Filters
Question type

Study Flashcards

Matching Match each correct item with the statement below. -A security exploit in which a WPS PIN is discoveredby means of a brute force attack,giving the attackeraccess to the network's WPA2 key.The PIN feature in WPSshould be disabled if possible.


A) active scanning
B) bluesnarfing
C) data frame
D) diffraction
E) goodput
F) omnidirectional antenna
G) unidirectional antenna
H) war chalking
I) war driving
J) WPS attack

K) A) and I)
L) A) and G)

Correct Answer

verifed

verified

Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:


A) 5.1 GHz
B) 5.3 GHz
C) 5.4 GHz
D) 5.9 GHz

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What two terms describe a wireless network topology in which access points work as peer devices on the same network?


A) mesh WLAN
B) infrastructure WLAN
C) wireless gateway
D) wireless mesh network (WMN)

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

How does the 802.11 data frame indicate how a large packet should be fragmented?


A) It uses the preamble header
B) The frame check sequence dictates packet size
C) The sequence control field indicates how packets will be subdivided
D) The duration field determines how long the station can transmit a packet,which then determines how it is divided.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

In an 802.11 data frame,what is the size of the frame check sequence field?


A) 2 bytes
B) 4 bytes
C) 6 bytes
D) 8 bytes

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Access points that include routing functions are also called _______________.

Correct Answer

verifed

verified

wireless routers wireless gateways

_________________ is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.

Correct Answer

verifed

verified

Infrared (IR)

The WPS PIN is vulnerable to brute force attacks.

A) True
B) False

Correct Answer

verifed

verified

What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?


A) broadcast frame
B) hello packet
C) beacon frame
D) announcement message

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Ideally,stations must remain within what range of an access point in order to maintain optimal transmission speeds?


A) 100 feet
B) 200 feet
C) 300 feet
D) 600 feet

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which 802.11 standard was the first to utilize the 5 GHz band?


A) 802.11b
B) 802.11a
C) 802.11g
D) 802.11n

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -A type of antenna that issues andreceives wireless signals with equal strength and clarity in alldirections.This type of antenna is used when many differentreceivers must be able to pick up the signal,or when thereceiver's location is highly mobile.


A) active scanning
B) bluesnarfing
C) data frame
D) diffraction
E) goodput
F) omnidirectional antenna
G) unidirectional antenna
H) war chalking
I) war driving
J) WPS attack

K) D) and I)
L) A) and I)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -In the context of wireless signal propagation,thephenomenon that occurs when an electromagnetic waveencounters an obstruction and splits into secondary waves.The secondary waves continue to propagate in the directionin which they were split.


A) active scanning
B) bluesnarfing
C) data frame
D) diffraction
E) goodput
F) omnidirectional antenna
G) unidirectional antenna
H) war chalking
I) war driving
J) WPS attack

K) A) and I)
L) G) and H)

Correct Answer

verifed

verified

D

The proportion of noise to the strength of a signal is called the _________________.

Correct Answer

verifed

verified

signal-to-...

View Answer

How many address fields exist in an 802.11 frame?


A) 2
B) 3
C) 4
D) 6

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Describe the 802.11a standard,and detail some of its history and advantages / disadvantages versus other 802.11 standards.

Correct Answer

verifed

verified

Although the 802.11a task group began it...

View Answer

The wireless spectrum,as defined by the FCC,spans between which two frequencies?


A) 2 KHz
B) 9 KHz
C) 300 GHz
D) 500 GHz

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -The throughput experienced at the applicationlevel,such as the quality of a video feed or the speed of aWeb page loading in the browser.


A) active scanning
B) bluesnarfing
C) data frame
D) diffraction
E) goodput
F) omnidirectional antenna
G) unidirectional antenna
H) war chalking
I) war driving
J) WPS attack

K) B) and J)
L) D) and E)

Correct Answer

verifed

verified

Elaborate on the three different types of wireless network topologies.

Correct Answer

verifed

verified

Wireless networks have their own differe...

View Answer

How many data streams are used in 802.11ac Wave 2 devices?


A) 2 data streams
B) 3 data streams
C) 4 data streams
D) 8 data streams

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer