Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
|
1.
|
According to a study conducted by NOP World–Technology, wireless LANs
enable users to be connected to network resources ____ additional hours per day.
|
|
|
2.
|
Intel recommends that once the ROI model is complete, larger organizations
should return to step ____.
|
|
|
3.
|
It is important for wireless system administrators to maintain a(n) ____ log
that contains a record of all problems, solutions, and configuration changes.
a. | AP | c. | manual | b. | event | d. | network |
|
|
|
4.
|
Bluetooth divides the 2.4 GHz frequency into ____ different frequencies spaced 1
GHz apart.
|
|
|
5.
|
What is the last step in RF site tuning?
a. | validate coverage area | c. | modify throughput | b. | adjust channel settings | d. | documenting
changes |
|
|
|
6.
|
When determining which standard to use, if there are other devices in the
immediate area that use the 2.4GHz wireless spectrum, such as portable telephones and microwave ovens
then the ____ standard, which uses the 5 GHz wireless spectrum, might be the best solution.
a. | 802.11a | c. | 802.11g | b. | 802.11b | d. | 802.11 pre-N |
|
|
|
7.
|
____ authentication is used in the enterprise security model using WPA and
WPA2.
a. | IEEE 802.1x | c. | AES | b. | TKIP | d. | All of the
above |
|
|
|
8.
|
Electromagnetic waves travel freely through space in all directions at the speed
of light, or approximately ____ per second.
a. | 1 kilometer | c. | 186,000 miles | b. | 100 kilometers | d. | 93,000,000
miles |
|
|
|
9.
|
In Mobile IP, access points use the ____ table to determine the IP address of
the visiting client’s home agent.
a. | IP map | c. | subnet map | b. | home map | d. | network map |
|
|
|
10.
|
Which of the following technologies came first chronologically?
a. | digital subscriber lines (DSL) | b. | T-1 lines | c. | Integrated Services
Digital Networks (ISDN) | d. | leased transmission
lines |
|
|
|
11.
|
When the recipient receives the encrypted text, it must be decrypted with the
cipher and the key to produce the original ____.
a. | ciphertext | c. | detext | b. | deciphertext | d. | plaintext |
|
|
|
12.
|
The personal security model is intended for settings in which a(n) ____ is
unavailable.
a. | wired network | c. | authentication server | b. | intermediate
security model | d. | AP |
|
|
|
13.
|
What is the difference between passive and active scanning?
a. | the number of devices that can be supported | b. | the speed at which
discovery is made | c. | the security of the network | d. | which device
initiates the discovery |
|
|
|
14.
|
Which type of attacker typically has a high skill level?
a. | cracker | c. | spy | b. | hacker | d. | All of the
above |
|
|
|
15.
|
Into which layers are WLAN features isolated by IEEE standards?
a. | MAX and PLCP | c. | PMD and PLCP | b. | PHY and MAC | d. | PHY and PMD |
|
|
|
16.
|
Following authentication, if the access point accepts the wireless device, it
reserves memory space in the AP and establishes a(n) ____ ID for it.
a. | device | c. | association | b. | authentication | d. | member |
|
|
|
17.
|
According to FCC regulations, all FHSS systems in the 900 MHz band must change
frequencies through 50 channels and cannot spend more than ____ on one frequency each 20
seconds.
a. | 20 milliseconds | c. | 400 milliseconds | b. | 30 milliseconds | d. | 1 second |
|
|
|
18.
|
When updating firmware in an enterprise-level access point, the Receiving AP
must be able to hear the IP ____ issued by the Distribution AP.
a. | broadcast | c. | netcast | b. | multicast | d. | unicast |
|
|
|
19.
|
What is a drawback of a spectrum analyzer?
a. | information is displayed as raw data, not in graphical form | b. | information is
displayed in graphical form and not as raw data | c. | information only applies to one
frequency | d. | only made by a single manufacturer and very expensive |
|
|
|
20.
|
The IEEE 802.11 standard outlines the use of ____ transmissions for
WLANs.
a. | gallium arsenide | c. | diffused infrared | b. | radio wave | d. | directed
infrared |
|
|
|
21.
|
The ____ technology has a transmission distance of up to 10 meters.
a. | RFID | c. | WiMax | b. | Bluetooth | d. | GSM |
|
|
|
22.
|
____ is considered a hard benefit.
a. | Productivity | c. | Cost reduction | b. | Faster responsiveness | d. | Improved employee
satisfaction |
|
|
|
23.
|
What disadvantage of wireless networks provides the biggest stumbling block to
the adoption of wireless technology?
a. | security | c. | speed | b. | cost | d. | complexity |
|
|
|
24.
|
The 802.11b standard specifies ____ frequencies that can be used, beginning at
2.412 GHz.
|
|
|
25.
|
____ give team-based workers the ability to access the network resources that
they need while collaborating in a team environment.
a. | Video pills | c. | Barcodes | b. | RFIDs | d. | WLANs |
|
|
|
26.
|
The ____ coding technique consists of a set of 64 8-bit code words.
a. | chipping | c. | fixed scramble | b. | complementary code keying | d. | Barker |
|
|
|
27.
|
Why is it important to document existing wired and wireless networks?
a. | to better understand the basic networking needs of the
organization | b. | to examine possible sources of interference | c. | to ensure that the
new or expanded wireless LAN will “dovetail” into what is already in
place | d. | to avoid providing overlapping network coverage |
|
|
|
28.
