1.
Why is IEEE 802.11 wireless technology able to transmit further
distances than Bluetooth technology?
|
transmits at
much lower frequencies
|
|
has
higher power output
|
|
transmits at
much higher frequencies
|
|
uses better
encryption methods
|
2.
What are three advantages of wireless over wired technology?
|
more secure ,
longer range and anytime, anywhere connectivity
|
|
anytime,
anywhere connectivity , easy and inexpensive to install and ease
of using licensed air space
|
|
longer
range , easy and inexpensive to install and ease of adding
additional devices
|
|
anytime,
anywhere connectivity , easy and inexpensive to install and ease
of adding additional devices
|
3.
What are two benefits of wireless networking over wired networking?
|
speed and
security
|
|
security and
mobility
|
|
mobility
and reduced installation time
|
|
reduced
installation time and allows users to share more resources
|
4.
A technician has been asked to provide wireless connectivity to the
wired Ethernet network of a building. Which three factors affect the
number of access points needed?
|
the
size of the building, the number of solid interior walls in the
building and the presence of microwave ovens in several offices
|
|
the size of
the building, the encryption method used on the wireless network
and the use of both Windows and Appletalk operating systems
|
|
the use of
both Windows and Appletalk operating systems , the number of solid
interior walls in the building and the use of shortwave or
infrared on the AP
|
|
the use of
shortwave or infrared on the AP , the presence of microwave ovens
in several offices and the number of solid interior walls in the
building
|
5.
Why is security so important in wireless networks?
|
Wireless
networks are typically slower than wired networks.
|
|
Televisions
and other devices can interfere with wireless signals.
|
|
Wireless
networks broadcast data over a medium that allows easy access.
|
|
Environmental
factors such as thunderstorms can affect wireless networks.
|
6.
What does the Wi-Fi logo indicate about a wireless device?
|
IEEE has
approved the device.
|
|
The device is
interoperable with all other wireless standards.
|
|
The
device is interoperable with other devices of the same standard
that also display the Wi-Fi logo.
|
|
The device is
backwards compatible with all previous wireless standards.
|
7.
Which statement is true concerning wireless bridges?
|
connects
two networks with a wireless link
|
|
stationary
device that connects to a wireless LAN
|
|
allows
wireless clients to connect to a wired network
|
|
increases the
strength of a wireless signal
|
8.
Which WLAN component is commonly referred to as an STA?
|
cell
|
|
antenna
|
|
access point
|
|
wireless
bridge
|
|
wireless
client
|
9.
Which statement is true concerning an ad-hoc wireless network?
|
created
by connecting wireless clients in a peer-to-peer network
|
|
created by
connecting wireless clients to a single, centralized AP
|
|
created by
connecting multiple wireless basic service sets through a
distribution system
|
|
created by
connecting wireless clients to a wired network using an ISR
|
10.
Refer to the graphic. In the Wireless menu option of a Linksys
integrated router, what does the Network Mode option Mixed mean?
|
The router
supports encryption and authentication.
|
|
The router
supports both wired and wireless connections.
|
|
The
router supports 802.11b, 802.11g, and 802.11n devices.
|
|
The router
supports connectivity through infrared and radio frequencies.
|
11.
Refer to the graphic. In the Wireless menu of a Linksys integrated
router, what configuration option allows the presence of the access
point to be known to nearby clients?
|
Network Mode
|
|
Network Name
(SSID)
|
|
Radio Band
|
|
Wide Channel
|
|
Standard
Channel
|
|
SSID
Broadcast
|
12.
Which two statements about a service set identifier (SSID) are true?
|
tells a
wireless device to which WLAN it belongs and consists of a
32-character string and is not case sensitive
|
|
responsible
for determining the signal strength and all wireless devices on
the same WLAN must have the same SSID
|
|
all wireless
devices on the same WLAN must have the same SSID and used to
encrypt data sent across the wireless network
|
|
tells
a wireless device to which WLAN it belongs and all wireless
devices on the same WLAN must have the same SSID
|
13.
Which two statements characterize wireless network security?
|
|
|
|
|
|
|
|
14.
What type of authentication do most access points use by default?
|
Open
|
|
PSK
|
|
WEP
|
|
EAP
|
15.
Which statement is true about open authentication when it is enabled
on an access point?
|
requires
no authentication
|
|
uses a 64-bit
encryption algorithm
|
|
requires the
use of an authentication server
|
|
requires a
mutually agreed upon password
|
16.
What are two authentication methods that an access point could use?
|
WEP and WPA
|
|
WPA and EAP
|
|
EAP and ASCII
|
|
EAP
and pre-shared keys
|
|
Pre-shared
keys and ASCII
|
17.
What is the difference between using open authentication and
pre-shared keys?
|
Open
authentication requires a password. Pre-shared keys do not require
a password.
|
|
Open
authentication is used with wireless networks. Pre-shared keys are
used with wired networks.
|
|
Pre-shared
keys require an encrypted secret word. Open authentication does
not require a secret word.
|
|
Pre-shared
keys require a MAC address programmed into the access point. Open
authentication does not require this programming.
|
18.
What term describes the encoding of wireless data to prevent
intercepted data from being read by a hacker?
|
address
filtering
|
|
authentication
|
|
broadcasting
|
|
encryption
|
|
passphrase
encoding
|
19.
What access-point feature allows a network administrator to define
what type of data can enter the wireless network?
|
encryption
|
|
hacking block
|
|
traffic
filtering
|
|
MAC address
filtering
|
|
authentication
|
20.
What are the two WEP key lengths? (Choose two.)
|
|
|
|
|
|
|
|
21.
Complete the following sentence: WEP is used to ______ , and EAP is
used to _____ wireless networks.
|
encrypt;
authenticate users on
|
|
filter
traffic; select the operating frequency for
|
|
identify the
wireless network; compress data on
|
|
create the
smallest wireless network; limit the number of users on
|
0 komentar:
Posting Komentar