You are on page 1of 92

Question 1 3.85 out of 3.85 points How many millions of bits per second can be transmitted in a Wi-Fi network?

Answer Selected Answer: 11 Correct Answer: 11 Question 2 3.85 out of 3.85 points Where can a RFID tag be read? Answer Selected Answer: anywhere within the range of a transmitted radio signal Correct Answer: anywhere within the range of a transmitted radio signal Question 3 3.85 out of 3.85 points Why is a WLAN less expensive for business than a wired LAN? Answer Selected Answer: no need to tunnel through walls and ceilings to install cable

Correct Answer: no need to tunnel through walls and ceilings to install cable Question 4 3.85 out of 3.85 points What aspect of RF may produce biological damage? Answer Selected Answer: heating effects Correct Answer: heating effects Question 5 3.85 out of 3.85 points At what rate is the number of wireless hostpots increasing each year? Answer Selected Answer: 350% Correct Answer: 350% Question 6 3.85 out of 3.85 points What type of device is used for communication in a fixed broadband wireless network? Answer

Selected Answer: antenna Correct Answer: antenna Question 7 3.85 out of 3.85 points What is the maximum transmission distance for FSO? Answer Selected Answer: 4 miles Correct Answer: 4 miles Question 8 3.85 out of 3.85 points An increasingly ____ workforce is one characteristic of todays business world. Answer Selected Answer: mobile Correct Answer: mobile Question 9 3.85 out of 3.85 points

Which of the following technologies came first chronologically? Answer Selected Answer: leased transmission lines Correct Answer: leased transmission lines Question 10 3.85 out of 3.85 points ____ is a low-power wireless data and voice transmission technology. Answer Selected Answer: Bluetooth Correct Answer: Bluetooth Question 11 3.85 out of 3.85 points ____ give team-based workers the ability to access the network resources that they need while collaborating in a team environment. Answer Selected Answer: WLANs Correct Answer: WLANs

Question 12 3.85 out of 3.85 points Some airlines use WLAN technology to communicate with the aircraft once it has parked or is taxiing on the ground. Answer Selected Answer: Correct Answer: Question 13 3.85 out of 3.85 points A WAP cell phone runs a tiny browser program called a microbrowser that uses Wireless Markup Language (WML) instead of HTML. Answer Selected Answer: Correct Answer: Question 14 3.85 out of 3.85 points Where must a WiMax transmitter be located? Answer Selected Answer: on the roof of a building Correct Answer: on the roof of a building Question 15 3.85 out of 3.85 points True True True True

It is well documented that high levels of RF can produce biological damage. Answer Selected Answer: Correct Answer: Question 16 3.85 out of 3.85 points What is the range of transmission for a WPAN? Answer Selected Answer: 10 feet Correct Answer: 10 feet Question 17 3.85 out of 3.85 points When a Web server sends a Web page back to a PC, it is only sending HTML code; the ____ is responsible for interpreting that code and displaying the results on the screen. Answer Selected Answer: Web browser Correct Answer: Web browser Question 18 3.85 out of 3.85 points True True

Which sector of the economy has adopted wireless technology most completely? Answer Selected Answer: travel Correct Answer: travel Question 19 3.85 out of 3.85 points A cold site is a fully functional office space generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity. Answer Selected Answer: Correct Answer: Question 20 3.85 out of 3.85 points If an organizations data processing center becomes inoperable, it can move all data processing operations to a ____, often within an hour. Answer Selected Answer: hot site Correct Answer: hot site Question 21 False False

3.85 out of 3.85 points What type of device is used in the medical field to diagnose digestive problems without surgery? Answer Selected Answer: video pill Correct Answer: video pill Question 22 3.85 out of 3.85 points A Bluetooth network that contains one master and at least one slave device forms a ____. Answer Selected Answer: piconet Correct Answer: piconet Question 23 3.85 out of 3.85 points An employee who purchases an access point and secretly brings it into the office in order to provide personal wireless access has installed what is known as a ____ access point. Answer Selected Answer: rogue

Correct Answer: rogue Question 24 3.85 out of 3.85 points The ____ technology has a transmission distance of up to 10 meters. Answer Selected Answer: Bluetooth Correct Answer: Bluetooth Question 25 3.85 out of 3.85 points A large amount of equipment is required to create a wireless LAN. Answer Selected Answer: Correct Answer: Question 26 3.85 out of 3.85 points In a wireless network, the ____ acts as a base station to receive the signals and transmit signals back to the wireless network interface cards in the other wireless devices. Answer Selected Answer: access point False False

Correct Answer: access point Question 1 3.85 out of 3.85 points What is another name for a NIC? Answer Selected Answer: client network adapter Correct Answer: client network adapter Question 2 3.85 out of 3.85 points Which of the following statements describes the difference between a CF wireless NIC and a PC card? Answer Selected Answer: PC card is larger than CF Correct Answer: PC card is larger than CF Question 3 3.85 out of 3.85 points How does an access point receive electrical power if it is mounted in a location that is not close to an electrical outlet?

Answer Selected Answer:

through the unused wires in a standard unshielded twisted pair (UTP) Ethernet cable

Correct Answer: through the unused wires in a standard unshielded twisted pair (UTP) Ethernet cable Question 4 3.85 out of 3.85 points The 802.11b standard can support wireless devices that are up to ____ meters apart. Answer Selected Answer: 115 Correct Answer: 115 Question 5 3.85 out of 3.85 points What is a disadvantage of standards? Answer Selected Answer:

they can open domestic markets in larger countries to overseas competition

Correct Answer: they can open domestic markets in larger countries to overseas

competition Question 6 3.85 out of 3.85 points Microsoft Windows has become the ____ standard operating system today for personal desktop computers and network servers. Answer Selected Answer: de facto Correct Answer: de facto Question 7 3.85 out of 3.85 points When a business is registered as a ____ they are qualified be placed in an online database of wireless hotspot locations. Answer Selected Answer: Wi-Fi Zone Correct Answer: Wi-Fi Zone Question 8 3.85 out of 3.85 points Most industry experts recommend one access point for no more than ____ users if they are performing basic e-mail, light Web surfing, and occasionally transferring medium-sized files.

Answer Selected Answer: 50 Correct Answer: 50 Question 9 3.85 out of 3.85 points The radio frequency spectrum is divided into ____ different sections or bands. Answer Selected Answer: 450 Correct Answer: 450 Question 10 3.85 out of 3.85 points A device called a ____ must sometimes be attached to a PDA in order to establish a wireless connection. The device contains a slot for a wireless NIC or similar device. Answer Selected Answer: sled Correct Answer: sled Question 11

3.85 out of 3.85 points Which IEEE committee establishes standards for wireless wide area networks? Answer Selected Answer: 802.16 Correct Answer: 802.16 Question 12 3.85 out of 3.85 points Beginning with Windows ____, all Microsoft desktop operating systems recognize a wireless NIC without the need for any external software drivers. Answer Selected Answer: XP Correct Answer: XP Question 13 0 out of 3.85 points What function is performed by a wireless gateway? Answer Selected Answer: authentication

Correct Answer: All of the above Question 14 3.85 out of 3.85 points A(n) ____ card improves input/output speed over a PC Card by increasing the bus width to 32 bits yet still supports lower-voltage PC Cards. Answer Selected Answer: CardBus Correct Answer: CardBus Question 15 3.85 out of 3.85 points De facto standards are not actually standards at all. Answer Selected Answer: Correct Answer: Question 16 3.85 out of 3.85 points If a remote wireless bridge is in repeater mode it functions as a standard AP only and does not communicate with other remote wireless bridges. Answer Selected Answer: False True True

Correct Answer: Question 17 3.85 out of 3.85 points

False

If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode. Answer Selected Answer: non-root mode Correct Answer: non-root mode Question 18 3.85 out of 3.85 points Ultimately, who regulates standards that are developed by consortia? Answer Selected Answer: the marketplace Correct Answer: the marketplace Question 19 3.85 out of 3.85 points The IEEE 802.11g draft was a compromise based on input from several different chip (microprocessor) manufacturers, who had a major stake in the outcome. Answer Selected Answer: True

Correct Answer: Question 20 3.85 out of 3.85 points

True

Which type of remote wireless bridge connection is used to connect multiple LAN segments together? Answer Selected Answer: point-to-multipoint Correct Answer: point-to-multipoint Question 21 3.85 out of 3.85 points What is the name for the computer network architecture standards developed by the IEEE? Answer Selected Answer: Project 802 Correct Answer: Project 802 Question 22 3.85 out of 3.85 points CF cards consist of a small circuit board that contains flash memory chips and a dedicated controller chip. Answer

Selected Answer: Correct Answer: Question 23 3.85 out of 3.85 points

True True

An access point has a(n) ____ wired network interface that allows it to connect by cable to a standard wired network. Answer Selected Answer: RJ-45 Correct Answer: RJ-45 Question 24 3.85 out of 3.85 points Most bridges have what is known as ____ that minimizes the spread of the signal so that it can reach farther distances. Answer Selected Answer: delay spread Correct Answer: delay spread Question 25 3.85 out of 3.85 points The IEEE 802.11 standard outlines the use of ____ transmissions for WLANs.

Answer Selected Answer: diffused infrared Correct Answer: diffused infrared Question 26 3.85 out of 3.85 points Only one type of wireless NIC is available for laptop computers. Answer Selected Answer: Correct Answer: Question 1 3.85 out of 3.85 points ____ antennas are used for long distance, point-to-point wireless links, such as connecting buildings that are up to 42 kilometers (25 miles) apart. Answer Selected Answer: Highly-directional Correct Answer: Highly-directional Question 2 3.85 out of 3.85 points ____ polarization is typically used in wireless LANs with the dual antennas of access points False False

pointing upward. Answer Selected Answer: Vertical Correct Answer: Vertical Question 3 3.85 out of 3.85 points Which of the following types of wave is imperceptible? Answer Selected Answer: radio Correct Answer: radio Question 4 3.85 out of 3.85 points The maximum EIRP for IEEE 802.11b WLANs is ____ mW. Answer Selected Answer: 100 Correct Answer: 100 Question 5

3.85 out of 3.85 points What is a problem with measuring RF loss using a linear scale? Answer Selected Answer: it does not reveal what the loss is in relation to the whole Correct Answer: it does not reveal what the loss is in relation to the whole Question 6 3.85 out of 3.85 points What is the shape of a Fresnel zone? Answer Selected Answer: Ellipsoidal Correct Answer: Ellipsoidal Question 7 3.85 out of 3.85 points Television uses three types of modulation. The video portion uses ____. Answer Selected Answer: AM Correct Answer:

AM Question 8 3.85 out of 3.85 points In a wireless transmission data travels on invisible radio waves. Answer Selected Answer: Correct Answer: Question 9 3.85 out of 3.85 points Which of the following units is used to measure frequency? Answer Selected Answer: hertz Correct Answer: hertz Question 10 3.85 out of 3.85 points A basic rule of thumb is that each 6 dB increase in EIRP results in a quadrupling of the transmission range (distance from the antenna), and a 6 dB reduction in EIRP translates into reducing the range by four Answer Selected Answer: Correct Answer: False False True True

Question 11 3.85 out of 3.85 points Whenever a wave completes its trip and returns back to the starting point it has finished two cycles. Answer Selected Answer: Correct Answer: Question 12 3.85 out of 3.85 points Which type of RF loss is caused by the equipment transmitting the signal? Answer Selected Answer: Voltage Standing Wave Ratio Correct Answer: Voltage Standing Wave Ratio Question 13 3.85 out of 3.85 points ____ modulation changes the number of waves representing one cycle. Answer Selected Answer: Frequency Correct Answer: Frequency False False

Question 14 3.85 out of 3.85 points A loss of 10 decibels means that ____ percent of the power has been lost in mW. Answer Selected Answer: 90 Correct Answer: 90 Question 15 3.85 out of 3.85 points Highly-directional antennas are generally concave dish-shaped devices. Answer Selected Answer: Correct Answer: Question 16 3.85 out of 3.85 points Which digital modulation technique is similar to frequency modulation? Answer Selected Answer: frequency shift keying Correct Answer: frequency shift keying Question 17 True True

3.85 out of 3.85 points The term ____ describes the rate of electrical flow. Answer Selected Answer: current Correct Answer: current Question 18 3.85 out of 3.85 points The length of an antenna should be about ____ the wavelength. Answer Selected Answer: 1/4 of Correct Answer: 1/4 of Question 19 3.85 out of 3.85 points When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line. This is known as ____. Answer Selected Answer: refraction

Correct Answer: refraction Question 20 3.85 out of 3.85 points A ____ dipole antenna produces a flatter signal than a standard dipole antenna. Answer Selected Answer: high-gain Correct Answer: high-gain Question 21 3.85 out of 3.85 points What is the free space loss (in dB) for IEEE 802.11b and 802.11g WLANs when the distance in meters is 100? Answer Selected Answer: 80 Correct Answer: 80 Question 22 3.85 out of 3.85 points When a digital signal needs to be transmitted over an analog medium, such as when a computer needs to send digital signals over an analog telephone line or TV cable, a device known as a(n)

____ is used. Answer Selected Answer: modem Correct Answer: modem Question 23 3.85 out of 3.85 points Electromagnetic waves travel freely through space in all directions at the speed of light, or approximately ____ per second. Answer Selected Answer: 186,000 miles Correct Answer: 186,000 miles Question 24 3.85 out of 3.85 points The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage). Answer Selected Answer: Correct Answer: Question 25 3.85 out of 3.85 points True True

Which of the following is an electromagnetic wave? Answer Selected Answer: All of the above Correct Answer: All of the above Question 26 3.85 out of 3.85 points ____ can occur intentionally from an external power source that amplifies the signal, or unintentionally when an RF signal bounces off an object and combines with the original signal to amplify it. Answer Selected Answer: Gain Correct Answer: Gain Sunday, June 10, 2012 11:50:49 PM EDT Question 1 3.85 out of 3.85 points What techniques are used by vendors to achieve 2x mode for transmissions? Answer Selected Answer: All of the above

Correct Answer: All of the above Question 2 3.85 out of 3.85 points ____ is not part of a frame. Answer Selected Answer: Channel Correct Answer: Channel Question 3 3.85 out of 3.85 points DSSS uses a bit pattern called a ____ code. Answer Selected Answer: chipping Correct Answer: chipping Question 4 3.85 out of 3.85 points The ____ field of an 802.11a frame consists of 10 repetitions of a short training sequence signal and two repetitions of a long training sequence signal. Answer

Selected Answer: Synchronization Correct Answer: Synchronization Question 5 3.85 out of 3.85 points When using the Shared Wireless Access Protocol, devices can be as far as 45 meters (150 feet) apart and can send and receive data at rates up to ____ Mbps. Answer Selected Answer: 10 Correct Answer: 10 Question 6 3.85 out of 3.85 points Because wireless technology has advanced at such a rapid pace, the earliest WLANs are now essentially obsolete. Answer Selected Answer: Correct Answer: Question 7 3.85 out of 3.85 points ____ signals by nature transmit on only one frequency or a very narrow portion of the True True

frequencies. Answer Selected Answer: Radio Correct Answer: Radio Question 8 3.85 out of 3.85 points What is the top layer of the OSI reference model? Answer Selected Answer: application Correct Answer: application Question 9 3.85 out of 3.85 points IEEE has divided the ____ layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). Answer Selected Answer: Data Link Correct Answer: Data Link

Question 10 3.85 out of 3.85 points Increasing the speed of the WLAN will cause shorter delays in waiting for reflections. Answer Selected Answer: Correct Answer: Question 11 3.85 out of 3.85 points In FHSS, the amount of time needed to move from one frequency to another is the ____ time. Answer Selected Answer: hop Correct Answer: hop Question 12 3.85 out of 3.85 points How does OFDM work? Answer Selected Answer: signals are broken up and the parts are sent in parallel Correct Answer: signals are broken up and the parts are sent in parallel Question 13 False False

3.85 out of 3.85 points What is a disadvantage of narrowband transmissions? Answer Selected Answer: interference from another radio signal Correct Answer: interference from another radio signal Question 14 3.85 out of 3.85 points The ____ coding technique consists of a set of 64 8-bit code words. Answer Selected Answer: complementary code keying Correct Answer: complementary code keying Question 15 3.85 out of 3.85 points The 802.11b standard specifies ____ frequencies that can be used, beginning at 2.412 GHz. Answer Selected Answer: 14 Correct Answer:

14 Question 16 3.85 out of 3.85 points Which system is preferred for 802.11b WLANs? Answer Selected Answer: DSSS Correct Answer: DSSS Question 17 3.85 out of 3.85 points Of the 52 subchannels, 32 are used for standard transmissions and 20 are used for FEC transmissions. Answer Selected Answer: Correct Answer: Question 18 3.85 out of 3.85 points Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network? Answer Selected Answer: session False False

Correct Answer: session Question 19 3.85 out of 3.85 points According to FCC regulations, all FHSS systems in the 900 MHz band must change frequencies through 50 channels and cannot spend more than ____ on one frequency each 20 seconds. Answer Selected Answer: 400 milliseconds Correct Answer: 400 milliseconds Question 20 3.85 out of 3.85 points Bluetooth divides the 2.4 GHz frequency into ____ different frequencies spaced 1 GHz apart. Answer Selected Answer: 79 Correct Answer: 79 Question 21 3.85 out of 3.85 points Because a device must wait to transmit until it receives the last reflected signal, this in effect puts a ceiling limit on the overall speed of the WLAN. What is the current ceiling for WLAN

speed? Answer Selected Answer: between 10 and 20 Mbps Correct Answer: between 10 and 20 Mbps Question 22 3.85 out of 3.85 points When transmitting with FHSS, if interference is encountered on a particular frequency then that part of the signal will be retransmitted on the previous frequency of the hopping code. Answer Selected Answer: Correct Answer: Question 23 3.85 out of 3.85 points Into which layers are WLAN features isolated by IEEE standards? Answer Selected Answer: PHY and MAC Correct Answer: PHY and MAC Question 24 3.85 out of 3.85 points False False

The Physical Layer Convergence Procedure (PLCP) standards for 802.11b are based on ____. Answer Selected Answer: DSSS Correct Answer: DSSS Question 25 3.85 out of 3.85 points The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other. Answer Selected Answer: Correct Answer: Question 26 3.85 out of 3.85 points When was the concept used by FHSS technology developed? Answer Selected Answer: during World War II Correct Answer: during World War II Sunday, June 17, 2012 1:24:29 AM EDT True True

An access point sends out a beacon frame containing a ____ identifying the stations that have buffered frames waiting at the access point. Answer Selected Answer: traffic indication map Correct Answer: traffic indication map Question 2 0 out of 3.85 points Which of the following describes a wireless device switching from one AP to another? Answer Selected Answer: roaming Correct Answer: handoff Question 3 3.85 out of 3.85 points The ____ field appears first in a management frame. Answer Selected Answer: Frame control Correct Answer: Frame control

Question 4 3.85 out of 3.85 points When an ESS is installed it is desirable to configure the areas of coverage much like cells in a cellular telephone system. Answer Selected Answer: Correct Answer: Question 5 3.85 out of 3.85 points The first major function of the MAC layer involves defining procedures for a wireless device to discover the WLAN. Answer Selected Answer: Correct Answer: Question 6 3.85 out of 3.85 points At regular intervals the AP in an infrastructure network or wireless device in an ad hoc network sends a ____ frame both to announce its presence and to provide the necessary information for other devices to join the network. Answer Selected Answer: beacon Correct Answer: beacon Question 7 True True True True

3.85 out of 3.85 points Why is CSMA/CD unsuitable for wireless networks? Answer Selected Answer: Both A and B Correct Answer: Both A and B Question 8 3.85 out of 3.85 points CSMA/CA eliminates the possibility of collisions. Answer Selected Answer: Correct Answer: Question 9 3.85 out of 3.85 points Wireless authentication involves a user logging on to the access point. Answer Selected Answer: Correct Answer: Question 10 3.85 out of 3.85 points Following authentication, if the access point accepts the wireless device, it reserves memory space in the AP and establishes a(n) ____ ID for it. False False False False

Answer Selected Answer: association Correct Answer: association Question 11 3.85 out of 3.85 points The ____ field appears last in a data frame. Answer Selected Answer: Frame check sequence Correct Answer: Frame check sequence Question 12 3.85 out of 3.85 points The ____ draft defines a superset of features that is intended to provide QoS over WLANs. Answer Selected Answer: 802.11e Correct Answer: 802.11e Question 13 0 out of 3.85 points

____ effectively prevents collisions because every device must wait until it receives permission before it can transmit. Answer Selected Answer: CSMA/CA Correct Answer: Polling Question 14 3.85 out of 3.85 points When an AP accepts or rejects a wireless device it sends a(n) ____ frame. Answer Selected Answer: association response Correct Answer: association response Question 15 3.85 out of 3.85 points All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection. Answer Selected Answer: check sequence Correct Answer:

check sequence Question 16 3.85 out of 3.85 points In an infrastructure network the beacon interval is normally set to ____ ms, although it can be modified. Answer Selected Answer: 100 Correct Answer: 100 Question 17 3.85 out of 3.85 points With MobileIP, the ____ assigns the mobile computer a new (but temporary) IP number. Answer Selected Answer: foreign agent Correct Answer: foreign agent Question 18 3.85 out of 3.85 points What is the default authentication method according to the 802.11 standard? Answer

Selected Answer: open system Correct Answer: open system Question 19 3.85 out of 3.85 points On ESS networks that have multiple access points, the wireless device might actually receive beacon frames from several APs. Which AP would a wireless device generally choose in this case? Answer Selected Answer: the one with the strongest signal strength Correct Answer: the one with the strongest signal strength Question 20 3.85 out of 3.85 points A BSS is ____. Answer Selected Answer: a group of wireless devices that is served by a single access point Correct Answer: a group of wireless devices that is served by a single access point Question 21

3.85 out of 3.85 points A home agent is a forwarding mechanism that keeps track of where the mobile computer is located. Answer Selected Answer: Correct Answer: Question 22 3.85 out of 3.85 points The 802.11 standard provides an option that can be used when collisions occur due to a hidden node. That option is known as ____. Answer Selected Answer: virtual carrier sensing Correct Answer: virtual carrier sensing Question 23 3.85 out of 3.85 points What is the first step in shared key authentication? Answer Selected Answer: wireless device sends an authentication frame to the AP Correct Answer: wireless device sends an authentication frame to the AP Question 24 True True

3.85 out of 3.85 points What is the minimum number of BSS networks required to form an ESS? Answer Selected Answer: 2 Correct Answer: 2 Question 25 3.85 out of 3.85 points What is the difference between passive and active scanning? Answer Selected Answer: which device initiates the discovery Correct Answer: which device initiates the discovery Question 26 3.85 out of 3.85 points The RTS/CTS protocol is especially taxing when ____ data packets are being transmitted. Answer Selected Answer: short Correct Answer:

short

Question 1 3.85 out of 3.85 points When considering the number of users who will be associated with an access point, it is only necessary to count the number of users, not the type of work they do. Answer Selected Answer: Correct Answer: Question 2 3.85 out of 3.85 points What is a disadvantage of thin access points? Answer Selected Answer: all thin access points and switches are proprietary Correct Answer: all thin access points and switches are proprietary Question 3 3.85 out of 3.85 points Which of the following should be included when documenting current network setup? Answer Selected Answer: types of clients False False

Correct Answer: types of clients Question 4 3.85 out of 3.85 points In a 802.11b network, how many power users should be associated with one access point? Answer Selected Answer: 15 Correct Answer: 15 Question 5 3.85 out of 3.85 points ____ should be considered when calculating ROI. Answer Selected Answer: All of the above Correct Answer: All of the above Question 6 3.85 out of 3.85 points When determining which standard to use, if there are other devices in the immediate area that use the 2.4GHz wireless spectrum, such as portable telephones and microwave ovens then the ____ standard, which uses the 5 GHz wireless spectrum, might be the best solution.

Answer Selected Answer: 802.11a Correct Answer: 802.11a Question 7 3.85 out of 3.85 points Wireless access to network resources can improve the quality and productivity of meetings. Answer Selected Answer: Correct Answer: Question 8 3.85 out of 3.85 points Early adopters of wireless LANs were sometimes called racehorses. Answer Selected Answer: Correct Answer: Question 9 3.85 out of 3.85 points Only in areas where low bandwidth is acceptable or an ad hoc wireless network will be used should ____ networks be considered. Answer Selected Answer: False False True True

802.11b Correct Answer: 802.11b Question 10 3.85 out of 3.85 points Establishing and staffing an internal help desk is one of the most effective means of support. Answer Selected Answer: Correct Answer: Question 11 3.85 out of 3.85 points What is the second step in the wireless LAN model developed by Intel? Answer Selected Answer: develop a report Correct Answer: develop a report Question 12 3.85 out of 3.85 points Two adjacent access points that use the same ____ can cause interference and lost frames. Answer Selected Answer: True True

channel Correct Answer: channel Question 13 3.85 out of 3.85 points ____ generates low interference. Answer Selected Answer: Wood Correct Answer: Wood Question 14 3.85 out of 3.85 points Which channels in IEEE 802.11b and 802.11g networks do not overlap? Answer Selected Answer: 1, 6, and 11 Correct Answer: 1, 6, and 11 Question 15 3.85 out of 3.85 points ____ generates the highest level of interference.

Answer Selected Answer: Metal Correct Answer: Metal Question 16 3.85 out of 3.85 points Which organization would most likely not benefit from the introduction of a wireless LAN? Answer Selected Answer:

business that is rapidly losing market share and has changed CEOs three times in the last 18 months

Correct Answer:

business that is rapidly losing market share and has changed CEOs three times in the last 18 months

Question 17 3.85 out of 3.85 points What should you do when electrical alternating current power is not available near the AP location? Answer Selected Answer: user Power over Ethernet Correct Answer:

user Power over Ethernet Question 18 3.85 out of 3.85 points ____ is considered a hard benefit. Answer Selected Answer: Cost reduction Correct Answer: Cost reduction Question 19 3.85 out of 3.85 points A(n) ____ provides wireless LAN service, for free or for a fee, from a variety of public areas, including coffee shops, public libraries, and airport lounges. Answer Selected Answer: hotspot Correct Answer: hotspot Question 20 3.85 out of 3.85 points ____ is one of the most effective strategies for providing support for a new wireless network. Answer

Selected Answer: Maintaining a help desk Correct Answer: Maintaining a help desk Question 21 3.85 out of 3.85 points Intel recommends that once the ROI model is complete, larger organizations should return to step ____. Answer Selected Answer: 1 Correct Answer: 1 Question 22 3.85 out of 3.85 points According to a study conducted by NOP WorldTechnology, wireless LANs enable users to be connected to network resources ____ additional hours per day. Answer Selected Answer: 1.75 Correct Answer: 1.75 Question 23

3.85 out of 3.85 points What is the single most important tool in any business? Answer Selected Answer: personal networked computer Correct Answer: personal networked computer Question 24 3.85 out of 3.85 points According to NOP-World Technology, ____ percent of end users said that a WLAN improves their quality of life by increasing flexibility and productivity, and saving time. Answer Selected Answer: 87 Correct Answer: 87 Question 25 3.85 out of 3.85 points Several vendors are working on comprehensive network management solutions that integrate wireless networks into the same deployment, operations, and management as a wired network. Answer Selected Answer: Correct Answer: Question 26 True True