|
When an AP accepts or rejects a wireless device it sends a(n) ____ frame.
a. | disassociation | c. | association request | b. | reassociation | d. | association
response |
|
|
|
29.
|
In a wireless network, the ____ acts as a base station to receive the signals
and transmit signals back to the wireless network interface cards in the other wireless
devices.
a. | cable | c. | access point | b. | wireless adapter | d. | network interface
card |
|
|
|
30.
|
When implementing an interim security model, most vendors have the option of a
128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most
secure option.
a. | plaintext | c. | hexadecimal | b. | ciphered | d. | ASCII |
|
|
|
31.
|
Frames can be filtered based on the protocol of that frame, such as TCP, or
____.
|
|
|
32.
|
Which digital modulation technique is similar to frequency modulation?
a. | frequency shift keying | c. | phase shift keying | b. | amplitude shift keying | d. | All of the
above |
|
|
|
33.
|
What provides the greatest source of RF interference?
a. | mirror | c. | desk | b. | chair | d. | interior wall |
|
|
|
34.
|
Most vendors illustrate their radiation patterns by splitting the
three-dimensional donut into two perpendicular planes called ____ and elevation.
a. | azimuth | c. | donut | b. | plain | d. | horizontal |
|
|
|
35.
|
What should you be sure to do when collecting RF information?
a. | observe the data being displayed by the software measurement
tools | b. | connect to the Internet and download a file to test bandwidth | c. | write down your
perception of connection speed | d. | take pictures of your location as you move
around |
|
|
|
36.
|
Which type of remote wireless bridge connection is used to connect multiple LAN
segments together?
a. | segment-to-segment | c. | point-to-point | b. | point-to-multipoint | d. | multipoint-to-multipoint |
|
|
|
37.
|
A standard personal computer can easily create over ____ possible password
combinations per second.
a. | 100 | c. | 1,000,000 | b. | 1,000 | d. | 1,000,000,000 |
|
|
|
38.
|
Which of the following should be included when documenting current network
setup?
a. | competitors to the organization | b. | benefits of wireless
technology | c. | types of clients | d. | hours spent using the network by each
employee |
|
|
|
39.
|
A(n) ____ amplifier boosts the RF signal before it is injected into the
device that contains the antenna.
a. | internal | c. | bidirectional | b. | unidirectional | d. | pre-injection |
|
|
|
40.
|
The ____ method of encryption is used in a personal security model.
|
|
|
41.
|
RC4 is a ____ cipher that accepts keys up to 128 bits in length.
a. | key | c. | logical | b. | cyclic | d. | stream |
|
|
|
42.
|
Two adjacent access points that use the same ____ can cause interference and
lost frames.
a. | station | c. | hotspot | b. | ESS | d. | channel |
|
|
|
43.
|
On wireless networks, ____ attacks are commonly done by attackers setting up a
“fake” access point.
a. | weak key | c. | man-in-the-middle | b. | spoof | d. | DoS |
|
|
|
44.
|
Television uses three types of modulation. The video portion uses
____.
|
|
|
45.
|
____ replaces CRC in WPA.
|
|
|
46.
|
The radio frequency spectrum is divided into ____ different sections or
bands.
|
|
|
47.
|
What information is required for a link budget?
a. | path length | c. | power of the transmitter | b. | frequency of the
link | d. | All of the
above |
|
|
|
48.
|
When configuring advanced settings for an AP, the ____ is the domain that is
serving the AP.
a. | Default Domain | c. | Domain Name Server | b. | Current Domain | d. | Domain Suffix |
|
|
|
49.
|
Why is CSMA/CD unsuitable for wireless networks?
a. | difficult to synchronize backoff times | c. | difficult to detect
collisions | b. | Hidden node problem | d. | Both A and B |
|
|
|
50.
|
Which type of RF loss is caused by the equipment transmitting the signal?
a. | Scattering | c. | Absorption | b. | Diffraction | d. | Voltage Standing Wave
Ratio |
|
|
|
51.
|
What is a problem with measuring RF loss using a linear scale?
a. | it is inaccurate | b. | it requires complex
measurements | c. | it is difficult to calculate | d. | it does not reveal what the loss is in relation
to the whole |
|
|
|
52.
|
In FHSS, the amount of time needed to move from one frequency to another is the
____ time.
a. | switch | c. | dwell | b. | hop | d. | lift |
|
|
|
53.
|
Beginning with Windows ____, all Microsoft desktop operating systems recognize a
wireless NIC without the need for any external software drivers.
|
|
|
54.
|
Which organization would most likely not benefit from the introduction of a
wireless LAN?
a. | they would all benefit | b. | organization that is fighting a fierce battle
with its competitors | c. | business that has captured a niche in the
marketplace and currently has no serious competitors | d. | business that is rapidly losing market share
and has changed CEOs three times in the last 18 months |
|
|
|
55.
|
What type of AP antenna is most commonly used in a site survey?
a. | semi-directional | c. | omnidirectional | b. | parabolic | d. | highly-directional |
|
|
|
56.
|
What authentication system did the proposed WEP2 standard use?
a. | AES-CCMP | c. | key caching | b. | dynamic WEP | d. | Kerberos |
|
|
|
57.
|
IEEE has divided the ____ layer into two sublayers: Logical Link Control (LLC)
and Media Access Control (MAC).
a. | Data Link | c. | Transport | b. | Physical | d. | Session |
|
|
|
58.
