Top-Rated Free Essay

Check Understanding

Topics: Pages: 6 (1457 words) / Published: May 30th, 2013
Check Your Understanding 1. Fill in IEEE 802.11 B, 802.11 G, 802.11 A, or 802.11 and in the blank to match the description.
802.11b Specifies data rates of 1, 2, 5.5, in 11 Mbps do two different sized spreading sequences specified in the DSSS modulation technique.
802.11g Uses the 802.11 MAC, but with higher data rates in the 2.4 GHz ISN band by using the OFDM modulation technique.
802.11a Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range.
802.11n Uses multiple radios in antenna at endpoints, each broadcasting on the same frequency to establish multiple streams. 2. Fill in the term for the wires networking device in the blank to match the description.
Wireless NIC Encodes a data stream onto an RF signal using the configured modulation technique.
Access point Connects multiple to wireless clients or stations to a wired LAN.
Wireless router Connects to separated, isolated wired networks together. 3. At which layer of the OSI model do wireless access points operate? a. Physical b. data link c. network d. application 4. Which two steps are required for a wireless client to associate with an access point? e. IP addressing f. wireless address translation g. wireless client authentication h. channel identification i. wireless client Association 5. Which three WLAN client authentication types require a preprogrammed network key to be set on the client? j. Open with data encryption disabled k. shared with data encryption algorithm WEP l. WPA with data encryption algorithm TK IP m. WPA – PSK with data encryption algorithm TK IP n. WPA 2 – PSK with data encryption algorithm AES 6. Which two items contribute to the security of a WLAN? o. WPA 2 p. use of multiple channels q. hiding the SS ID r. open authentication s. AES 7. Which term is used for products that are tested to be an operable in both PSK and 802.1x E AP operation for authentication? t. Personal mode u. WPA two compatible v. R ADI US authenticated w. enterprise mode x. pre-shared key authenticated 8. To help ensure a secure wireless network, most enterprise network should follow which IEEE standard? y. 802.11 a z. 802.11 B {. 802.11 C |. 802.11 I 9. The authentication and encryption menu options are displayed. Which wireless settings provide the highest level of security? }. Open ~. shared . WPA . WPA – PSK 10. Which two combinations of 802.11 B RF channels would allow to wireless APs to operate simultaneously in the same room with no channel overlap? . Channels 10 and a 6 . channels 9 and 6 . channels 8 and 5 . channels 7 and 2 . channels 6 and 2 . channels 6 and 11 11. Why do cordless devices, such as cordless telephones, sometimes interfere with wireless access points? . These devices operate as similar frequencies. . These devices operate at the same frequencies and have higher RF power settings. . These devices flood the entire frequency spectrum of low powered noise, which may cause less of signal for wireless devices trying to connect with an access point. . The signal from the cordless device is not polarized and combines with the access point polarized signal, thus reducing the old overall signal strength. 12. What is the recommended overlap between the two wireless access points to provide proper connectivity for users? . 5 to 10% . 10 to 15% . 15 to 20% . 20 to 25% 13. Fill in the authentication method in the blank that matches the encryption algorithm or security protocol listed.
Open Disabled
WPA2 AES 14. Which W LA and client settings would be reviewed to resolve problems accessing the network? . Wireless mode (802.11 A, 802.11 B, 802.11 G, 802.11n) . wireless network card drivers . channel selection for ad hoc networks . TCP/IP properties . wireless Association properties
