Name:     ID: 
 
Email: 

chap11

True/False
Indicate whether the statement is true or false.
 

 1. 

When using PSK (pre-shared key) authentication, the key value must be entered in both the Network key and Confirm network key fields and must match the key on the access point.
 

 2. 

A ten-character ASCII number is found in each frame that indicates the protocol and frame format.
 

 3. 

The MAC Addr field displays the default MAC address for the access point assigned by the manufacturer and cannot be changed.
 

 4. 

Problems on the wireless device are more common than problems affecting access points.
 

 5. 

When an access point is first turned on or when Mobile IP is first enabled on an access point, it obtains its own home agent information through advertising.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 6. 

In Mobile IP, what information is advertised on the network?
a.
whether an agent is a home agent, foreign agent, or both
b.
care-of address
c.
types of services provided
d.
All of the above
 

 7. 

With some wireless networks using Mobile IP, up to ____ AAPs can be designated.
a.
three
c.
six
b.
four
d.
ten
 

 8. 

The Default IP Address and Default IP Subnet Mask fields are used only when ____ is enabled for the network.
a.
DHCP
c.
Mobile IP
b.
MAC
d.
Advanced IP
 

 9. 

What is a good first step in diagnosing system throughput issues?
a.
monitor the speed of the access point
b.
remove all devices from the system then add them back one at a time
c.
determine if all devices are experiencing the problem or only a single device
d.
identify the potential causes that may have the least impact on the system if they are changed
 

 10. 

In Mobile IP, the ____ agent is a router, firewall, or gateway on the visiting client’s home network that serves as the anchor point for communication with the access point and the visiting client.
a.
home
c.
visiting
b.
foreign
d.
access point
 

 11. 

Some computer viruses are known to cause ____.
a.
duplicate SSID
b.
incorrect MAC addresses
c.
WLAN interference
d.
intermittent connectivity problems for wireless connections
 

 12. 

The ____ layer is an attractive place to focus attention on improving the coexistence between Bluetooth and WLANs because it is where such techniques as Carrier Sense Multiple Access/Collision Avoidance (CSMA/ CA) and data rates are determined.
a.
RF
c.
PHY
b.
software
d.
MAC
 

 13. 

For 802.11b and 802.11g wireless LANs only three channels (1, 6, and 11) can be used to co-locate multiple access points in the same area.  This is because they ____.
a.
are dedicated to TCP
c.
are dedicated to DHCP
b.
overlap
d.
do not overlap
 

 14. 

When using WEP as part of the transitional security model, the same ____ key must be installed on the access point and the device.  If not the wireless device may not operate properly.
a.
secure
c.
shared
b.
linked
d.
private
 

 15. 

What is the most frequent cause of wireless transmission problems?
a.
RF issues
c.
security breeches
b.
misconfiguration
d.
faulty access points
 

 16. 

When enabling Ethernet Timeout, the value in the Seconds field is generally set to between 30 and ____.
a.
40
c.
90
b.
60
d.
255
 

 17. 

When configuring advanced settings for an AP, the ____ is the domain that is serving the AP.
a.
Domain Suffix
c.
Default Domain
b.
Domain Name Server
d.
Current Domain
 

 18. 

Dividing a wired network into ____ makes network management easier and decreases the spread of broadcast packets throughout the network.
a.
segments
c.
systems
b.
subnets
d.
routes
 

 19. 

When a stronger signal from one wireless device drowns out another a(n) ____ problem is occurring.
a.
RF clash
c.
all-band interference
b.
near/far transmission
d.
co-location
 

 20. 

Devices using ____ may cause all-band interference.
a.
Mobile IP
c.
frequency hopping spread spectrum
b.
WEP
d.
IEEE 802.11g
 

 21. 

The default protocol of older Novell Net-Ware LANs is ____.
a.
TCP
c.
IPX
b.
UDP
d.
SPM
 

 22. 

What does a blinking green status indicator LED mean on an AP?
a.
access point is operating normally but is not associated with any wireless devices
b.
access point is associated with at least one wireless device
c.
access point not operating
d.
RF activity is occurring
 

 23. 

Frames can be filtered based on the protocol of that frame, such as TCP, or ____.
a.
FTP
c.
UDP
b.
HTTP
d.
DHCP
 

 24. 

In Mobile IP, access points use the ____ table to determine the IP address of the visiting client’s home agent.
a.
network map
c.
subnet map
b.
IP map
d.
home map
 

 25. 

All access points have a(n) ____ connector that allows them to connect to an Ethernet hub or switch to provide wired network resources to wireless devices.
a.
MN-11
c.
PP-22
b.
RJ-45
d.
QR-9
 

 26. 

Filtering can be performed by configuring the access point so that it acts as a type of ____.
a.
firewall
c.
bridge
b.
gateway
d.
router
 

Completion
Complete each statement.
 

 27. 

Enabling the ____________________ stops radio transmissions from the access point for the specified number of seconds if the AP detects no activity on the Ethernet line.
 

 

 28. 

The primary port of the AP is almost always the ____________________ network port.
 

 

 29. 

When scanning, the wireless network adapter sends a series of ____________________ frames and the APs within range respond with a Beacon frame that contains the capabilities of the wireless AP, such as the supported speeds, SSID, and security options.
 

 

 30. 

If the wireless device is configured for DHCP yet no DHCP server is active, then Windows assigns a(n) ____________________ IP Addressing address that begins with the IP range 169.254.x.x.
 

 

 31. 

The ____________________ access point uses a subnet map to keep track of the home agent information for all visiting client devices.
 

 



 
         Start Over