Name:     ID: 
 
Email: 

CWNA Final Exam

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

According to a study conducted by NOP World–Technology, wireless LANs enable users to be connected to network resources ____ additional hours per day.
a.
.5
c.
1.75
b.
1
d.
2.5
 

 2. 

Intel recommends that once the ROI model is complete, larger organizations should return to step ____.
a.
1
c.
3
b.
2
d.
4
 

 3. 

It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.
a.
AP
c.
manual
b.
event
d.
network
 

 4. 

Bluetooth divides the 2.4 GHz frequency into ____ different frequencies spaced 1 GHz apart.
a.
52
c.
79
b.
68
d.
93
 

 5. 

What is the last step in RF site tuning?
a.
validate coverage area
c.
modify throughput
b.
adjust channel settings
d.
documenting changes
 

 6. 

When determining which standard to use, if there are other devices in the immediate area that use the 2.4GHz wireless spectrum, such as portable telephones and microwave ovens then the ____ standard, which uses the 5 GHz wireless spectrum, might be the best solution.
a.
802.11a
c.
802.11g
b.
802.11b
d.
802.11 pre-N
 

 7. 

____ authentication is used in the enterprise security model using WPA and WPA2.
a.
IEEE 802.1x
c.
AES
b.
TKIP
d.
All of the above
 

 8. 

Electromagnetic waves travel freely through space in all directions at the speed of light, or approximately ____ per second.
a.
1 kilometer
c.
186,000 miles
b.
100 kilometers
d.
93,000,000 miles
 

 9. 

In Mobile IP, access points use the ____ table to determine the IP address of the visiting client’s home agent.
a.
IP map
c.
subnet map
b.
home map
d.
network map
 

 10. 

Which of the following technologies came first chronologically?
a.
digital subscriber lines (DSL)
b.
T-1 lines
c.
Integrated Services Digital Networks (ISDN)
d.
leased transmission lines
 

 11. 

When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.
a.
ciphertext
c.
detext
b.
deciphertext
d.
plaintext
 

 12. 

The personal security model is intended for settings in which a(n) ____ is unavailable.
a.
wired network
c.
authentication server
b.
intermediate security model
d.
AP
 

 13. 

What is the difference between passive and active scanning?
a.
the number of devices that can be supported
b.
the speed at which discovery is made
c.
the security of the network
d.
which device initiates the discovery
 

 14. 

Which type of attacker typically has a high skill level?
a.
cracker
c.
spy
b.
hacker
d.
All of the above
 

 15. 

Into which layers are WLAN features isolated by IEEE standards?
a.
MAX and PLCP
c.
PMD and PLCP
b.
PHY and MAC
d.
PHY and PMD
 

 16. 

Following authentication, if the access point accepts the wireless device, it reserves memory space in the AP and establishes a(n) ____ ID for it.
a.
device
c.
association
b.
authentication
d.
member
 

 17. 

According to FCC regulations, all FHSS systems in the 900 MHz band must change frequencies through 50 channels and cannot spend more than ____ on one frequency each 20 seconds.
a.
20 milliseconds
c.
400 milliseconds
b.
30 milliseconds
d.
1 second
 

 18. 

When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.
a.
broadcast
c.
netcast
b.
multicast
d.
unicast
 

 19. 

What is a drawback of a spectrum analyzer?
a.
information is displayed as raw data, not in graphical form
b.
information is displayed in graphical form and not as raw data
c.
information only applies to one frequency
d.
only made by a single manufacturer and very expensive
 

 20. 

The IEEE 802.11 standard outlines the use of ____ transmissions for WLANs.
a.
gallium arsenide
c.
diffused infrared
b.
radio wave
d.
directed infrared
 

 21. 

The ____ technology has a transmission distance of up to 10 meters.
a.
RFID
c.
WiMax
b.
Bluetooth
d.
GSM
 

 22. 

____ is considered a hard benefit.
a.
Productivity
c.
Cost reduction
b.
Faster responsiveness
d.
Improved employee satisfaction
 

 23. 

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
a.
security
c.
speed
b.
cost
d.
complexity
 

 24. 

The 802.11b standard specifies ____ frequencies that can be used, beginning at 2.412 GHz.
a.
4
c.
14
b.
10
d.
30
 

 25. 

____ give team-based workers the ability to access the network resources that they need while collaborating in a team environment.
a.
Video pills
c.
Barcodes
b.
RFIDs
d.
WLANs
 

 26. 

The ____ coding technique consists of a set of 64 8-bit code words.
a.
chipping
c.
fixed scramble
b.
complementary code keying
d.
Barker
 

 27. 

Why is it important to document existing wired and wireless networks?
a.
to better understand the basic networking needs of the organization
b.
to examine possible sources of interference
c.
to ensure that the new or expanded wireless LAN will “dovetail” into what is already in place
d.
to avoid providing overlapping network coverage
 

 28. 

When an AP accepts or rejects a wireless device it sends a(n) ____ frame.
a.
disassociation
c.
association request
b.
reassociation
d.
association response
 

 29. 