|
____ can occur intentionally from an external power source that amplifies the
signal, or unintentionally when an RF signal bounces off an object and combines with the original
signal to amplify it.
a. | Phase shift | c. | Gain | b. | Loss | d. | Modulation |
|
|
|
59.
|
An access point sends out a beacon frame containing a ____ identifying the
stations that have buffered frames waiting at the access point.
a. | waiting map | c. | buffered cache | b. | buffer list | d. | traffic indication
map |
|
|
|
60.
|
____ signals by nature transmit on only one frequency or a very narrow portion
of the frequencies.
a. | Radio | c. | Heat | b. | Computer | d. | Broadband |
|
|
|
61.
|
When conducting a security audit, ____ should determine vulnerabilities.
a. | a highly-paid consultant | b. | a team with diverse
backgrounds | c. | a junior administrator | d. | a wireless system administrator employed by the
company |
|
|
|
62.
|
Which aspect of information security does WEP protect?
a. | integrity | c. | confidentiality | b. | availability | d. | All of the
above |
|
|
|
63.
|
With MobileIP, the ____ assigns the mobile computer a new (but temporary) IP
number.
a. | local AP | c. | foreign agent | b. | foreign AP | d. | roamed network |
|
|
|
64.
|
The ____ wireless security standard provides a low level of security.
a. | WEP2 | c. | WEP | b. | Dynamic WEP | d. | All of the
above |
|
|
|
65.
|
A ____ dipole antenna produces a flatter signal than a standard dipole
antenna.
a. | zoned | c. | Fresnel | b. | semi-directional | d. | high-gain |
|
|
|
66.
|
Vulnerabilities that are ranked as ____ are events that would cause the
organization to cease functioning or be seriously crippled in its capacity to perform.
a. | small impact | c. | significant | b. | major | d. | catastrophic |
|
|
|
67.
|
In a 64-bit packet sent using WEP, how many bits are actually encrypted?
|
|
|
68.
|
All access points have a(n) ____ connector that allows them to connect to an
Ethernet hub or switch to provide wired network resources to wireless devices.
a. | QR-9 | c. | RJ-45 | b. | PP-22 | d. | MN-11 |
|
|
|
69.
|
What aspect of RF may produce biological damage?
a. | heating effects | c. | waves passing through the brain | b. | waves damaging the
eyes | d. | cooling
effects |
|
|
|
70.
|
A ____ attack on WEP involves viewing collisions to derive plaintext
values.
a. | weak key | c. | keystream | b. | pseudo-random number | d. | capture |
|
|
|
71.
|
A ____ is not malicious but often seeks to expose security flaws.
a. | cracker | c. | hacker | b. | script kiddie | d. | spy |
|
|
|
72.
|
A loss of 10 decibels means that ____ percent of the power has been lost in
mW.
|
|
|
73.
|
What is a consideration when conducting an outdoor site survey?
a. | foliage | c. | climate conditions | b. | permits and zoning | d. | All of the
above |
|
|
|
74.
|
The 802.11b standard can support wireless devices that are up to ____ meters
apart.
|
|
|
75.
|
Devices using ____ may cause all-band interference.
a. | frequency hopping spread spectrum | c. | Mobile IP | b. | WEP | d. | IEEE
802.11g |
|
|
|
76.
|
What affects the coverage pattern?
a. | skill of person conducting site survey | c. | notebook operating
system | b. | objects that interfere with the RF signal | d. | wireless
protocol |
|
|
|
77.
|
How many millions of bits per second can be transmitted in a Wi-Fi
network?
|
|
|
78.
|
The 802.11 standard provides an option that can be used when collisions occur
due to a hidden node. That option is known as ____.
a. | hidden node detection | c. | virtual node detection | b. | node collision
protocol | d. | virtual carrier
sensing |
|
|
|
79.
|
Which type of RF loss is caused by the equipment itself, not external
objects?
a. | Voltage Standing Wave Ratio | c. | Refraction | b. | Scattering | d. | Absorption |
|
|
|
80.
|
Which of the following statements describes the difference between a CF wireless
NIC and a PC card?
a. | CF requires separate antenna to be built into monitor | b. | PC card is larger
than CF | c. | PC card is smaller than CF | d. | PC card consumes less power than
CF |
|
|
|
81.
|
When a digital signal needs to be transmitted over an analog medium, such as
when a computer needs to send digital signals over an analog telephone line or TV cable, a device
known as a(n) ____ is used.
a. | amplifier | c. | modem | b. | phaser | d. | translator |
|
|
|
82.
|
When a Web server sends a Web page back to a PC, it is only sending HTML code;
the ____ is responsible for interpreting that code and displaying the results on the screen.
a. | Web interpreter | c. | gateway | b. | Web browser | d. | desktop |
|
|
|
83.
|
Which channels in IEEE 802.11b and 802.11g networks do not overlap?
a. | 1, 2, and 3 | c. | 1, 6, and 11 | b. | 1, 5, and 8 | d. | 1, 10, and 20 |
|
|
|
84.
|
The default protocol of older Novell Net-Ware LANs is ____.
|
|
|
85.
|
____ is a low-power wireless data and voice transmission technology.
a. | WAP | c. | AP | b. | Bluetooth | d. | Wi-Fi |
|
|
|
86.
|
According to the IEEE 802.11 cryptography objectives, how strong should WEP
be?
a. | difficult | c. | unbreakable | b. | extremely | d. | reasonably |
|
|
|
87.
|
If an organization’s data processing center becomes inoperable, it can
move all data processing operations to a ____, often within an hour.
a. | cold site | c. | hot site | b. | recovery location | d. | neutral site |
|
|
|
88.
|
On ESS networks that have multiple access points, the wireless device might
actually receive beacon frames from several APs. Which AP would a wireless device generally
choose in this case?
a. | the one with the fewest wireless devices attached to the AP | b. | the
closest | c. | the one with the strongest signal strength | d. | the choice will be
random |
|
|
|
89.
|
What is the shape of a Fresnel zone?
a. | Ellipsoidal | c. | Rectangular | b. | Elliptical | d. | Circular |
|
|
|
90.
|
The Physical Layer Convergence Procedure (PLCP) standards for 802.11b are based
on ____.
|
|
|
91.
|
Why is a WLAN less expensive for business than a wired LAN?
a. | no need to tunnel through walls and ceilings to install cable | b. | equipment is less
expensive | c. | wireless equipment does not need to be upgraded | d. | All of the
above |
|
|
|
92.
|
What is a requirement for an access point used in a site survey?
a. | fixed power levels | c. | external antenna connectors | b. | built-in
battery | d. | All of the
above |
|
|
|
93.
|
The term ____ describes the rate of transmission falling as the device moves
farther from the AP.
a. | packet throughput | c. | RF frequency | b. | data rate boundaries | d. | coverage
pattern |
|
|
|
94.
|
Which characteristic of information is guarded by access control?
a. | integrity | c. | confidentiality | b. | availability | d. | robustness |
|
|
|
95.
|
A WEP key can be a passphrase created by entering ____ ASCII characters.
|
|
|
96.
|
What is the range of transmission for a WPAN?
a. | 3 feet | c. | 14 feet | b. | 10 feet | d. | 22 feet |
|
|
|
97.
|
What is the first step in collecting RF information?
a. | document AP position | c. | note the objects and layout of the room | b. | walk around room to
test signal | d. | position the
access point |
|
|
|
98.
|
For 802.11b and 802.11g wireless LANs only three channels (1, 6, and 11) can be
used to co-locate multiple access points in the same area. This is because they ____.
a. | are dedicated to TCP | c. | are dedicated to DHCP | b. | overlap | d. | do
not overlap |
|
|
|
99.
|
Which sector of the economy has adopted wireless technology most
completely?
a. | education | c. | construction | b. | business | d. | travel |
|
|
|
100.
|
What is the maximum transmission distance for FSO?
a. | 4 miles | c. | 10 miles | b. | 6.4 miles | d. | 100 miles |
|
|
|
101.
|
What is the single most important tool in any business?
a. | personal networked computer | c. | mainframe | b. | information | d. | database |
|
|
|
102.
|
A device called a ____ must sometimes be attached to a PDA in order to establish
a wireless connection. The device contains a slot for a wireless NIC or similar device.
a. | slot | c. | sled | b. | shoe | d. | bridge |
|
|
|
103.
|
____ generates the highest level of interference.
a. | Marble | c. | Paper | b. | Metal | d. | Bulletproof
glass |
|
|
|
104.
|
Most industry experts recommend one access point for no more than ____ users if
they are performing basic e-mail, light Web surfing, and occasionally transferring medium-sized
files.
|
|
|
105.
|
A ____ limits the amplitude and disturbing interference voltages by
channeling them to the ground.
a. | phase modulator | c. | lightning arrestor | b. | splitter | d. | RF attenuator |
|
|
|
106.
|
____ modulation changes the number of waves representing one cycle.
a. | Phase shift | c. | Amplitude | b. | Phase | d. | Frequency |
|
|
|
107.
|
At the heart of a WIDS are ____; these devices, which can be either separate
hardware devices or a standard access point operating in a special “scan” mode, monitor
the airwaves to detect signals from rogue access points.
a. | VPNs | c. | wireless sensors | b. | captive portals | d. | firewalls |
|
|
|
108.
|
____ is considered to be the “heart and soul” of WPA
security.
|
|
|
109.
|
What is the name for the computer network architecture standards developed by
the IEEE?
a. | Project 802 | c. | Project Athena | b. | Project 1000 | d. | Project Network |
|
|
|
110.
|
What does a blinking green status indicator LED mean on an AP?
a. | access point is associated with at least one wireless device | b. | access point not
operating | c. | RF activity is occurring | d. | access point is operating normally but is not
associated with any wireless devices |
|
|
|
111.
|
What type of device is used for communication in a fixed broadband wireless
network?
a. | antenna | c. | cable | b. | electrical wiring | d. | handheld |
|
|
|
112.
|
What is a disadvantage of thin access points?
a. | very expensive | b. | handoff time is increased | c. | complicated network
management | d. | all thin access points and switches are proprietary |
|
|
|
113.
|
When is the best time to perform a site survey?
a. | monthly | c. | daily | b. | prior to installing a WLAN | d. | quarterly |
|
|
|
114.
|
A ____ antenna is most typically used on a WLAN.
a. | panel | c. | beam steering | b. | rod | d. | sectorized |
|
|
|
115.
|
____ ensures that the information is correct and that no unauthorized person or
malicious software program has altered that data.
a. | Integrity | c. | Access control | b. | Confidentiality | d. | Availability |
|
|
|
116.
|
An increasingly ____ workforce is one characteristic of today’s business
world.
a. | mobile | c. | less experienced | b. | technically challenged | d. | younger |
|
|
|
117.
|
____ is not part of a frame.
a. | Length | c. | Channel | b. | Parity | d. | Data |
|
|
|
118.
|
If a remote wireless bridge is set to ____, it can only transmit to another
bridge in root mode.
a. | access point mode | c. | non-root mode | b. | root mode | d. | repeater mode |
|
|
|
119.
|
In an infrastructure network the beacon interval is normally set to ____ ms,
although it can be modified.
|
|
|
120.
|
What is the free space loss (in dB) for IEEE 802.11b and 802.11g WLANs when the
distance in meters is 100?
|
|
|
121.
|
What techniques are used by vendors to achieve 2x mode for transmissions?
a. | use different coding rate schemes | c. | reallocating the individual
carriers | b. | combine two frequency channels | d. | All of the
above |
|
|
|
122.
|
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called
rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key
performs 11 rounds, and a 256-bit key uses ____ rounds.
|
|
|
123.
|
When was the concept used by FHSS technology developed?
a. | during World War I | c. | in the 1960s | b. | in the 1980s | d. | during World War
II |
|
|
|
124.
|
What is the name of the 128-bit key used in TKIP?
a. | PRNG | c. | MIC | b. | XOR | d. | temporal key |
|
|
|
125.
|
In Mobile IP, what information is advertised on the network?
a. | whether an agent is a home agent, foreign agent, or both | b. | types of services
provided | c. | care-of address | d. | All of the
above |
|
|
|
126.
|
Most bridges have what is known as ____ that minimizes the spread of the
signal so that it can reach farther distances.
a. | multipoint scheduling | c. | delay spread | b. | interspersed communications | d. | scheduled
delays |
|
|
|
127.
|
What is the default authentication method according to the 802.11
standard?
a. | open system | c. | shared key | b. | basic | d. | private key |
|
|
|
128.
|
At regular intervals the AP in an infrastructure network or wireless device in
an ad hoc network sends a ____ frame both to announce its presence and to provide the necessary
information for other devices to join the network.
a. | control | c. | master | b. | data | d. | beacon |
|
|
|
129.
|
What affects transmission range?
a. | objects in path only | c. | wireless protocol | b. | distance and objects in
path | d. | distance
only |
|
|
|
130.
|
The RTS/CTS protocol is especially taxing when ____ data packets are being
transmitted.
a. | redirecting | c. | encrypted | b. | long | d. | short |
|
|
|
131.
|
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless)
that requests access to the network is prevented from receiving any traffic until its identity
can be verified.
a. | port scanning | c. | an access control list | b. | port
blocking | d. | port
security |
|
|
|
132.
|
In a 802.11b network, how many power users should be associated with one access
point?
|
|
|
133.
|
Filtering can be performed by configuring the access point so that it acts as a
type of ____.
a. | router | c. | firewall | b. | gateway | d. | bridge |
|
|
|
134.
|
DSSS uses a bit pattern called a ____ code.
a. | dwelling | c. | setting | b. | chipping | d. | hopping |
|
|
|
135.
|
What is the most frequent cause of wireless transmission problems?
a. | faulty access points | c. | RF issues | b. | security breeches | d. | misconfiguration |
|
|
|
136.
|
At what rate is the number of wireless hostpots increasing each year?
|
|
|
137.
|
What is the first step in shared key authentication?
a. | AP sends wireless device an authentication frame that contains a block of text known
as the challenge text | b. | wireless device sends an authentication frame
to the AP | c. | AP encrypts challenge text and sends it to wireless device | d. | wireless device
encrypts challenge text and sends it to AP |
|
|
|
138.
|
Where can a RFID tag be read?
a. | anywhere within the range of a transmitted radio signal | b. | when physically
connected to the scanner | c. | only within the line of sight of the
scanner | d. | only when next to the scanner |
|
|
|
139.
|
The ____ setting of a site survey analyzer specifies the AP that will be
involved in the test.
a. | Destination MAC Address | c. | Delay Between
Packets | b. | Continuous Link Test | d. | Packet Tx Type |
|
|
|
140.
|
How does OFDM work?
a. | one signal is sent twice on the same channel | b. | signals are broken
up and the parts are sent in parallel | c. | a signal is sent over a wired network at the
same time as the wireless network | d. | the same signal is sent on multiple
channels |
|
|
|
141.
|
When a stronger signal from one wireless device drowns out another a(n) ____
problem is occurring.
a. | near/far transmission | c. | co-location | b. | RF clash | d. | all-band
interference |
|
|
|
142.
|
What security technology was most recently introduced?
a. | WEP2 | c. | Dynamic WEP | b. | WPA | d. | WPA2 |
|
|
|
143.
|
In Mobile IP, the ____ agent is a router, firewall, or gateway on the visiting
client’s home network that serves as the anchor point for communication with the access point
and the visiting client.
a. | home | c. | foreign | b. | access point | d. | visiting |
|
|
|
144.
|
What is a disadvantage of standards?
a. | reduced competition | b. | higher prices | c. | they can open
domestic markets in larger countries to overseas competition | d. | devices produced by
different vendors may not interoperate |
|
|
|
145.
|
Which of the following units is used to measure frequency?
a. | volt | c. | decibel | b. | byte | d. | hertz |
|
|
|
146.
|
When using WEP as part of the transitional security model, the same ____ key
must be installed on the access point and the device. If not the wireless device may not
operate properly.
a. | linked | c. | shared | b. | private | d. | secure |
|
|
|
147.
|
____ was initially founded by the U.S. Department of Defense and is now part of
the Software Engineering Institute at Carnegie Mellon University.
a. | Computer Emergency Response Team Coordination Center (CERT/CC) | b. | National Security
Institute (NSI) | c. | InfraGard | d. | SysAdmin, Audit, Network, Security (SANS)
Institute |
|
|
|
148.
|
Which system is preferred for 802.11b WLANs?
a. | OFDM | c. | DSSS | b. | FHSS | d. | All are equally
preferred |
|
|
|
149.
|
Which of the following is an electromagnetic wave?
a. | radio | c. | heat | b. | light | d. | All of the
above |
|
|
|
150.
|
____ was designed to address WEP vulnerabilities with a minimum of
inconvenience.
a. | WPA | c. | IEEE 802.11i | b. | TGi | d. | dynamic WEP |
|
|
|
151.
|
A Bluetooth network that contains one master and at least one slave device forms
a ____.
a. | winet | c. | piconet | b. | subnet | d. | cycle |
|
|
|
152.
|
What is a good first step in diagnosing system throughput issues?
a. | identify the potential causes that may have the least impact on the system if they
are changed | b. | determine if all devices are experiencing the problem or only a single
device | c. | remove all devices from the system then add them back one at a
time | d. | monitor the speed of the access point |
|
|
|
153.
|
An employee who purchases an access point and secretly brings it into the office
in order to provide personal wireless access has installed what is known as a ____ access
point.
|
|
|
154.
|
When a business is registered as a ____ they are qualified be placed in an
online database of wireless hotspot locations.
a. | Wi-Fi Zone | c. | WECA | b. | SOHO | d. | Wi-Fi Alliance
member |
|
|
|
155.
|
Where must a WiMax transmitter be located?
a. | anywhere in a building | b. | on the roof of a building | c. | anywhere on upper
floors of a building | d. | by a window in the upper floors of a
building |
|
|
|
156.
|
According to NOP-World Technology, ____ percent of end users said that a WLAN
improves their quality of life by increasing flexibility and productivity, and saving time.
|
|
|
157.
|
The ____ field of an 802.11a frame consists
of 10 repetitions of a short training sequence signal and two repetitions of a long training sequence
signal.
a. | Service | c. | Rate | b. | Synchronization | d. | Parity |
|
|
|
158.
|
What is the first step in implementing an interim security model?
a. | MAC address filtering | c. | turning off SSID beaconing | b. | shared key
authentication | d. | port
security |
|
|
|
159.
|
In WEP, the CRC generates a(n) ____ based on the contents of the text.
a. | key | c. | cipher | b. | initialization vector | d. | checksum |
|
|
|
160.
|
What is the best way to gather site-specific documentation?
a. | reviewing blueprints | c. | interviewing management | b. | inspecting the
site | d. | viewing
documentation |
|
|
|
161.
|
What is the most basic tool or component involved in a site survey?
a. | site survey analyzer | c. | access point | b. | PDA | d. | notebook
computer |
|
|
|
162.
|
The maximum EIRP for IEEE 802.11b WLANs is ____ mW.
|
|
|
163.
|
In the Windows operating system, what window provides basic tools for monitoring
a WLAN?
a. | Wireless Adapter Information | c. | Network Monitor | b. | Access Point
Utilities | d. | Wireless Network
Connection Status |
|
|
|
164.
|
What tool(s) are used most often as “standard” network monitoring
tools?
a. | Simple Network Management Protocol and Remote Monitoring | b. | AP Monitor and
Simple Network Management Protocol | c. | WLAN Logger and Remote
Monitoring | d. | All of the above |
|
|
|
165.
|
____ attenuators are the only type permitted by the FCC for WLAN systems.
a. | Fixed-loss | c. | Unidirectional | b. | Bidirectional | d. | Variable-loss |
|
|
|
166.
|
Which of the following describes a wireless device switching from one AP to
another?
a. | roaming | c. | redirecting | b. | handoff | d. | routing |
|
|
|
167.
|
The ____ field appears last in a data frame.
a. | Frame check sequence | c. | Frame control | b. | Duration | d. | Sequence
control |
|
|
|
168.
|
Which of the following types of wave is imperceptible?
a. | radio | c. | light | b. | heat | d. | ether |
|
|
|
169.
|
What do many industry experts believe is the greatest opportunity for
business-process improvement at the beginning of the 21st century?
a. | providing wireless hotspots in rural communities | b. | access to the
Internet from employee’s desks | c. | extending network access to employees who are
away from their desks | d. | All of the
above |
|
|
|
170.
|
In a brute force attack, what key combination would follow 00001?
a. | 00000 | c. | 00010 | b. | 00002 | d. | 10000 |
|
|
|
171.
|
The term ____ describes the rate of electrical flow.
a. | resistance | c. | current | b. | voltage | d. | electrical
power |
|
|
|
172.
|
When using the Shared Wireless Access Protocol, devices can be as far as 45
meters (150 feet) apart and can send and receive data at rates up to ____ Mbps.
|
|
|
173.
|
What function is performed by a wireless gateway?
a. | authentication | c. | bandwidth management | b. | encryption | d. | All of the
above |
|
|
|
174.