3.85 out of 3.85 points What do many industry experts believe is the greatest opportunity for business-process improvement at the beginning of the 21st century? Answer Selected Answer: extending network access to employees who are away from their desks Correct Answer: extending network access to employees who are away from their desks Question 1 3.85 out of 3.85 points What affects the coverage pattern? Answer Selected Answer: objects that interfere with the RF signal Correct Answer: objects that interfere with the RF signal Question 2 3.85 out of 3.85 points What is a consideration when conducting an outdoor site survey? Answer Selected Answer: All of the above

Correct Answer: All of the above Question 3 3.85 out of 3.85 points What is the first step in collecting RF information? Answer Selected Answer: note the objects and layout of the room Correct Answer: note the objects and layout of the room Question 4 3.85 out of 3.85 points What provides the greatest source of RF interference? Answer Selected Answer: mirror Correct Answer: mirror Question 5 3.85 out of 3.85 points What affects transmission range? Answer

Selected Answer: distance and objects in path Correct Answer: distance and objects in path Question 6 3.85 out of 3.85 points When is the best time to perform a site survey? Answer Selected Answer: prior to installing a WLAN Correct Answer: prior to installing a WLAN Question 7 3.85 out of 3.85 points Why is it important to document existing wired and wireless networks? Answer Selected Answer:

to ensure that the new or expanded wireless LAN will dovetail into what is already in place

Correct Answer:

to ensure that the new or expanded wireless LAN will dovetail into what is already in place

Question 8

3.85 out of 3.85 points What should you be sure to do when collecting RF information? Answer Selected Answer: observe the data being displayed by the software measurement tools Correct Answer: observe the data being displayed by the software measurement tools Question 9 3.85 out of 3.85 points What is the most basic tool or component involved in a site survey? Answer Selected Answer: access point Correct Answer: access point Question 10 3.85 out of 3.85 points You would use ____ in documenting a site survey. Answer Selected Answer: All of the above Correct Answer:

All of the above Question 11 3.85 out of 3.85 points In a site survey analyzer, vendors use an algorithm or a lookup table to convert ____ values to dBm, mW, or signal strength percentage. Answer Selected Answer: RSSI Correct Answer: RSSI Question 12 3.85 out of 3.85 points What is a drawback of a spectrum analyzer? Answer Selected Answer: information is displayed in graphical form and not as raw data Correct Answer: information is displayed in graphical form and not as raw data Question 13 3.85 out of 3.85 points The first step in collecting RF information is to position the access point in what may appear to be the most logical location. Answer

Selected Answer: Correct Answer: Question 14 3.85 out of 3.85 points

False False

The industry-standard form for site survey documentation is IEEE 802.11D. Answer Selected Answer: Correct Answer: Question 15 3.85 out of 3.85 points The ____ setting of a site survey analyzer specifies the AP that will be involved in the test. Answer Selected Answer: Destination MAC Address Correct Answer: Destination MAC Address Question 16 3.85 out of 3.85 points The term ____ describes the rate of transmission falling as the device moves farther from the AP. Answer Selected Answer: data rate boundaries False False

Correct Answer: data rate boundaries Question 17 3.85 out of 3.85 points Which site survey analyzer setting sets the number of times a transmission will be repeated if an acknowledgment (ACK) frame is not returned by the destination device? Answer Selected Answer: data retries Correct Answer: data retries Question 18 3.85 out of 3.85 points What are the parts of a site survey report? Answer Selected Answer: narrative section, graphical section Correct Answer: narrative section, graphical section Question 19 3.85 out of 3.85 points What is the best way to gather site-specific documentation? Answer

Selected Answer: inspecting the site Correct Answer: inspecting the site Question 20 3.85 out of 3.85 points What type of AP antenna is most commonly used in a site survey? Answer Selected Answer: omnidirectional Correct Answer: omnidirectional Question 21 3.85 out of 3.85 points It is important to evaluate the placement of the access points and antennas throughout the proposed site in order to meet the design goals. Answer Selected Answer: Correct Answer: Question 22 3.85 out of 3.85 points Which network requires some sort of gateway or interface to be compatible with IEEE 802.11 WLANs? True True

Answer Selected Answer: Token Ring Correct Answer: Token Ring Question 23 3.85 out of 3.85 points The most common type of antenna for a WLAN is an semi-directional antenna, also known as a dipole antenna. Answer Selected Answer: Correct Answer: Question 24 3.85 out of 3.85 points A drawback of spectrum analyzers is that the information is displayed in graphical form and not as raw data. Answer Selected Answer: Correct Answer: Question 25 3.85 out of 3.85 points How are business requirements for a WLAN obtained? Answer True True False False

Selected Answer: interviewing management Correct Answer: interviewing management Question 26 3.85 out of 3.85 points What is a requirement for an access point used in a site survey? Answer Selected Answer: external antenna connectors Correct Answer: external antenna connectors Question 1 3.85 out of 3.85 points ____ is another name for open systems authentication. Answer Selected Answer: SSID filtering Correct Answer: SSID filtering Question 2 3.85 out of 3.85 points

Which characteristic of information is guarded by access control? Answer Selected Answer: availability Correct Answer: availability Question 3 3.85 out of 3.85 points In a 64-bit packet sent using WEP, how many bits are actually encrypted? Answer Selected Answer: 40 Correct Answer: 40 Question 4 3.85 out of 3.85 points On wireless networks, ____ attacks are commonly done by attackers setting up a fake access point. Answer Selected Answer: man-in-the-middle Correct Answer: man-in-the-middle