In a wireless network, the ____ acts as a base station to receive the signals and transmit signals back to the wireless network interface cards in the other wireless devices.
a.
cable
c.
access point
b.
wireless adapter
d.
network interface card
 

 30. 

When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters.  This provides the most secure option.
a.
plaintext
c.
hexadecimal
b.
ciphered
d.
ASCII
 

 31. 

Frames can be filtered based on the protocol of that frame, such as TCP, or ____.
a.
FTP
c.
DHCP
b.
HTTP
d.
UDP
 

 32. 

Which digital modulation technique is similar to frequency modulation?
a.
frequency shift keying
c.
phase shift keying
b.
amplitude shift keying
d.
All of the above
 

 33. 

What provides the greatest source of RF interference?
a.
mirror
c.
desk
b.
chair
d.
interior wall
 

 34. 

Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.
a.
azimuth
c.
donut
b.
plain
d.
horizontal
 

 35. 

What should you be sure to do when collecting RF information?
a.
observe the data being displayed by the software measurement tools
b.
connect to the Internet and download a file to test bandwidth
c.
write down your perception of connection speed
d.
take pictures of your location as you move around
 

 36. 

Which type of remote wireless bridge connection is used to connect multiple LAN segments together?
a.
segment-to-segment
c.
point-to-point
b.
point-to-multipoint
d.
multipoint-to-multipoint
 

 37. 

A standard personal computer can easily create over ____ possible password combinations per second.
a.
100
c.
1,000,000
b.
1,000
d.
1,000,000,000
 

 38. 

Which of the following should be included when documenting current network setup?
a.
competitors to the organization
b.
benefits of wireless technology
c.
types of clients
d.
hours spent using the network by each employee
 

 39. 

A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.
a.
internal
c.
bidirectional
b.
unidirectional
d.
pre-injection
 

 40. 

The ____ method of encryption is used in a personal security model.
a.
MAC
c.
WEP
b.
TKIP
d.
PSK
 

 41. 

RC4 is a ____ cipher that accepts keys up to 128 bits in length.
a.
key
c.
logical
b.
cyclic
d.
stream
 

 42. 

Two adjacent access points that use the same ____ can cause interference and lost frames.
a.
station
c.
hotspot
b.
ESS
d.
channel
 

 43. 

On wireless networks, ____ attacks are commonly done by attackers setting up a “fake” access point.
a.
weak key
c.
man-in-the-middle
b.
spoof
d.
DoS
 

 44. 

Television uses three types of modulation.  The video portion uses ____.
a.
DM
c.
AM
b.
FM
d.
PM
 

 45. 

____ replaces CRC in WPA.
a.
CMR
c.
MRC
b.
CMC
d.
MIC
 

 46. 

The radio frequency spectrum is divided into ____ different sections or bands.
a.
300
c.
900
b.
450
d.
1200
 

 47. 

What information is required for a link budget?
a.
path length
c.
power of the transmitter
b.
frequency of the link
d.
All of the above
 

 48. 

When configuring advanced settings for an AP, the ____ is the domain that is serving the AP.
a.
Default Domain
c.
Domain Name Server
b.
Current Domain
d.
Domain Suffix
 

 49. 

Why is CSMA/CD unsuitable for wireless networks?
a.
difficult to synchronize backoff times
c.
difficult to detect collisions
b.
Hidden node problem
d.
Both A and B
 

 50. 

Which type of RF loss is caused by the equipment transmitting the signal?
a.
Scattering
c.
Absorption
b.
Diffraction
d.
Voltage Standing Wave Ratio
 

 51. 

What is a problem with measuring RF loss using a linear scale?
a.
it is inaccurate
b.
it requires complex measurements
c.
it is difficult to calculate
d.
it does not reveal what the loss is in relation to the whole
 

 52. 

In FHSS, the amount of time needed to move from one frequency to another is the ____ time.
a.
switch
c.
dwell
b.
hop
d.
lift
 

 53. 

Beginning with Windows ____, all Microsoft desktop operating systems recognize a wireless NIC without the need for any external software drivers.
a.
XP
c.
NT
b.
ME
d.
2000
 

 54. 

Which organization would most likely not benefit from the introduction of a wireless LAN?
a.
they would all benefit
b.
organization that is fighting a fierce battle with its competitors
c.
business that has captured a niche in the marketplace and currently has no serious competitors
d.
business that is rapidly losing market share and has changed CEOs three times in the last 18 months
 

 55. 

What type of AP antenna is most commonly used in a site survey?
a.
semi-directional
c.
omnidirectional
b.
parabolic
d.
highly-directional
 

 56. 

What authentication system did the proposed WEP2 standard use?
a.
AES-CCMP
c.
key caching
b.
dynamic WEP
d.
Kerberos
 

 57. 

IEEE has divided the ____ layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).
a.
Data Link
c.
Transport
b.
Physical
d.
Session
 

 58. 

