Ch. 6 Quiz CTS1134

11 September 2022
4.7 (114 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
802.11ac Wave 2 devices can theoretically support how much maximum throughput?
answer
3.47 Gbps
question
A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?
answer
probe frame
question
All wireless signals are carried through the air by electromagnetic waves. T/F
answer
True
question
An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet. T/F
answer
True
question
At what layer of the OSI model do the 802.11 standards vary?
answer
Physical layer
question
Diffraction has what affect on a wireless signal's propagation?
answer
The signal is split into secondary waves that continue in the direction in which they split.
question
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP. T/F
answer
False
question
Healing messages are a feature of what smart home protocol?
answer
Z-Wave
question
How does refraction affect the propagation of a wireless transmission?
answer
It distorts the signal as it travels into and through a different transmission medium
question
How does the 802.11 data frame indicate how a large packet should be fragmented?
answer
The sequence control field indicates how packets will be subdivided
question
How many data streams are used in 802.11ac Wave 2 devices?
answer
4 data streams
question
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?
answer
Wi-Fi analyzer
question
In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?
answer
basic service set
question
In Linux, what command can be used for viewing and setting wireless interface parameters?
answer
iwconfig
question
In an 802.11 data frame, what is the maximum amount of data that can be sent?
answer
2312 bytes
question
In an 802.11 data frame, what is the size of the frame check sequence field?
answer
6 bytes
question
Infrared technology utilizes an LED that emits light with shorter wavelengths than red light. T/F
answer
False
question
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. T/F
answer
False
question
Near-field communication devices send data at what fixed frequency?
answer
13.56 MHz
question
The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?
answer
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
question
The LLC sublayer is primarily concerned with managing MAC addresses in message frames. T/F
answer
False
question
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack. T/F
answer
True
question
The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard. T/F
answer
True
question
The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively. T/F
answer
True
question
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
answer
Multiple input-multiple output (MIMO)
question
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
answer
9 kHz and 300 GHz
question
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
answer
captive portal
question
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
answer
management frames
question
What is the purpose of the Layer 2 LLC sublayer?
answer
It is used to handle multiplexing, flow and error control, and reliability.
question
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
answer
RTS/CTS (Request to Send/Clear to Send)
question
What scenario describes an evil twin attack?
answer
A malicious access point is configured with the SSID of a non-malicious public access point
question
What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?
answer
beacon frame
question
What type of device can be used to assess the quality of a wireless signal?
answer
spectrum analyzer
question
When troubleshooting wireless issues, what statement is accurate?
answer
Access points that use overlapping channels can cause interference with each other if they are too close
question
When using RFID, what is an ARPT (Active Reader Passive Tag)?
answer
It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission
question
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
answer
control frames
question
Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?
answer
Class 1
question
Which of the following statements regarding the 802.11ac standard is NOT accurate?
answer
802.11ac access points function more like a hub than a switch.
question
You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?
answer
The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.
question
Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters. T/F
answer
False