Question 5 3.85 out of 3.85 points Which type of attacker typically has a high skill level? Answer Selected Answer: All of the above Correct Answer: All of the above Question 6 3.85 out of 3.85 points In WEP, the CRC generates a(n) ____ based on the contents of the text. Answer Selected Answer: checksum Correct Answer: checksum Question 7 3.85 out of 3.85 points A ____ attack on WEP involves viewing collisions to derive plaintext values. Answer Selected Answer: keystream

Correct Answer: keystream Question 8 3.85 out of 3.85 points Information security involves more than protecting the information itself. Answer Selected Answer: Correct Answer: Question 9 3.85 out of 3.85 points A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device. Answer Selected Answer: disassociation Correct Answer: disassociation Question 10 3.85 out of 3.85 points MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address. Answer Selected Answer: True True

spoof Correct Answer: spoof Question 11 3.85 out of 3.85 points A ____ is not malicious but often seeks to expose security flaws. Answer Selected Answer: hacker Correct Answer: hacker Question 12 3.85 out of 3.85 points Which aspect of information security does WEP protect? Answer Selected Answer: confidentiality Correct Answer: confidentiality Question 13 3.85 out of 3.85 points Open system authentication and shared key authentication are the only two types of wireless

authentication available under the 802.11 standard. Answer Selected Answer: Correct Answer: Question 14 3.85 out of 3.85 points In a brute force attack, what key combination would follow 00001? Answer Selected Answer: 00002 Correct Answer: 00002 Question 15 3.85 out of 3.85 points RC4 is a ____ cipher that accepts keys up to 128 bits in length. Answer Selected Answer: stream Correct Answer: stream Question 16 3.85 out of 3.85 points A standard personal computer can easily create over ____ possible password combinations per True True

second. Answer Selected Answer: 1,000,000 Correct Answer: 1,000,000 Question 17 3.85 out of 3.85 points ____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University. Answer Selected Answer: Computer Emergency Response Team Coordination Center (CERT/CC) Correct Answer: Computer Emergency Response Team Coordination Center (CERT/CC) Question 18 3.85 out of 3.85 points Employees pose only a small threat to networks. Answer Selected Answer: Correct Answer: Question 19 3.85 out of 3.85 points False False

A WEP key can be a passphrase created by entering ____ ASCII characters. Answer Selected Answer: 16 Correct Answer: 16 Question 20 3.85 out of 3.85 points According to the IEEE 802.11 cryptography objectives, how strong should WEP be? Answer Selected Answer: reasonably Correct Answer: reasonably Question 21 3.85 out of 3.85 points Cryptography is a new invention of the 20th Century. Answer Selected Answer: Correct Answer: Question 22 3.85 out of 3.85 points What disadvantage of wireless networks provides the biggest stumbling block to the adoption of False False

wireless technology? Answer Selected Answer: security Correct Answer: security Question 23 3.85 out of 3.85 points MAC address filtering ____. Answer Selected Answer: requires pre-approved authentication Correct Answer: requires pre-approved authentication Question 24 3.85 out of 3.85 points Wireless DoS attacks are exactly the same as wired DoS attacks. Answer Selected Answer: Correct Answer: Question 25 3.85 out of 3.85 points ____ ensures that the information is correct and that no unauthorized person or malicious False False

software program has altered that data. Answer Selected Answer: Integrity Correct Answer: Integrity Question 26 3.85 out of 3.85 points When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____. Answer Selected Answer: plaintext Correct Answer: plaintext Tuesday, July 3, 2012 1:39:08 AM EDT Instructions
false

Question 1 3.85 out of 3.85 points The ____ method of encryption is used in a personal security model. Answer Selected Answer:

TKIP Correct Answer: TKIP Question 2 3.85 out of 3.85 points At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special scan mode, monitor the airwaves to detect signals from rogue access points. Answer Selected Answer: wireless sensors Correct Answer: wireless sensors Question 3 3.85 out of 3.85 points What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it? Answer Selected Answer: pre-authentication Correct Answer: pre-authentication Question 4 3.85 out of 3.85 points

WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements. Answer Selected Answer: Correct Answer: Question 5 3.85 out of 3.85 points ____ replaces CRC in WPA. Answer Selected Answer: MIC Correct Answer: MIC Question 6 3.85 out of 3.85 points The 802.11i standard addresses both ____. Answer Selected Answer: encryption and authentication Correct Answer: encryption and authentication Question 7 3.85 out of 3.85 points True True

When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option. Answer Selected Answer: hexadecimal Correct Answer: hexadecimal Question 8 3.85 out of 3.85 points How long is the per-packet key used in TKIP? Answer Selected Answer: 128-bits Correct Answer: 128-bits Question 9 3.85 out of 3.85 points Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds. Answer Selected Answer: 13

Correct Answer: 13 Question 10 3.85 out of 3.85 points What security technology was most recently introduced? Answer Selected Answer: WPA2 Correct Answer: WPA2 Question 11 3.85 out of 3.85 points ____ was designed to address WEP vulnerabilities with a minimum of inconvenience. Answer Selected Answer: WPA Correct Answer: WPA Question 12 3.85 out of 3.85 points The ____ wireless security standard provides a low level of security. Answer

Selected Answer: All of the above Correct Answer: All of the above Question 13 3.85 out of 3.85 points What authentication system did the proposed WEP2 standard use? Answer Selected Answer: Kerberos Correct Answer: Kerberos Question 14 3.85 out of 3.85 points ____ is considered to be the heart and soul of WPA security. Answer Selected Answer: TKIP Correct Answer: TKIP Question 15 3.85 out of 3.85 points