____ can occur intentionally from an external power source that amplifies the signal, or unintentionally when an RF signal bounces off an object and combines with the original signal to amplify it.
a.
Phase shift
c.
Gain
b.
Loss
d.
Modulation
 

 59. 

An access point sends out a beacon frame containing a ____ identifying the stations that have buffered frames waiting at the access point.
a.
waiting map
c.
buffered cache
b.
buffer list
d.
traffic indication map
 

 60. 

____ signals by nature transmit on only one frequency or a very narrow portion of the frequencies.
a.
Radio
c.
Heat
b.
Computer
d.
Broadband
 

 61. 

When conducting a security audit, ____ should determine vulnerabilities.
a.
a highly-paid consultant
b.
a team with diverse backgrounds
c.
a junior administrator
d.
a wireless system administrator employed by the company
 

 62. 

Which aspect of information security does WEP protect?
a.
integrity
c.
confidentiality
b.
availability
d.
All of the above
 

 63. 

With MobileIP, the ____ assigns the mobile computer a new (but temporary) IP number.
a.
local AP
c.
foreign agent
b.
foreign AP
d.
roamed network
 

 64. 

The ____ wireless security standard provides a low level of security.
a.
WEP2
c.
WEP
b.
Dynamic WEP
d.
All of the above
 

 65. 

A ____ dipole antenna produces a flatter signal than a standard dipole antenna.
a.
zoned
c.
Fresnel
b.
semi-directional
d.
high-gain
 

 66. 

Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.
a.
small impact
c.
significant
b.
major
d.
catastrophic
 

 67. 

In a 64-bit packet sent using WEP, how many bits are actually encrypted?
a.
10
c.
40
b.
24
d.
64
 

 68. 

All access points have a(n) ____ connector that allows them to connect to an Ethernet hub or switch to provide wired network resources to wireless devices.
a.
QR-9
c.
RJ-45
b.
PP-22
d.
MN-11
 

 69. 

What aspect of RF may produce biological damage?
a.
heating effects
c.
waves passing through the brain
b.
waves damaging the eyes
d.
cooling effects
 

 70. 

A ____ attack on WEP involves viewing collisions to derive plaintext values.
a.
weak key
c.
keystream
b.
pseudo-random number
d.
capture
 

 71. 

A ____ is not malicious but often seeks to expose security flaws.
a.
cracker
c.
hacker
b.
script kiddie
d.
spy
 

 72. 

A loss of 10 decibels means that ____ percent of the power has been lost in mW.
a.
10
c.
90
b.
30
d.
100
 

 73. 

What is a consideration when conducting an outdoor site survey?
a.
foliage
c.
climate conditions
b.
permits and zoning
d.
All of the above
 

 74. 

The 802.11b standard can support wireless devices that are up to ____ meters apart.
a.
30
c.
115
b.
90
d.
130
 

 75. 

Devices using ____ may cause all-band interference.
a.
frequency hopping spread spectrum
c.
Mobile IP
b.
WEP
d.
IEEE 802.11g
 

 76. 

What affects the coverage pattern?
a.
skill of person conducting site survey
c.
notebook operating system
b.
objects that interfere with the RF signal
d.
wireless protocol
 

 77. 

How many millions of bits per second can be transmitted in a Wi-Fi network?
a.
9
c.
19
b.
11
d.
21
 

 78. 

The 802.11 standard provides an option that can be used when collisions occur due to a hidden node. That option is known as ____.
a.
hidden node detection
c.
virtual node detection
b.
node collision protocol
d.
virtual carrier sensing
 

 79. 

Which type of RF loss is caused by the equipment itself, not external objects?
a.
Voltage Standing Wave Ratio
c.
Refraction
b.
Scattering
d.
Absorption
 

 80. 

Which of the following statements describes the difference between a CF wireless NIC and a PC card?
a.
CF requires separate antenna to be built into monitor
b.
PC card is larger than CF
c.
PC card is smaller than CF
d.
PC card consumes less power than CF
 

 81. 

When a digital signal needs to be transmitted over an analog medium, such as when a computer needs to send digital signals over an analog telephone line or TV cable, a device known as a(n) ____ is used.
a.
amplifier
c.
modem
b.
phaser
d.
translator
 

 82. 

When a Web server sends a Web page back to a PC, it is only sending HTML code; the ____ is responsible for interpreting that code and displaying the results on the screen.
a.
Web interpreter
c.
gateway
b.
Web browser
d.
desktop
 

 83. 

Which channels in IEEE 802.11b and 802.11g networks do not overlap?
a.
1, 2, and 3
c.
1, 6, and 11
b.
1, 5, and 8
d.
1, 10, and 20
 

 84. 

The default protocol of older Novell Net-Ware LANs is ____.
a.
UDP
c.
SPM
b.
IPX
d.
TCP
 

 85. 

____ is a low-power wireless data and voice transmission technology.
a.
WAP
c.
AP
b.
Bluetooth
d.
Wi-Fi
 

 86. 

