Faculty of Computer Science & Engineering Chapter 04 .Wireless

Download Report

Transcript Faculty of Computer Science & Engineering Chapter 04 .Wireless

FACULTY OF
COMPUTER SCIENCE &
ENGINEERING
Chapter 04 .Wireless LAN
Infrastructure Devices and 802.11
Network Architecture
QUESTION 1

1. A client that can transmit data over a wireless
network is considered to be which of the
following? Choose all that apply.

A. Unauthenticated

B. Unassociated

C. Authenticated

D. Associated
QUESTION 2

2. Which one of the following supports
Authentication, Authorization, and Accounting
(AAA)?

A. Open System authentication

B. Shared Key authentication

C. Open System and Shared Key authentication

D. 802.11

E. None of the above
QUESTION 3

3. A basic service set has how many access
points?

A. None

B. 1

C. 2

D. Unlimited
QUESTION 4

4. Shared Key authentication is more secure than
Open System authentication.

A. This statement is always true

B. This statement is always false

C. It depends on whether or not WEP is utilized
QUESTION 5

5. A traffic indication map (TIM) is populated
with station information when using which one of
the following power management features in a
basic or extended service set?

A. Continuous aware mode

B. Continuous power mode

C. Power save polling mode

D. Power aware polling mode
QUESTION 6

6. An ad hoc traffic indication message (ATIM) is
sent when using which one of the following power
management features in an independent basic
service set?

A. Continuous aware mode

B. Continuous power mode

C. Power save polling mode

D. Power aware polling mode
QUESTION 7

7. An independent basic service set is also
commonly referred to as which one of the
following?

A. Ad hoc mode

B. Infrastructure mode

C. Network mode

D. Power save polling mode
QUESTION 8

8. The 802.11 standard specifies which of the
following authentication processes? Choose all
that apply.

A. Open System authentication

B. 802.1x/EAP

C. Shared Key authentication

D. RADIUS
QUESTION 9

9. Using power save polling mode (PSP) in a
wireless LAN will result in which of the
following? Choose all that apply.

A. Increased throughput on the network due to less
overhead traffic

B. Decreased throughput on the network due to more
overhead traffic

C. Network traffic is not effected by using PSP

D. Longer battery life on the clients that use PSP
QUESTION 10

10. In an ad hoc network, every client station
buffers packets.

A. This statement is always true

B. This statement is always false

C. It depends on whether one station is acting as a
gateway
QUESTION 11

11. Which of the following are functions of the beacon
frame?

A. Load balancing all clients across multiple access points

B. Broadcasting the SSID so that clients can connect to the
access point

C. Synchronizing the time between the access point and
clients

D. Allowing client authentication with the access point
when using Shared Key authentication
QUESTION 12

12. What is passive scanning used for in a
wireless LAN?

A. Allows clients to authenticate with an access point

B. Allows clients to actively search for any access
points within range

C. Reduces the time it takes clients to locate and
associate to access points when roaming

D. Helps determine which bridge the client will
connect to
QUESTION 13

13. What does the acronym "SSID" stand for?

A. Security Set Identifier

B. Service Set Information Directory

C. Service Set Identifier

D. Security Service Information Dependency
QUESTION 14

14. The process of authentication and association
has how many distinct states?

A. 1

B. 2

C. 3

D. 4

E. 5
QUESTION 15

15. Why is Shared Key authentication considered
a security risk?

A. The access point transmits the challenge text in
the clear and receives the same challenge text
encrypted with the WEP key

B. The keys are shared via broadcast with all
network nodes

C. A hacker could see the keys with a sniffer

D. The WEP keys used on all computers are the same
QUESTION 16

16. What is a basic service set?

A. The basic components of a wireless LAN

B. All clients in a wireless LAN that are being
serviced by one access point

C. The area around an access point which can be
serviced by the access point

D. One or more access points transmitting an RF
signal
QUESTION 17

17. In a basic service set, or BSS, the access point
must operate in which mode?

A. Repeater

B. Router

C. Bridge

D. Infrastructure

E. Gateway
QUESTION 18

18. An IBSS can also be called which of the
following? Choose all that apply.

A. Peer-to-peer

B. Indifferent Basic Service Set

C. Ad hoc network

D. Internet Bindery Set Solution
Wireless
LAN
Infrastructure Devices
QUESTION 1

1. Why would it not be a good idea to have a number
of access points in repeater mode in series? Choose all
that apply.

A. Throughput would be reduced to unacceptable levels

B. The access points would all be required to be physically
connected to the network

C. Data corruption can occur over the series of hops back to
the root access point

D. Legacy serial devices would not be able to communicate
with the root access point
QUESTION 2

2. You are installing a wireless LAN in a factory,
and the laptop client computers have no USB
support. Which one of the following client devices
could be used as a stand-alone client connection
to the wireless LAN?

A. ISA adapter

B. PCI adapter

C. PCMCIA card

D. Ethernet converter
QUESTION 3

3. You need to connect two wired networks
together that currently share no network
connectivity between them. Using only access
points to connect the networks, what mode would
the access points need to be placed in?

A. Root mode

B. Repeater mode

C. Bridging mode
QUESTION 4

4. When an access point connects to another
access point wirelessly for the purpose of
extending the wireless segments to client out of
range of the access point connected to the wired
segment, the access point not connected to the
wired LAN segment is in ______ mode.

A. Root

B. Repeater

C. Bridge
QUESTION 5

5. Wireless bridges are used for which of the
following functions? Choose all that apply.

A. Connecting mobile users to the wired LAN

B. Point-to-multipoint configurations

C. Building-to-building connectivity

D. Wireless security
QUESTION 6

6. Properly aligning two wireless bridges will
optimize their throughput. This statement is:

A. Always true

B. Always false

C. Depends on the manufacturer
QUESTION 7

7. Your friend owns a small business, and asks
you what he could buy to provide lowcost wireless
Internet access for his 5 salespeople in the office.
Which one of the following devices would be an
appropriate solution?

A. Access point

B. Wireless workgroup bridge

C. Enterprise wireless gateway

D. Wireless residential gateway
QUESTION 1

8. A company has hired you to recommend
wireless LAN equipment that will allow them to
place limits on the bandwidth used by each of
their wireless users. Which one of the following
devices would you recommend?

A. Access point

B. Wireless workgroup bridge

C. Enterprise wireless gateway

D. Wireless residential gateway
QUESTION 9

9. In a situation in which you need to allow
outdoor users to connect to your network via a
wireless LAN, which one of the following features
would allow you to use an indoor access point
with an outdoor antenna?

A. Antenna diversity

B. Detachable antennas

C. Plug and play support

D. Modular radio cards
QUESTION 10

10. Which of the following wireless client devices
would not be a plug–n-play device?

A. USB Client

B. PCMCIA Card

C. ISA Card

D. Compact Flash Card
QUESTION 11

11. Your client has a number of sales people that are located in a
remote office building.Each sales person has both a PC and a
laptop. The client wants to purchase a hardware solution that will
permit each sales person to have wireless network connectivity for
his or her PC and laptop. Only the PC or the laptop needs
network access at any given time, and both have USB support.
Which of the following solutions would work? Choose all that
apply.

A. 1 PCMCIA card

B. 1 PCMCIA card, 1 PCI adapter

C. 1 PCMCIA card, 1 USB adapter

D. 1 PCMCIA card, 1 CF card
QUESTION 12

12. You have configured an access point in a small office
and are concerned about hackers intruding on your
wireless network. What settings will you adjust (from the
manufacturer’s default settings) on the unit to address this
potential problem? Choose all that apply.

A. Detachable antennas

B. MAC Filtering

C. Radio card position

D. Output power

E. WEP configuration
QUESTION 13

13. Which of the following are common security
options that most wireless residential gateways
include? Choose all that apply.

A. PPPoE – Point-to-Point Protocol over Ethernet

B. Virtual Servers

C. Routing

D. PAT – Port Address Translation

E. VPN Client or VPN Client Passthrough
QUESTION 14

14. Which of the following are wired connectivity
options that a wireless bridge can include?
Choose all that apply.

A. 10baseTx

B. 10baseFL

C. 10/100baseTx

D. 1000baseSX

E. 100baseFx
QUESTION 15

15. A workgroup bridge is a(n) ______ device.

A. Client

B. Infrastructure

C. Gateway

D. Antenna
QUESTION 16

16. Which one of the following is not a hardware
or software option on a wireless bridge?

A. Fixed or detachable antennas

B. Advanced filtering capabilities

C. Removable (modular) radio cards

D. Full duplex radio links

E. Varied Types of Wired Connectivity
QUESTION 17

17. Ethernet and serial converters are used with
devices having which of the following physical
connectivity? Choose all that apply.

A. 9-pin serial ports

B. Ethernet ports

C. USB Ports

D. Parallel Ports
QUESTION 18

18. Why is an access point considered a portal?

A. An access point allows client connectivity from an
802.11 network to either

802.3 or 802.5 networks

B. An access point always connects users to the
Internet

C. An access point connects clients to one another

D. An access point is a gateway to another collision
domain
QUESTION 1

19. The statement that an access point is a half
duplex wireless device is which one of the
following?

A. Always true

B. Always false

C. Dependent on the maker of the access point
QUESTION 1

20. A USB adapter is used with which type of
wireless LAN device?

A. Gateway

B. Access point

C. Bridge

D. Client

E. Converter
The
End