|
A ____ VPN is a user-to-LAN connection used by remote users.
a. | peer-to-peer | c. | remote-access | b. | remote-to-LAN | d. | site-to-site |
|
|
|
175.
|
What is the top layer of the OSI reference model?
a. | physical | c. | transport | b. | application | d. | presentation |
|
|
|
176.
|
____ is another name for open systems authentication.
a. | SSID filtering | c. | Symmetric key encryption | b. | Public key
encryption | d. | WEP |
|
|
|
177.
|
How are business requirements for a WLAN obtained?
a. | interviewing management | c. | Internet
research | b. | interviewing technical staff | d. | reading company
documentation |
|
|
|
178.
|
The ____ layer is an attractive place to focus attention on improving the
coexistence between Bluetooth and WLANs because it is where such techniques as Carrier Sense Multiple
Access/Collision Avoidance (CSMA/ CA) and data rates are determined.
|
|
|
179.
|
With some wireless networks using Mobile IP, up to ____ AAPs can be
designated.
|
|
|
180.
|
All frames contain the MAC address of the source and destination device, a frame
sequence number, and a frame ____ used for error detection.
a. | unit | c. | check sequence | b. | sum | d. | flag |
|
|
|
181.
|
How does an access point receive electrical power if it is mounted in a location
that is not close to an electrical outlet?
a. | through the unused wires in a standard unshielded twisted pair (UTP) Ethernet
cable | b. | through radio waves | c. | it must be mounted near an
outlet | d. | through a USB cable |
|
|
|
182.
|
The Default IP Address and Default IP Subnet Mask fields are used only when ____
is enabled for the network.
a. | Mobile IP | c. | Advanced IP | b. | DHCP | d. | MAC |
|
|
|
183.
|
____ effectively prevents collisions because every device must wait until it
receives permission before it can transmit.
a. | CSMA/CD | c. | CSMA/CA | b. | Fragmentation | d. | Polling |
|
|
|
184.
|
Because a device must wait to transmit until it receives the last reflected
signal, this in effect puts a ceiling limit on the overall speed of the WLAN. What is the
current ceiling for WLAN speed?
a. | under 10 Mbps | c. | between 20 and 30 Mbps | b. | between 10 and 20
Mbps | d. | over 50
Mbps |
|
|
|
185.
|
What technique(s) is/are most effective for defeating social engineering
attacks?
a. | documentation | b. | physical and software
security | c. | education and policies | d. | undercover work by network
administrators |
|
|
|
186.
|
What are the parts of a site survey report?
a. | data section, recommendation section | c. | narrative section, graphical
section | b. | data section, conclusion section | d. | introduction section, graphical
section |
|
|
|
187.
|
____ is a nonvolatile storage chip used in computers and other devices.
a. | RMON | c. | Firmware | b. | SNMP | d. | EEPROM |
|
|
|
188.
|
For a proper WLAN performance, the link budget must be ____ dB.
a. | greater than zero | c. | greater than ten | b. | greater than five | d. | less than ten |
|
|
|
189.
|
When enabling Ethernet Timeout, the value in the Seconds field is generally set
to between 30 and ____.
|
|
|
190.
|
A wireless DoS attack may involve an attacker sending a series of ____ frames to
a wireless device.
a. | disassociation | c. | incomplete | b. | drop | d. | misaddressed |
|
|
|
191.
|
A(n) ____ card improves input/output speed over a PC Card by increasing the bus
width to 32 bits yet still supports lower-voltage PC Cards.
a. | built-in | c. | CardBus | b. | mini PCI | d. | access point |
|
|
|
192.
|
The current version of SNMP (____) addresses security and remote
configuration.
|
|
|
193.
|
The 802.11i standard addresses both ____.
a. | authentication and direction | c. | integrity and
confidentiality | b. | encryption and authentication | d. | encryption and
confidentiality |
|
|
|
194.
|
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or
logs out and logs back in.
a. | passphrase | c. | ticket | b. | broadcast | d. | unicast |
|
|
|
195.
|
What feature of IEEE 802.11i allows a device to become authenticated to an AP
before moving to it?
a. | pre-authentication | c. | port security | b. | key caching | d. | message passing |
|
|
|
196.
|
An access point has a(n) ____ wired network interface that allows it to connect
by cable to a standard wired network.
a. | compact flash | c. | PCI | b. | RJ-45 | d. | IEEE 802 |
|
|
|
197.
|
You would use ____ in documenting a site survey.
a. | blueprints | c. | plain paper | b. | a digital camera | d. | All of the
above |
|
|
|
198.
|
____ should be considered when calculating ROI.
a. | Customer satisfaction | c. | Training | b. | Implementation costs | d. | All of the
above |
|
|
|
199.
|
____ is one of the most effective strategies for providing support for a new
wireless network.
a. | Creating formal user support groups | b. | Outsourcing support to a third
party | c. | Assigning support to the information technology department | d. | Maintaining a help
desk |
|
|
|
200.
|
MAC address filtering is vulnerable because there are programs available that
allow users to ____ a MAC address.
a. | modify | c. | break | b. | disable | d. | spoof |
|
|
|
201.
|
The length of an antenna should be about ____ the wavelength.
a. | 1/10 of | c. | 1/2 of | b. | 1/4 of | d. | equal to |
|
|
|
202.
|
What should you do when electrical alternating current power is not available
near the AP location?
