Filters
Question type

Study Flashcards

The 802.11b standard introduced Wired Equivalent Privacy (WEP),which gave many users a false sense of security that data traversing the WLAN was protected.

Correct Answer

verifed

verified

Match each item with a statement below. -Data packets are spread simultaneously over multiple frequencies instead of hopping to other frequencies


A) modulation
B) spread spectrum
C) FHSS
D) narrowband
E) DSSS
F) Infrared (IR)
G) 802.1x
H) EAP
I) SSID
J) ad-hoc network

Correct Answer

verifed

verified

In 802.1X,what component refers specifically to the wireless user attempting access to a WLAN?


A) host
B) supplicant
C) authenticator
D) authentication server

Correct Answer

verifed

verified

If an organization does not want to rely on a wireless device to authenticate users,which of the following is a secure alternative?


A) RADIUS server
B) Certificate server
C) WPA2
D) Proxy server

Correct Answer

verifed

verified

What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?


A) HSSS
B) DSSS
C) FHSS
D) OFSS

Correct Answer

verifed

verified

It is possible to have a wireless network that does not connect to a wired network.

Correct Answer

verifed

verified

Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges?


A) SSIDs
B) guard bands
C) cycles
D) channels

Correct Answer

verifed

verified

What is the 1 to 32 character configurable name used to identify a WLAN?


A) WEP
B) WiFi
C) LAN
D) SSID

Correct Answer

verifed

verified

What is the IEEE 802.15 standard?

Correct Answer

verifed

verified

The 802.15 standard addresses networking...

View Answer

What standard specifically defines the process of authenticating and authorizing users on a network?


A) 802.11
B) 802.1
C) 802.1X
D) WEP

Correct Answer

verifed

verified

What is the role of a wireless NIC?

Correct Answer

verifed

verified

For wireless technology to work,each nod...

View Answer

Match each item with a statement below. -An enhancement to PPP,that was designed to allow a company to select its authentication method


A) modulation
B) spread spectrum
C) FHSS
D) narrowband
E) DSSS
F) Infrared (IR)
G) 802.1x
H) EAP
I) SSID
J) ad-hoc network

Correct Answer

verifed

verified

What type of encryption is currently used to secure WPA2?


A) Radius
B) TKIP
C) WEP
D) AES

Correct Answer

verifed

verified

What is a digital certificate?

Correct Answer

verifed

verified

A certificate is a record that authentic...

View Answer

Which of the following is a utility that is a wireless network detector,sniffer,and an intrusion detection system?


A) Kismet
B) Clonezilla
C) Vistumbler
D) Firefox

Correct Answer

verifed

verified

Match each item with a statement below. -Technology is restricted to a single room or line of sight because this light spectrum cannot penetrate walls


A) modulation
B) spread spectrum
C) FHSS
D) narrowband
E) DSSS
F) Infrared (IR)
G) 802.1x
H) EAP
I) SSID
J) ad-hoc network

Correct Answer

verifed

verified

Match each item with a statement below. -Defines how data is placed on a carrier signal


A) modulation
B) spread spectrum
C) FHSS
D) narrowband
E) DSSS
F) Infrared (IR)
G) 802.1x
H) EAP
I) SSID
J) ad-hoc network

Correct Answer

verifed

verified

In 802.11,which of the following is an addressable unit?


A) host
B) Data Terminal Equipment (DTE)
C) station (STA)
D) wireless NIC (WNIC)

Correct Answer

verifed

verified

Which of the following terms is the rate at which a sound wave repeat?


A) frequency
B) amplitude
C) channel
D) link

Correct Answer

verifed

verified

What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?


A) WAN
B) WPAN
C) WSAN
D) PAN

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer