You are on page 1of 10

Data Communications and Networking 3

1. Dashboard
2. My courses
3. MIS6314
4. Week 5: Wireless LANs
5. Assignment 004
Question 1
Correct
Mark 1.00 out of 1.00

Flag question
Question text
As discussed in wireless LAN technologies and standards, what wireless LAN technology
that is an IEEE 802.16 WWAN standard that provides wireless broadband access of up to
30mi (50km)?
Select one:
a.
Satellite broadband
b.
WIMAX
c.
WLAN
d.
Cellular broadband
Question 2
Correct
Mark 1.00 out of 1.00

Flag question
Question text
In wireless LAN standards what wireless LAN technology that is an IEEE 802.15 WPAN
standard; uses a device pairing process to communicate over distance up to .05 mile
(100m)?
Select one:
a.
WLAN
b.
None of the choices
c.
Bluetooth
d.
Wi-Fi
Question 3
Correct
Mark 1.00 out of 1.00

Flag question
Question text
In the understanding of wireless LAN technologies what wireless LAN technology that
operates in the range of a few feet (Bluetooth)?
Select one:
a.
WPAN
b.
Wi-fi(Wireless Fidelity)
c.
WLAN
d.
WIMAX
Clear my choice
Check

Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Among the listed below what advantage do a WLAN router offers vs. access point?
Select one:
a.
Stable connection
b.
Increase in users capacity
c.
Increase in range
d.
Increase in security
Question 5
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Among the 802.11 standards what is the maximum speed of 802.11a?
Select one:
a.
600Mb/s
b.
54Mb/s
c.
2Mb/s
d.
64Mb/s
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Among the listed below what organization that set or influence WLAN standards?
Select one:
a.
AWG
b.
APEC
c.
IEEE
d.
FBI
Question 7
Correct
Mark 1.00 out of 1.00

Flag question
Question text
What type of wireless attack that uses the method by flooding an AP with deauthentication
frames?
Select one:
a.
Jamming
b.
Man in the middle
c.
War Driving
d.
Packet Sniffing
Question 8
Correct
Mark 0.00 out of 1.00

Flag question
Question text
Devices in a WLAN infrastructure can directly send frames to each other. They can also send
frames to the AP, which can then in turn forward the frames to another WLAN device.
Select one:
True
False
Question 9
Correct
Mark 0.00 out of 1.00

Flag question
Question text
WLAN routers are also ideal in public areas, especially if there are multiple networks that are
accessible.
Select one:
True
False
Question 10
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Omnidirectional Antennas use parabolic reflectors, right angle deflectors, and panel
deflectors. It has a wide dispersion of more than 80 degrees and less than 120 degrees.
Select one:
True
False
Check

Data Communications and Networking 3


1. Dashboard
2. My courses
3. MIS6314
4. Week 5: Wireless LANs
5. Short Quiz 004
Question 1
Correct
Mark 1.00 out of 1.00

Flag question
Question text
In deploying wireless LAN, you have finished physically installing an access point on the
ceiling at your office. At a minimum, which parameter must be configured on the access
point in order to allow a wireless client to operate on it?
Select one:
a.
WEP
b.
SSID
c.
PSK
d.
AES
Question 2
Correct
Mark 1.00 out of 1.00

Flag question
Question text
In understanding wireless LAN technology and standards, what is the maximum data rate
specified for IEEE 802.11g WLANs?
Select one:
a.
54Mbps
b.
600Mbps
c.
2Mbps
d.
100Mbps
Question 3
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which tool uses a secret key and a mathematical formula to scramble the contents of the
WLAN frame?
a.
Validation Tool
b.
Intrusion Tool
c.
Encryption
d.
Mutual Authentication
Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The hackers can record the traffic to view it later, just like in packet sniffing and they can
even change the contents of files. Various types of malware can be inserted into these
packets, e-mail content could be changed, or the traffic could be dropped so that
communication is blocked. This type of attack is called _____________.

a.

Jamming

b.

WEP/WPA Attack

c.

Password Theft

d.

Man in the Middle Attack

Question 5
Correct

Mark 1.00 out of 1.00


Flag question

Question text
The senior network administrator discovers a rogue AP in the network. The rogue AP is
capturing traffic and then forwarding it on to the legitimate AP. What type of attack is this?

Select one:

a.

WEP/WPA attacks

b.

Ninja moves

c.

Jamming

d.

Man in the middle

Question 6
Correct

Mark 0.00 out of 1.00

Flag question

Question text
As discussed in wireless LAN security, an employee connects wirelessly to the company
network using a cell phone. The employee then configures the cell phone to act as a
wireless access point that will allow new employees to connect to the company network.
Which type of security threat best describes this situation?

Select one:

a.

cracking

b.

rogue access point


c.

denial of service

d.

Man in the middle

You might also like