978-0789759825 Chapter 8

subject Type Homework Help
subject Pages 6
subject Words 1212
subject Authors Anthony J. Sequeira, Michael D. Taylor

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CompTIA Network+ N10-007 Cert Guide
Chapter 8 Wireless LANs
1) The wireless device that is marked X in the following image is a ________.
A) wireless access point
B) wireless router
C) wireless controller
D) wireless switch
2) The strength of the electromagnetic waves being radiated from an antenna is referred to as
gain, which involves a measurement of both direction and efficiency of a transmission. Gain is
commonly measured using the dBi unit of measure.
page-pf2
3) When a wireless channel uses more than one frequency, the transmission method is called a
________ spectrum.
A) broad
B) multi
C) long
D) spread
4) Which of the following is not a variation of spread-spectrum technology?
A) DSSS
B) FHSS
C) DFSS
D) OFDM
5) Which of the following wireless standards operate at a maximum bandwidth of less than 20
Mbps? (Choose two.)
A) 802.11
B) 802.11a
C) 802.11b
D) 802.11g
6) WLANs can be categorized based on their use of wireless APs. The three main categories are
________, ________, and ________.
A) HBSS, BSS, ESS
B) IBSS, BSS, RSS
C) HBSS, BSS, IBSS
D) IBSS, BSS, ESS
page-pf3
7) Which is not a security threat for WLANs?
A) Warchalking
B) Rogue access point
C) Wardialing
D) WEP and WPA security cracking
8) To protect WLAN traffic from eavesdroppers, a variety of security standards and practices
have been developed, including all of the following except what?
A) Enabling SSID broadcast
B) MAC address filtering
C) Preshared key
D) IEEE 802.1X
9) Which of the following is not a WLAN security standard?
A) WEP
B) WAP
C) WPA
D) WPA2
10) WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption.
page-pf4
11) WLAN security based on a PSK technology is called ________ mode.
A) personal
B) private
C) home
D) WEP
12) Which of the following are broad categories of wireless antenna that are based on coverage?
(Choose two.)
A) WLAN
B) SSID
C) Omnidirectional
D) Unidirectional
E) Wired Equivalent Protocol (WEP)
13) An omnidirectional antenna radiates power at relatively unequal power levels in all
directions (somewhat similar to the theoretical isotropic antenna).
14) WLANs use a technology called carrier sense multiple access collision detection
(CSMA/CD).
page-pf5
15) Which of the following is a variation of spread-spectrum technology use in wireless local-
area networks? (Choose three.)
A) WEP
B) Wi-Fi
C) WPA - 2
D) Direct-sequence spread spectrum (DSSS)
E) Frequency-hopping spread spectrum (FHSS)
F) Orthogonal frequency-division multiplexing (OFDM)
16) What is the 802.11 2.4-GHz band channel width?
A) 22 MHz
B) 40 MHz
C) 5 MHz
D) 12 MHz
17) Which channel is not one of the non-overlapping channels when using the 802.11 2.4-GHz
band?
A) 1
B) 5
C) 6
D) 11
page-pf6
18) What transmission method is used with IEEE 802.11ac?
A) DSSS
B) FHSS
C) OFDM
D) FHDM
19) Which IEEE standard is used to authenticate wireless clients?
A) 802.11i
B) 802.3ac
C) 802.2af
D) 802.1X
20) What is the encryption mechanism that is used with the WPA2 security standard?
A) AES
B) RC4
C) SHA-1
D) MD5

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.