According to the IEEE 802.11 cryptography objectives, how strong should WEP be?
a.
difficult
c.
unbreakable
b.
extremely
d.
reasonably
 

 87. 

If an organization’s data processing center becomes inoperable, it can move all data processing operations to a ____, often within an hour.
a.
cold site
c.
hot site
b.
recovery location
d.
neutral site
 

 88. 

On ESS networks that have multiple access points, the wireless device might actually receive beacon frames from several APs.  Which AP would a wireless device generally choose in this case?
a.
the one with the fewest wireless devices attached to the AP
b.
the closest
c.
the one with the strongest signal strength
d.
the choice will be random
 

 89. 

What is the shape of a Fresnel zone?
a.
Ellipsoidal
c.
Rectangular
b.
Elliptical
d.
Circular
 

 90. 

The Physical Layer Convergence Procedure (PLCP) standards for 802.11b are based on ____.
a.
FHSS
c.
OFDM
b.
PYS
d.
DSSS
 

 91. 

Why is a WLAN less expensive for business than a wired LAN?
a.
no need to tunnel through walls and ceilings to install cable
b.
equipment is less expensive
c.
wireless equipment does not need to be upgraded
d.
All of the above
 

 92. 

What is a requirement for an access point used in a site survey?
a.
fixed power levels
c.
external antenna connectors
b.
built-in battery
d.
All of the above
 

 93. 

The term ____ describes the rate of transmission falling as the device moves farther from the AP.
a.
packet throughput
c.
RF frequency
b.
data rate boundaries
d.
coverage pattern
 

 94. 

Which characteristic of information is guarded by access control?
a.
integrity
c.
confidentiality
b.
availability
d.
robustness
 

 95. 

A WEP key can be a passphrase created by entering ____ ASCII characters.
a.
3
c.
10
b.
7
d.
16
 

 96. 

What is the range of transmission for a WPAN?
a.
3 feet
c.
14 feet
b.
10 feet
d.
22 feet
 

 97. 

What is the first step in collecting RF information?
a.
document AP position
c.
note the objects and layout of the room
b.
walk around room to test signal
d.
position the access point
 

 98. 

For 802.11b and 802.11g wireless LANs only three channels (1, 6, and 11) can be used to co-locate multiple access points in the same area.  This is because they ____.
a.
are dedicated to TCP
c.
are dedicated to DHCP
b.
overlap
d.
do not overlap
 

 99. 

Which sector of the economy has adopted wireless technology most completely?
a.
education
c.
construction
b.
business
d.
travel
 

 100. 

What is the maximum transmission distance for FSO?
a.
4 miles
c.
10 miles
b.
6.4 miles
d.
100 miles
 

 101. 

What is the single most important tool in any business?
a.
personal networked computer
c.
mainframe
b.
information
d.
database
 

 102. 

A device called a ____ must sometimes be attached to a PDA in order to establish a wireless connection.  The device contains a slot for a wireless NIC or similar device.
a.
slot
c.
sled
b.
shoe
d.
bridge
 

 103. 

____ generates the highest level of interference.
a.
Marble
c.
Paper
b.
Metal
d.
Bulletproof glass
 

 104. 

Most industry experts recommend one access point for no more than ____ users if they are performing basic e-mail, light Web surfing, and occasionally transferring medium-sized files.
a.
10
c.
50
b.
30
d.
100
 

 105. 

A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.
a.
phase modulator
c.
lightning arrestor
b.
splitter
d.
RF attenuator
 

 106. 

____ modulation changes the number of waves representing one cycle.
a.
Phase shift
c.
Amplitude
b.
Phase
d.
Frequency
 

 107. 

At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special “scan” mode, monitor the airwaves to detect signals from rogue access points.
a.
VPNs
c.
wireless sensors
b.
captive portals
d.
firewalls
 

 108. 

____ is considered to be the “heart and soul” of WPA security.
a.
IV
c.
MIC
b.
PSK
d.
TKIP
 

 109. 

What is the name for the computer network architecture standards developed by the IEEE?
a.
Project 802
c.
Project Athena
b.
Project 1000
d.
Project Network
 

 110. 

What does a blinking green status indicator LED mean on an AP?
a.
access point is associated with at least one wireless device
b.
access point not operating
c.
RF activity is occurring
d.
access point is operating normally but is not associated with any wireless devices
 

 111. 

What type of device is used for communication in a fixed broadband wireless network?
a.
antenna
c.
cable
b.
electrical wiring
d.
handheld
 

 112. 

What is a disadvantage of thin access points?
a.
very expensive
b.
handoff time is increased
c.
complicated network management
d.
all thin access points and switches are proprietary
 

 113. 

When is the best time to perform a site survey?
a.
monthly
c.
daily
b.
prior to installing a WLAN
d.
quarterly
 

 114. 

A ____ antenna is most typically used on a WLAN.
a.
panel
c.
beam steering
b.
rod
d.
sectorized
 

 115. 

____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.
a.
Integrity
c.
Access control
b.
Confidentiality
d.
Availability
 

 116. 

An increasingly ____ workforce is one characteristic of today’s business world.
a.
mobile
c.
less experienced
b.
technically challenged
d.
younger
 

 117. 

____ is not part of a frame.
a.
Length
c.
Channel
b.
Parity
d.
Data
 

 118. 

If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode.
a.
access point mode
c.
non-root mode
b.
root mode
d.
repeater mode
 

 119. 

In an infrastructure network the beacon interval is normally set to ____ ms, although it can be modified.
a.
1
c.
100
b.
10
d.
1000
 

 120. 

What is the free space loss (in dB) for IEEE 802.11b and 802.11g WLANs when the distance in meters is 100?
a.
80
c.
92
b.
88
d.
97
 

 121. 

What techniques are used by vendors to achieve 2x mode for transmissions?
a.
use different coding rate schemes
c.
reallocating the individual carriers
b.
combine two frequency channels
d.
All of the above
 

 122. 

Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.
a.
13
c.
17
b.
15
d.
19
 

 123. 

When was the concept used by FHSS technology developed?
a.
during World War I
c.
in the 1960s
b.
in the 1980s
d.
during World War II
 

 124. 

What is the name of the 128-bit key used in TKIP?
a.
PRNG
c.
MIC
b.
XOR
d.
temporal key
 

 125. 

In Mobile IP, what information is advertised on the network?
a.
whether an agent is a home agent, foreign agent, or both
b.
types of services provided
c.
care-of address
d.
All of the above
 

 126. 

Most bridges have what is known as ____ that minimizes the spread of the signal so that it can reach farther distances.
a.
multipoint scheduling
c.
delay spread
b.
interspersed communications
d.
scheduled delays
 

 127. 

What is the default authentication method according to the 802.11 standard?
a.
open system
c.
shared key
b.
basic
d.
private key
 

 128. 

At regular intervals the AP in an infrastructure network or wireless device in an ad hoc network sends a ____ frame both to announce its presence and to provide the necessary information for other devices to join the network.
a.
control
c.
master
b.
data
d.
beacon
 

 129. 

What affects transmission range?
a.
objects in path only
c.
wireless protocol
b.
distance and objects in path
d.
distance only
 

 130. 

The RTS/CTS protocol is especially taxing when ____ data packets are being transmitted.
a.
redirecting
c.
encrypted
b.
long
d.
short
 

 131. 

Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.
a.
port scanning
c.
an access control list
b.
port blocking
d.
port security
 

 132. 

In a 802.11b network, how many power users should be associated with one access point?
a.
5
c.
25
b.
15
d.
50
 

 133. 

Filtering can be performed by configuring the access point so that it acts as a type of ____.
a.
router
c.
firewall
b.
gateway
d.
bridge
 

 134. 

DSSS uses a bit pattern called a ____ code.
a.
dwelling
c.
setting
b.
chipping
d.
hopping
 

 135. 

What is the most frequent cause of wireless transmission problems?
a.
faulty access points
c.
RF issues
b.
security breeches
d.
misconfiguration
 

 136. 

At what rate is the number of wireless hostpots increasing each year?
a.
50%
c.
350%
b.
200%
d.
500%
 

 137. 

What is the first step in shared key authentication?
a.
AP sends wireless device an authentication frame that contains a block of text known as the challenge text
b.
wireless device sends an authentication frame to the AP
c.
AP encrypts challenge text and sends it to wireless device
d.
wireless device encrypts challenge text and sends it to AP
 

 138. 

Where can a RFID tag be read?
a.
anywhere within the range of a transmitted radio signal
b.
when physically connected to the scanner
c.
only within the line of sight of the scanner
d.
only when next to the scanner
 

 139. 

The ____ setting of a site survey analyzer specifies the AP that will be involved in the test.
a.
Destination MAC Address
c.
Delay Between Packets
b.
Continuous Link Test
d.
Packet Tx Type
 

 140. 

How does OFDM work?
a.
one signal is sent twice on the same channel
b.
signals are broken up and the parts are sent in parallel
c.
a signal is sent over a wired network at the same time as the wireless network
d.
the same signal is sent on multiple channels
 

 141. 

When a stronger signal from one wireless device drowns out another a(n) ____ problem is occurring.
a.
near/far transmission
c.
co-location
b.
RF clash
d.
all-band interference
 

 142. 

What security technology was most recently introduced?
a.
WEP2
c.
Dynamic WEP
b.
WPA
d.
WPA2
 

 143. 

In Mobile IP, the ____ agent is a router, firewall, or gateway on the visiting client’s home network that serves as the anchor point for communication with the access point and the visiting client.
a.
home
c.
foreign
b.
access point
d.
visiting
 

 144. 

What is a disadvantage of standards?
a.
reduced competition
b.
higher prices
c.
they can open domestic markets in larger countries to overseas competition
d.
devices produced by different vendors may not interoperate
 

 145. 

Which of the following units is used to measure frequency?
a.
volt
c.
decibel
b.
byte
d.
hertz
 

 146. 

When using WEP as part of the transitional security model, the same ____ key must be installed on the access point and the device.  If not the wireless device may not operate properly.
a.
linked
c.
shared
b.
private
d.
secure
 

 147. 

____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.
a.
Computer Emergency Response Team Coordination Center (CERT/CC)
b.
National Security Institute (NSI)
c.
InfraGard
d.
SysAdmin, Audit, Network, Security (SANS) Institute
 

 148. 

Which system is preferred for 802.11b WLANs?
a.
OFDM
c.
DSSS
b.
FHSS
d.
All are equally preferred
 

 149. 

Which of the following is an electromagnetic wave?
a.
radio
c.
heat
b.
light
d.
All of the above
 

 150. 

____ was designed to address WEP vulnerabilities with a minimum of inconvenience.
a.
WPA
c.
IEEE 802.11i
b.
TGi
d.
dynamic WEP
 

 151. 

A Bluetooth network that contains one master and at least one slave device forms a ____.
a.
winet
c.
piconet
b.
subnet
d.
cycle
 

 152. 

What is a good first step in diagnosing system throughput issues?
a.
identify the potential causes that may have the least impact on the system if they are changed
b.
determine if all devices are experiencing the problem or only a single device
c.
remove all devices from the system then add them back one at a time
d.
monitor the speed of the access point
 

 153. 

An employee who purchases an access point and secretly brings it into the office in order to provide personal wireless access has installed what is known as a ____ access point.
a.
cold
c.
rogue
b.
hot
d.
war
 

 154. 

When a business is registered as a ____ they are qualified be placed in an online database of wireless hotspot locations.
a.
Wi-Fi Zone
c.
WECA
b.
SOHO
d.
Wi-Fi Alliance member
 

 155. 

Where must a WiMax transmitter be located?
a.
anywhere in a building
b.
on the roof of a building
c.
anywhere on upper floors of a building
d.
by a window in the upper floors of a building
 

 156. 

According to NOP-World Technology, ____ percent of end users said that a WLAN improves their quality of life by increasing flexibility and productivity, and saving time.
a.
30
c.
87
b.
56
d.
93
 

 157. 

The ____ field of an 802.11a frame consists of 10 repetitions of a short training sequence signal and two repetitions of a long training sequence signal.
a.
Service
c.
Rate
b.
Synchronization
d.
Parity
 

 158. 

What is the first step in implementing an interim security model?
a.
MAC address filtering
c.
turning off SSID beaconing
b.
shared key authentication
d.
port security
 

 159. 

In WEP, the CRC generates a(n) ____ based on the contents of the text.
a.
key
c.
cipher
b.
initialization vector
d.
checksum
 

 160. 

What is the best way to gather site-specific documentation?
a.
reviewing blueprints
c.
interviewing management
b.
inspecting the site
d.
viewing documentation
 

 161. 

What is the most basic tool or component involved in a site survey?
a.
site survey analyzer
c.
access point
b.
PDA
d.
notebook computer
 

 162. 

The maximum EIRP for IEEE 802.11b WLANs is ____ mW.
a.
10
c.
1000
b.
100
d.
10,000
 

 163. 

In the Windows operating system, what window provides basic tools for monitoring a WLAN?
a.
Wireless Adapter Information
c.
Network Monitor
b.
Access Point Utilities
d.
Wireless Network Connection Status
 

 164. 

What tool(s) are used most often as “standard” network monitoring tools?
a.
Simple Network Management Protocol and Remote Monitoring
b.
AP Monitor and Simple Network Management Protocol
c.
WLAN Logger and Remote Monitoring
d.
All of the above
 

 165. 

____ attenuators are the only type permitted by the FCC for WLAN systems.
a.
Fixed-loss
c.
Unidirectional
b.
Bidirectional
d.
Variable-loss
 

 166. 

Which of the following describes a wireless device switching from one AP to another?
a.
roaming
c.
redirecting
b.
handoff
d.
routing
 

 167. 

The ____ field appears last in a data frame.
a.
Frame check sequence
c.
Frame control
b.
Duration
d.
Sequence control
 

 168. 

Which of the following types of wave is imperceptible?
a.
radio
c.
light
b.
heat
d.
ether
 

 169. 

What do many industry experts believe is the greatest opportunity for business-process improvement at the beginning of the 21st century?
a.
providing wireless hotspots in rural communities
b.
access to the Internet from employee’s desks
c.
extending network access to employees who are away from their desks
d.
All of the above
 

 170. 

In a brute force attack, what key combination would follow 00001?
a.
00000
c.
00010
b.
00002
d.
10000
 

 171. 

The term ____ describes the rate of electrical flow.
a.
resistance
c.
current
b.
voltage
d.
electrical power
 

 172. 

When using the Shared Wireless Access Protocol, devices can be as far as 45 meters (150 feet) apart and can send and receive data at rates up to ____ Mbps.
a.
2
c.
10
b.
5
d.
14
 

 173. 

What function is performed by a wireless gateway?
a.
authentication
c.
bandwidth management
b.
encryption
d.
All of the above
 

 174. 

A ____ VPN is a user-to-LAN connection used by remote users.
a.
peer-to-peer
c.
remote-access
b.
remote-to-LAN
d.
site-to-site
 

 175. 

What is the top layer of the OSI reference model?
a.
physical
c.
transport
b.
application
d.
presentation
 

 176. 

____ is another name for open systems authentication.
a.
SSID filtering
c.
Symmetric key encryption
b.
Public key encryption
d.
WEP
 

 177. 

How are business requirements for a WLAN obtained?
a.
interviewing management
c.
Internet research
b.
interviewing technical staff
d.
reading company documentation
 

 178. 

The ____ layer is an attractive place to focus attention on improving the coexistence between Bluetooth and WLANs because it is where such techniques as Carrier Sense Multiple Access/Collision Avoidance (CSMA/ CA) and data rates are determined.
a.
software
c.
RF
b.
MAC
d.
PHY
 

 179. 

With some wireless networks using Mobile IP, up to ____ AAPs can be designated.
a.
three
c.
six
b.
four
d.
ten
 

 180. 

All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection.
a.
unit
c.
check sequence
b.
sum
d.
flag
 

 181. 

How does an access point receive electrical power if it is mounted in a location that is not close to an electrical outlet?
a.
through the unused wires in a standard unshielded twisted pair (UTP) Ethernet cable
b.
through radio waves
c.
it must be mounted near an outlet
d.
through a USB cable
 

 182. 

The Default IP Address and Default IP Subnet Mask fields are used only when ____ is enabled for the network.
a.
Mobile IP
c.
Advanced IP
b.
DHCP
d.
MAC
 

 183. 

____ effectively prevents collisions because every device must wait until it receives permission before it can transmit.
a.
CSMA/CD
c.
CSMA/CA
b.
Fragmentation
d.
Polling
 

 184. 

Because a device must wait to transmit until it receives the last reflected signal, this in effect puts a ceiling limit on the overall speed of the WLAN.  What is the current ceiling for WLAN speed?
a.
under 10 Mbps
c.
between 20 and 30 Mbps
b.
between 10 and 20 Mbps
d.
over 50 Mbps
 

 185. 

What technique(s) is/are most effective for defeating social engineering attacks?
a.
documentation
b.
physical and software security
c.
education and policies
d.
undercover work by network administrators
 

 186. 

What are the parts of a site survey report?
a.
data section, recommendation section
c.
narrative section, graphical section
b.
data section, conclusion section
d.
introduction section, graphical section
 

 187. 

____ is a nonvolatile storage chip used in computers and other devices.
a.
RMON
c.
Firmware
b.
SNMP
d.
EEPROM
 

 188. 

For a proper WLAN performance, the link budget must be ____ dB.
a.
greater than zero
c.
greater than ten
b.
greater than five
d.
less than ten
 

 189. 

When enabling Ethernet Timeout, the value in the Seconds field is generally set to between 30 and ____.
a.
40
c.
90
b.
60
d.
255
 

 190. 

A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.
a.
disassociation
c.
incomplete
b.
drop
d.
misaddressed
 

 191. 

A(n) ____ card improves input/output speed over a PC Card by increasing the bus width to 32 bits yet still supports lower-voltage PC Cards.
a.
built-in
c.
CardBus
b.
mini PCI
d.
access point
 

 192. 

The current version of SNMP (____) addresses security and remote configuration.
a.
v1
c.
v3
b.
v2
d.
v4
 

 193. 

The 802.11i standard addresses both ____.
a.
authentication and direction
c.
integrity and confidentiality
b.
encryption and authentication
d.
encryption and confidentiality
 

 194. 

In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.
a.
passphrase
c.
ticket
b.
broadcast
d.
unicast
 

 195. 

What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?
a.
pre-authentication
c.
port security
b.
key caching
d.
message passing
 

 196. 

An access point has a(n) ____ wired network interface that allows it to connect by cable to a standard wired network.
a.
compact flash
c.
PCI
b.
RJ-45
d.
IEEE 802
 

 197. 

You would use ____ in documenting a site survey.
a.
blueprints
c.
plain paper
b.
a digital camera
d.
All of the above
 

 198. 

____ should be considered when calculating ROI.
a.
Customer satisfaction
c.
Training
b.
Implementation costs
d.
All of the above
 

 199. 

____ is one of the most effective strategies for providing support for a new wireless network.
a.
Creating formal user support groups
b.
Outsourcing support to a third party
c.
Assigning support to the information technology department
d.
Maintaining a help desk
 

 200. 

MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.
a.
modify
c.
break
b.
disable
d.
spoof
 

 201. 

The length of an antenna should be about ____ the wavelength.
a.
1/10 of
c.
1/2 of
b.
1/4 of
d.
equal to
 

 202. 