Study Guide 1. L 2. F 3. M 4. O 5. N 6. D 7. H 8. a 9. E 10. J 11. C 12. B 13. I 14. G 15. K 16. Wireless is now consider required component for business communications because people don’t sit at their desks they want to be able to access their information wherever they are whether it be on their smart phone or on their laptop or their tablet. This increases production and reduce costs and makes businesses more flexible. 17. 802.3 18. 802 11 19. radio frequencies 20. radiofrequency 21. cable 22. collision avoidance 23. collision detection 24. anyone with a NIC and an access point 25. cable connection 26. yes 27. no usually not but possibly 28. FCC 29. IEEE 30. industrial 31. scientific 32. medical 33. ISAM 34. 1 to 2 Mb per second 35. 2.4 GHz 36. 1999 37. 2.4 GHz 38. DSSS 39. up to 11 Mb per second 40. hundred and 50 feet 41. 1999 42. 5 GHz 43. OFDM 44. of 54 Mb per second 45. hundred 50 feet 46. 2003 47. 2.4 GHz 48. OF DM and DSSS 49. up to 54 Mb per second 50. 150 feet 51. 2008 52. unknown 53. M IMO 54. 240 Mb per second 55. 230 feet 56. direct sequence spread spectrum 57. Orthogonal frequency division multiplexing 58. OFDM 59. DSSS 60. OFDM 61. higher frequency radio waves are more easily absorbed by obstacles making 802.11 a have poor performance 62. higher frequency has lower range than either 802.11 B or 11 G 63. some countries do not prove met the use of 5 GHz band 64. most devices use the 2.4 GHz band causing 802.11 and 11 G devices to have more interference 65. 802.11 and uses multiple radio and antenna at endpoints, each broadcasting on the same frequency to establish multiple streams. The multiple input output or capital M I am all technology splits a high data rate stream into multiple lower level it rate streams and broadcast them simultaneously over the available radio and antennas. This allows for the theological maximum data rate of 248 Mb per second using to streams. 66. ITU – R 67. IEEE 68. Wi-Fi alliance 69. wireless N I C 70. access point 71. 802.11 72. 802.3 73. associate 74. carrier sense multiple access 75. collision avoidance 76. CSMA/CA 77. When the access point receives data, is something knowledge management that data has been received. This technology management lets us know that no collisions occurred and prevents retransmission of data. 78. If two machines are at the maximum range of the access point, they may not detect each other. So they may end up transmitting simultaneously. Capital CSMA/CA use is capital RTS/CTS between the access point in the client to avoid collisions. 79. Wireless access point 80. switch 81. router 82. service set identifier 83. 2 84. 32 85. channels one, six and 11 do not overlap 86. If there are three access points you use channel 1, 6, and 11. If there are only two you may use any two channels as long as they are five channels apart the way two and seven are. 87. B SS is a wireless topology with a single access point use fact all mobile clients in a service area. Capital ESS is wireless topology that uses two or more B SS as the distribution system to provide coverage where a BSS would not be enough. 88. Beacons 89. probes 90. authentication 91. Association 92. war driving 93. Off-the-shelf devices sold today have default settings when people don’t take the time to change the configurations it leaves that open to anyone that knows the off-the-shelf settings. 94. Rogue 95. A man in the middle attack is when a person uses packet sniffing software to intercept the transmission between the computer and the access point. 96. All three ways are creating noise channel, a flood the BSS with the CTS message, and a DOS attack. 97. The algorithm is crackable 98. 32 bit WEP keys are manually managed, so uses enter them by hand so there is more chance of a typo. 99. 802.11 I 100. WPA 2 101. extensible authentication protocol 102. 802.1 acts 103. temp oral key integration protocol 104. advanced encryption standard 105. encrypts layer 2 payload 106. does a message in tag ready check to check for tampering 107. AES uses the Mac header to check for tampering. AES also includes a sequence number on the encrypted data 108. SS ID cloaking 109. Mac address filtering 110. W LA and security implementation 111. Mac addresses are easily spoofed, SS IDs are easily to discover even if access points do not broadcast

Packet Tracer

You May Also Find These Documents Helpful

  • Check Your Understanding
  • Understanding Check One
  • Check Your Understanding
  • Module 7 Check Your Understanding
  • Windows 7 Check Your Understanding
  • check
  • Eco550 Week 2 Check Your Understanding
  • check
  • Check It
  • check fraud and check washing