentials to associate with a
wireless AP and access the WLAN, what type of authentication is in use?
a. WEP
b. SSID
c. Open
d. IV
Answer: c. Open authentication permits the use of the wireless LAN with no
credentials. This is useful in a public, free Wi-Fi hotspot or in a guest area in
an enterprise.
WEP’s RC4 approach to encryption uses a 24-bit string of characters added to
transmitted data, such that the same plaintext data frame will never appear as
the same WEP-encrypted data frame. What is this string of characters called?
a. Initialization vector
b. Chips
c. Orthogonal descriptor
d. Session key
Answer: a. The string of characters is an initialization vector (IV).
Which standard developed by the WiFi Alliance implements the requirements
of IEEE 802.11i?
a. TKIP
b. MIC
c. WEP
d. WPA2
Answer: d. The IEEE 802.11i requirements are found in WPA2.
Which security technique uses wireless technologies to create an invisible
boundary around some point?
a. WPA3
b. LTE
c. War driving
d. Geofencing
Answer: d. Geofencing permits the creation of a boundary for administrative
alerts and actions.