a. | user Power over Ethernet | c. | use a battery | b. | move it to another
location | d. | use wireless
power |
|
|
|
203.
|
When an RF signal moves from one medium to another of a different density the
signal actually bends instead of traveling in a straight line. This is known as ____.
a. | refraction | c. | absorption | b. | scattering | d. | reflection |
|
|
|
204.
|
The ____ field appears first in a management frame.
a. | Destination address | c. | Frame control | b. | Duration | d. | BSSID |
|
|
|
205.
|
Some computer viruses are known to cause ____.
a. | WLAN interference | b. | intermittent connectivity problems for wireless
connections | c. | duplicate SSID | d. | incorrect MAC
addresses |
|
|
|
206.
|
____ antennas are used for long distance, point-to-point wireless links, such as
connecting buildings that are up to 42 kilometers (25 miles) apart.
a. | Omni-directional | c. | Fresnel | b. | Semi-directional | d. | Highly-directional |
|
|
|
207.
|
Which site survey analyzer setting sets the number of times a transmission will
be repeated if an acknowledgment (ACK) frame is not returned by the destination device?
a. | data retries | c. | data rate | b. | number of packets | d. | packet size |
|
|
|
208.
|
Which network requires some sort of gateway or interface to be compatible with
IEEE 802.11 WLANs?
a. | Token Ring | c. | Ethernet | b. | Mobile IP | d. | Wired Bus |
|
|
|
209.
|
____ generates low interference.
a. | Wire mesh in glass | c. | Wood | b. | The human body | d. | Concrete |
|
|
|
210.
|
What is a disadvantage of narrowband transmissions?
a. | expensive to implement | c. | not well regulated | b. | interference from another radio
signal | d. | requires a
complicated algorithm |
|
|
|
211.
|
What is another name for propagation loss?
a. | signal loss | c. | effective loss | b. | transmission loss | d. | free space loss |
|
|
|
212.
|
What type of device is used in the medical field to diagnose digestive problems
without surgery?
a. | barcoded medications | c. | video pill | b. | RFID | d. | wireless LAN |
|
|
|
213.
|
MAC address filtering ____.
a. | requires pre-approved authentication | c. | is expensive | b. | does not work
well | d. | is difficult to
implement |
|
|
|
214.
|
What is the minimum number of BSS networks required to form an ESS?
|
|
|
215.
|
Microsoft Windows has become the ____ standard operating system today for
personal desktop computers and network servers.
a. | de facto | c. | de jure | b. | consortia | d. | All of the
above |
|
|
|
216.
|
The first step in creating a security policy is ____.
a. | documentation | c. | security auditing | b. | risk assessment | d. | impact analysis |
|
|
|
217.
|
Encryption under the WPA2 personal security model is accomplished by using the
block cipher ____.
|
|
|
218.
|
A BSS is ____.
a. | a geographical area where wireless devices reside | b. | a unique
identifier | c. | two or more networks that are connected through a common distribution
system | d. | a group of wireless devices that is served by a single access
point |
|
|
|
219.
|
Dividing a wired network into ____ makes network management easier and decreases
the spread of broadcast packets throughout the network.
a. | systems | c. | segments | b. | subnets | d. | routes |
|
|
|
220.
|
A(n) ____ provides wireless LAN service, for free or for a fee, from a variety
of public areas, including coffee shops, public libraries, and airport lounges.
a. | infrastructure network | c. | hotspot | b. | wireless gateway | d. | ad hoc network |
|
|
|
221.
|
How long is the per-packet key used in TKIP?
a. | 40-bits | c. | 128-bits | b. | 64-bits | d. | 256-bits |
|
|
|
222.
|
____ security protects the equipment and infrastructure itself, and has one
primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or
vandalize it.
a. | Hardware | c. | Practical | b. | Social | d. | Physical |
|
|
|
223.
|
____ polarization is typically used in wireless LANs with the dual antennas of
access points pointing upward.
a. | Horizontal | c. | Dual | b. | Circular | d. | Vertical |
|
|
|
224.
|
What is the second step in the wireless LAN model developed by Intel?
a. | assemble data | c. | calculate ROI | b. | implement a pilot | d. | develop a
report |
|
|
|
225.
|
Ultimately, who regulates standards that are developed by consortia?
a. | the manufacturers | c. | a regulatory body | b. | the marketplace | d. | the government |
|
|
|
226.
|
Only in areas where low bandwidth is acceptable or an ad hoc wireless network
will be used should ____ networks be considered.
a. | 802.11a | c. | 802.11g | b. | 802.11b | d. | 802.11 pre-N |
|
|
|
227.
|
In a site survey analyzer, vendors use an algorithm or a lookup table to convert
____ values to dBm, mW, or signal strength percentage.
|
|
|
228.
|
The ____ draft defines a superset of features that is intended to provide
QoS over WLANs.
a. | 802.11a | c. | 802.11e | b. | 802.11b | d. | 802.11g |
|
|
|
229.
|
Which layer of the OSI reference model permits the devices on the network to
hold ongoing communications across the network?
a. | presentation | c. | session | b. | transport | d. | network |
|
|
|
230.
|
Which IEEE committee establishes standards for wireless wide area
networks?
a. | 802.3 | c. | 802.13 | b. | 802.11 | d. | 802.16 |
|
|
|
231.
|
What is another name for a NIC?
a. | bridge | c. | mini PCI | b. | access point | d. | client network
adapter |
|