1 / 41

Faculty of Computer Science & Engineering

Faculty of Computer Science & Engineering. Chapter 04 . Wireless LAN Infrastructure Devices and 802.11 Network Architecture. Question 1. 1. A client that can transmit data over a wireless network is considered to be which of the following? Choose all that apply. A. Unauthenticated

morgan
Download Presentation

Faculty of Computer Science & Engineering

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Faculty ofComputer Science & Engineering Chapter 04 .Wireless LAN Infrastructure Devices and 802.11 Network Architecture

  2. Question 1 • 1. A client that can transmit data over a wireless network is considered to be which of the following? Choose all that apply. • A. Unauthenticated • B. Unassociated • C. Authenticated • D. Associated

  3. Question 2 • 2. Which one of the following supports Authentication, Authorization, and Accounting (AAA)? • A. Open System authentication • B. Shared Key authentication • C. Open System and Shared Key authentication • D. 802.11 • E. None of the above

  4. Question 3 • 3. A basic service set has how many access points? • A. None • B. 1 • C. 2 • D. Unlimited

  5. Question 4 • 4. Shared Key authentication is more secure than Open System authentication. • A. This statement is always true • B. This statement is always false • C. It depends on whether or not WEP is utilized

  6. Question 5 • 5. A traffic indication map (TIM) is populated with station information when using which one of the following power management features in a basic or extended service set? • A. Continuous aware mode • B. Continuous power mode • C. Power save polling mode • D. Power aware polling mode

  7. Question 6 • 6. An ad hoc traffic indication message (ATIM) is sent when using which one of the following power management features in an independent basic service set? • A. Continuous aware mode • B. Continuous power mode • C. Power save polling mode • D. Power aware polling mode

  8. Question 7 • 7. An independent basic service set is also commonly referred to as which one of the following? • A. Ad hoc mode • B. Infrastructure mode • C. Network mode • D. Power save polling mode

  9. Question 8 • 8. The 802.11 standard specifies which of the following authentication processes? Choose all that apply. • A. Open System authentication • B. 802.1x/EAP • C. Shared Key authentication • D. RADIUS

  10. Question 9 • 9. Using power save polling mode (PSP) in a wireless LAN will result in which of the following? Choose all that apply. • A. Increased throughput on the network due to less overhead traffic • B. Decreased throughput on the network due to more overhead traffic • C. Network traffic is not effected by using PSP • D. Longer battery life on the clients that use PSP

  11. Question 10 • 10. In an ad hoc network, every client station buffers packets. • A. This statement is always true • B. This statement is always false • C. It depends on whether one station is acting as a gateway

  12. Question 11 • 11. Which of the following are functions of the beacon frame? • A. Load balancing all clients across multiple access points • B. Broadcasting the SSID so that clients can connect to the access point • C. Synchronizing the time between the access point and clients • D. Allowing client authentication with the access point when using Shared Key authentication

  13. Question 12 • 12. What is passive scanning used for in a wireless LAN? • A. Allows clients to authenticate with an access point • B. Allows clients to actively search for any access points within range • C. Reduces the time it takes clients to locate and associate to access points when roaming • D. Helps determine which bridge the client will connect to

  14. Question 13 • 13. What does the acronym "SSID" stand for? • A. Security Set Identifier • B. Service Set Information Directory • C. Service Set Identifier • D. Security Service Information Dependency

  15. Question 14 • 14. The process of authentication and association has how many distinct states? • A. 1 • B. 2 • C. 3 • D. 4 • E. 5

  16. Question 15 • 15. Why is Shared Key authentication considered a security risk? • A. The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key • B. The keys are shared via broadcast with all network nodes • C. A hacker could see the keys with a sniffer • D. The WEP keys used on all computers are the same

  17. Question 16 • 16. What is a basic service set? • A. The basic components of a wireless LAN • B. All clients in a wireless LAN that are being serviced by one access point • C. The area around an access point which can be serviced by the access point • D. One or more access points transmitting an RF signal

  18. Question 17 • 17. In a basic service set, or BSS, the access point must operate in which mode? • A. Repeater • B. Router • C. Bridge • D. Infrastructure • E. Gateway

  19. Question 18 • 18. An IBSS can also be called which of the following? Choose all that apply. • A. Peer-to-peer • B. Indifferent Basic Service Set • C. Ad hoc network • D. Internet Bindery Set Solution

  20. Wireless LAN Infrastructure Devices

  21. Question 1 • 1. Why would it not be a good idea to have a number of access points in repeater mode in series? Choose all that apply. • A. Throughput would be reduced to unacceptable levels • B. The access points would all be required to be physically connected to the network • C. Data corruption can occur over the series of hops back to the root access point • D. Legacy serial devices would not be able to communicate with the root access point