What should you do when electrical alternating current power is not available near the AP location?
a.
user Power over Ethernet
c.
use a battery
b.
move it to another location
d.
use wireless power
 

 203. 

When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line.  This is known as ____.
a.
refraction
c.
absorption
b.
scattering
d.
reflection
 

 204. 

The ____ field appears first in a management frame.
a.
Destination address
c.
Frame control
b.
Duration
d.
BSSID
 

 205. 

Some computer viruses are known to cause ____.
a.
WLAN interference
b.
intermittent connectivity problems for wireless connections
c.
duplicate SSID
d.
incorrect MAC addresses
 

 206. 

____ antennas are used for long distance, point-to-point wireless links, such as connecting buildings that are up to 42 kilometers (25 miles) apart.
a.
Omni-directional
c.
Fresnel
b.
Semi-directional
d.
Highly-directional
 

 207. 

Which site survey analyzer setting sets the number of times a transmission will be repeated if an acknowledgment (ACK) frame is not returned by the destination device?
a.
data retries
c.
data rate
b.
number of packets
d.
packet size
 

 208. 

Which network requires some sort of gateway or interface to be compatible with IEEE 802.11 WLANs?
a.
Token Ring
c.
Ethernet
b.
Mobile IP
d.
Wired Bus
 

 209. 

____ generates low interference.
a.
Wire mesh in glass
c.
Wood
b.
The human body
d.
Concrete
 

 210. 

What is a disadvantage of narrowband transmissions?
a.
expensive to implement
c.
not well regulated
b.
interference from another radio signal
d.
requires a complicated algorithm
 

 211. 

What is another name for propagation loss?
a.
signal loss
c.
effective loss
b.
transmission loss
d.
free space loss
 

 212. 

What type of device is used in the medical field to diagnose digestive problems without surgery?
a.
barcoded medications
c.
video pill
b.
RFID
d.
wireless LAN
 

 213. 

MAC address filtering ____.
a.
requires pre-approved authentication
c.
is expensive
b.
does not work well
d.
is difficult to implement
 

 214. 

What is the minimum number of BSS networks required to form an ESS?
a.
0
c.
2
b.
1
d.
10
 

 215. 

Microsoft Windows has become the ____ standard operating system today for personal desktop computers and network servers.
a.
de facto
c.
de jure
b.
consortia
d.
All of the above
 

 216. 

The first step in creating a security policy is ____.
a.
documentation
c.
security auditing
b.
risk assessment
d.
impact analysis
 

 217. 

Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.
a.
TKIP
c.
AES
b.
CBC
d.
PSK
 

 218. 

A BSS is ____.
a.
a geographical area where wireless devices reside
b.
a unique identifier
c.
two or more networks that are connected through a common distribution system
d.
a group of wireless devices that is served by a single access point
 

 219. 

Dividing a wired network into ____ makes network management easier and decreases the spread of broadcast packets throughout the network.
a.
systems
c.
segments
b.
subnets
d.
routes
 

 220. 

A(n) ____ provides wireless LAN service, for free or for a fee, from a variety of public areas, including coffee shops, public libraries, and airport lounges.
a.
infrastructure network
c.
hotspot
b.
wireless gateway
d.
ad hoc network
 

 221. 

How long is the per-packet key used in TKIP?
a.
40-bits
c.
128-bits
b.
64-bits
d.
256-bits
 

 222. 

____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.
a.
Hardware
c.
Practical
b.
Social
d.
Physical
 

 223. 

____ polarization is typically used in wireless LANs with the dual antennas of access points pointing upward.
a.
Horizontal
c.
Dual
b.
Circular
d.
Vertical
 

 224. 

What is the second step in the wireless LAN model developed by Intel?
a.
assemble data
c.
calculate ROI
b.
implement a pilot
d.
develop a report
 

 225. 

Ultimately, who regulates standards that are developed by consortia?
a.
the manufacturers
c.
a regulatory body
b.
the marketplace
d.
the government
 

 226. 

Only in areas where low bandwidth is acceptable or an ad hoc wireless network will be used should ____ networks be considered.
a.
802.11a
c.
802.11g
b.
802.11b
d.
802.11 pre-N
 

 227. 

In a site survey analyzer, vendors use an algorithm or a lookup table to convert ____ values to dBm, mW, or signal strength percentage.
a.
RSSI
c.
GHz
b.
MAC
d.
RFID
 

 228. 

The ____ draft defines a superset of features that is intended to provide QoS over WLANs.
a.
802.11a
c.
802.11e
b.
802.11b
d.
802.11g
 

 229. 

Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network?
a.
presentation
c.
session
b.
transport
d.
network
 

 230. 

Which IEEE committee establishes standards for wireless wide area networks?
a.
802.3
c.
802.13
b.
802.11
d.
802.16
 

 231. 

What is another name for a NIC?
a.
bridge
c.
mini PCI
b.
access point
d.
client network adapter
 



 
         Start Over