You are on page 1of 2

Assessment System

Skip to Time Left | Skip to Navigation | Skip to Assessment Items

Take Assessment - DHomesb Chapter 7 - CCNA Discovery: Networking for Home and
Small Businesses (Version 4.0)

Time Remaining:
Showing 2 of 2 Next> Page: Introduction 1 2 Submit GO <Prev

16 What are two authentication methods that an access point could use? (Choose
two.)

WEP
WPA
EAP
ASCII
pre-shared keys

17 Which WLAN component is commonly referred to as an STA?

cell
antenna
access point
wireless bridge
wireless client

18 What does the Wi-Fi logo indicate about a wireless device?

IEEE has approved the device.


The device is interoperable with all other wireless standards.
The device is interoperable with other devices of the same standard that also
display the Wi-Fi logo.
The device is backwards compatible with all previous wireless standards.

19 A technician has been asked to provide wireless connectivity to the wired


Ethernet network of a building. Which three factors affect the number of access
points needed? (Choose three.)

the size of the building


the number of solid interior walls in the building
the presence of microwave ovens in several offices
the encryption method used on the wireless network
the use of both Windows and Appletalk operating systems
the use of shortwave or infrared on the AP
20

Refer to the graphic. In the Wireless menu option of a Linksys integrated router,
what does the Network Mode option Mixed mean?

The router supports encryption and authentication.


The router supports both wired and wireless connections.
The router supports 802.11b, 802.11g, and 802.11n devices.
The router supports connectivity through infrared and radio frequencies.

21 Which statement is true concerning an ad-hoc wireless network?

created by connecting wireless clients in a peer-to-peer network


created by connecting wireless clients to a single, centralized AP
created by connecting multiple wireless basic service sets through a distribution
system
created by connecting wireless clients to a wired network using an ISR

Showing 2 of 2 Next> Page: Introduction 1 2 Submit GO <Prev

All content copyright 1992-2007 Cisco Systems, Inc. Privacy Statement and
Trademarks

You might also like