The block cipher used in 802.11i is the Data Encryption Standard (DES). Answer Selected Answer: Correct Answer: Question 16 3.85 out of 3.85 points In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in. Answer Selected Answer: unicast Correct Answer: unicast Question 17 3.85 out of 3.85 points The personal security model is intended for settings in which a(n) ____ is unavailable. Answer Selected Answer: authentication server Correct Answer: authentication server Question 18 3.85 out of 3.85 points False False

____ authentication is used in the enterprise security model using WPA and WPA2. Answer Selected Answer: IEEE 802.1x Correct Answer: IEEE 802.1x Question 19 3.85 out of 3.85 points What is the name of the 128-bit key used in TKIP? Answer Selected Answer: temporal key Correct Answer: temporal key Question 20 3.85 out of 3.85 points A ____ VPN is a user-to-LAN connection used by remote users. Answer Selected Answer: remote-access Correct Answer: remote-access Question 21

0 out of 3.85 points Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key. Answer Selected Answer: Correct Answer: Question 22 3.85 out of 3.85 points Encryption under the WPA2 personal security model is accomplished by using the block cipher ____. Answer Selected Answer: AES Correct Answer: AES Question 23 3.85 out of 3.85 points Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified. Answer Selected Answer: port security Correct Answer: port security True False

Question 24 0 out of 3.85 points WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology. Answer Selected Answer: Correct Answer: Question 25 3.85 out of 3.85 points What is the first step in implementing an interim security model? Answer Selected Answer: shared key authentication Correct Answer: shared key authentication Question 26 3.85 out of 3.85 points A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network. Answer Selected Answer: Correct Answer: True True False True

What is the last step in RF site tuning? Answer Selected Answer: documenting changes Correct Answer: documenting changes Question 2 3.85 out of 3.85 points A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground. Answer Selected Answer: lightning arrestor Correct Answer: lightning arrestor Question 3 3.85 out of 3.85 points Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception. Answer Selected Answer: Correct Answer: Question 4 3.85 out of 3.85 points True True

A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna. Answer Selected Answer: bidirectional Correct Answer: bidirectional Question 5 3.85 out of 3.85 points For a proper WLAN performance, the link budget must be ____ dB. Answer Selected Answer: greater than zero Correct Answer: greater than zero Question 6 3.85 out of 3.85 points A wireless network is a static system. Answer Selected Answer: Correct Answer: Question 7 3.85 out of 3.85 points False False

What is another name for propagation loss? Answer Selected Answer: free space loss Correct Answer: free space loss Question 8 3.85 out of 3.85 points ____ attenuators are the only type permitted by the FCC for WLAN systems. Answer Selected Answer: Fixed-loss Correct Answer: Fixed-loss Question 9 3.85 out of 3.85 points In the Windows operating system, what window provides basic tools for monitoring a WLAN? Answer Selected Answer: Wireless Network Connection Status Correct Answer: Wireless Network Connection Status Question 10

3.85 out of 3.85 points What tool(s) are used most often as standard network monitoring tools? Answer Selected Answer: Simple Network Management Protocol and Remote Monitoring Correct Answer: Simple Network Management Protocol and Remote Monitoring Question 11 3.85 out of 3.85 points The current version of SNMP (____) addresses security and remote configuration. Answer Selected Answer: v3 Correct Answer: v3 Question 12 3.85 out of 3.85 points It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes. Answer Selected Answer: manual

Correct Answer: manual Question 13 3.85 out of 3.85 points Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation. Answer Selected Answer: azimuth Correct Answer: azimuth Question 14 3.85 out of 3.85 points A ____ antenna is most typically used on a WLAN. Answer Selected Answer: rod Correct Answer: rod Question 15 3.85 out of 3.85 points When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.

Answer Selected Answer: multicast Correct Answer: multicast Question 16 3.85 out of 3.85 points The first step in creating a security policy is ____. Answer Selected Answer: risk assessment Correct Answer: risk assessment Question 17 3.85 out of 3.85 points Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task. Answer Selected Answer: Correct Answer: Question 18 3.85 out of 3.85 points Vulnerabilities that are ranked as ____ are events that would cause the organization to cease False False

functioning or be seriously crippled in its capacity to perform. Answer Selected Answer: catastrophic Correct Answer: catastrophic Question 19 3.85 out of 3.85 points Which type of RF loss is caused by the equipment itself, not external objects? Answer Selected Answer: Voltage Standing Wave Ratio Correct Answer: Voltage Standing Wave Ratio Question 20 0 out of 3.85 points ____ is a nonvolatile storage chip used in computers and other devices. Answer Selected Answer: Firmware Correct Answer: EEPROM Question 21

3.85 out of 3.85 points Almost all WLAN vendors provide utilities to assist in monitoring the wireless network. Answer Selected Answer: Correct Answer: Question 22 3.85 out of 3.85 points When conducting a security audit, ____ should determine vulnerabilities. Answer Selected Answer: a team with diverse backgrounds Correct Answer: a team with diverse backgrounds Question 23 3.85 out of 3.85 points ____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it. Answer Selected Answer: Physical Correct Answer: Physical Question 24 True True

3.85 out of 3.85 points What information is required for a link budget? Answer Selected Answer: All of the above Correct Answer: All of the above Question 25 3.85 out of 3.85 points What technique(s) is/are most effective for defeating social engineering attacks? Answer Selected Answer: education and policies Correct Answer: education and policies Question 26 3.85 out of 3.85 points Information security weaknesses can never be entirely eliminated. Answer Selected Answer: Correct Answer: True True

Tuesday, July 10, 2012 10:59:36 PM EDT

You might also like