  22. Question 2 • 2. You are installing a wireless LAN in a factory, and the laptop client computers have no USB support. Which one of the following client devices could be used as a stand-alone client connection to the wireless LAN? • A. ISA adapter • B. PCI adapter • C. PCMCIA card • D. Ethernet converter

  23. Question 3 • 3. You need to connect two wired networks together that currently share no network connectivity between them. Using only access points to connect the networks, what mode would the access points need to be placed in? • A. Root mode • B. Repeater mode • C. Bridging mode

  24. Question 4 • 4. When an access point connects to another access point wirelessly for the purpose of extending the wireless segments to client out of range of the access point connected to the wired segment, the access point not connected to the wired LAN segment is in ______ mode. • A. Root • B. Repeater • C. Bridge

  25. Question 5 • 5. Wireless bridges are used for which of the following functions? Choose all that apply. • A. Connecting mobile users to the wired LAN • B. Point-to-multipoint configurations • C. Building-to-building connectivity • D. Wireless security

  26. Question 6 • 6. Properly aligning two wireless bridges will optimize their throughput. This statement is: • A. Always true • B. Always false • C. Depends on the manufacturer

  27. Question 7 • 7. Your friend owns a small business, and asks you what he could buy to provide lowcost wireless Internet access for his 5 salespeople in the office. Which one of the following devices would be an appropriate solution? • A. Access point • B. Wireless workgroup bridge • C. Enterprise wireless gateway • D. Wireless residential gateway

  28. Question 1 • 8. A company has hired you to recommend wireless LAN equipment that will allow them to place limits on the bandwidth used by each of their wireless users. Which one of the following devices would you recommend? • A. Access point • B. Wireless workgroup bridge • C. Enterprise wireless gateway • D. Wireless residential gateway

  29. Question 9 • 9. In a situation in which you need to allow outdoor users to connect to your network via a wireless LAN, which one of the following features would allow you to use an indoor access point with an outdoor antenna? • A. Antenna diversity • B. Detachable antennas • C. Plug and play support • D. Modular radio cards

  30. Question 10 • 10. Which of the following wireless client devices would not be a plug–n-play device? • A. USB Client • B. PCMCIA Card • C. ISA Card • D. Compact Flash Card

  31. Question 11 • 11. Your client has a number of sales people that are located in a remote office building.Each sales person has both a PC and a laptop. The client wants to purchase a hardware solution that will permit each sales person to have wireless network connectivity for his or her PC and laptop. Only the PC or the laptop needs network access at any given time, and both have USB support. Which of the following solutions would work? Choose all that apply. • A. 1 PCMCIA card • B. 1 PCMCIA card, 1 PCI adapter • C. 1 PCMCIA card, 1 USB adapter • D. 1 PCMCIA card, 1 CF card

  32. Question 12 • 12. You have configured an access point in a small office and are concerned about hackers intruding on your wireless network. What settings will you adjust (from the manufacturer’s default settings) on the unit to address this potential problem? Choose all that apply. • A. Detachable antennas • B. MAC Filtering • C. Radio card position • D. Output power • E. WEP configuration

  33. Question 13 • 13. Which of the following are common security options that most wireless residential gateways include? Choose all that apply. • A. PPPoE – Point-to-Point Protocol over Ethernet • B. Virtual Servers • C. Routing • D. PAT – Port Address Translation • E. VPN Client or VPN Client Passthrough

  34. Question 14 • 14. Which of the following are wired connectivity options that a wireless bridge can include? Choose all that apply. • A. 10baseTx • B. 10baseFL • C. 10/100baseTx • D. 1000baseSX • E. 100baseFx

  35. Question 15 • 15. A workgroup bridge is a(n) ______ device. • A. Client • B. Infrastructure • C. Gateway • D. Antenna

  36. Question 16 • 16. Which one of the following is not a hardware or software option on a wireless bridge? • A. Fixed or detachable antennas • B. Advanced filtering capabilities • C. Removable (modular) radio cards • D. Full duplex radio links • E. Varied Types of Wired Connectivity

  37. Question 17 • 17. Ethernet and serial converters are used with devices having which of the following physical connectivity? Choose all that apply. • A. 9-pin serial ports • B. Ethernet ports • C. USB Ports • D. Parallel Ports

  38. Question 18 • 18. Why is an access point considered a portal? • A. An access point allows client connectivity from an 802.11 network to either • 802.3 or 802.5 networks • B. An access point always connects users to the Internet • C. An access point connects clients to one another • D. An access point is a gateway to another collision domain

  39. Question 1 • 19. The statement that an access point is a half duplex wireless device is which one of the following? • A. Always true • B. Always false • C. Dependent on the maker of the access point

  40. Question 1 • 20. A USB adapter is used with which type of wireless LAN device? • A. Gateway • B. Access point • C. Bridge • D. Client • E. Converter

  41. The End

More Related