You are on page 1of 21

Test Bank for Network Guide to Networks 8th Edition by West

Test Bank for Network Guide to Networks 8th Edition


by West

To download the complete and accurate content document, go to:


https://testbankbell.com/download/test-bank-for-network-guide-to-networks-8th-editio
n-by-west/

Visit TestBankBell.com to get complete for all chapters


Name: Class: Date:

Chapter 6 - Wireless Networking


1. All wireless signals are carried through the air by electromagnetic waves.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Characteristics of Wireless Transmissions
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

2. NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

3. The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

4. Infrared technology utilizes an LED that emits light with shorter wavelengths than red light.
a. True
b. False
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:

Chapter 6 - Wireless Networking


ANSWER: False
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

5. The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or
WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

6. Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

7. The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
a. True
b. False
ANSWER: True
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:

Chapter 6 - Wireless Networking


DIFFICULTY: Easy
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

8. Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

9. An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

10. The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: True / False
Copyright Cengage Learning. Powered by Cognero. Page 3
Name: Class: Date:

Chapter 6 - Wireless Networking


HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

11. Diffraction has what affect on a wireless signal's propagation?


a. The signal is redirected into multiple directions.
b. The signal is split into secondary waves that continue in the direction in which they split.
c. The signal is returned back towards the source of the original signal.
d. The signal is completely absorbed by the diffracting material.
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Characteristics of Wireless Transmissions
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

12. How does refraction affect the propagation of a wireless transmission?


a. It distorts the signal as it travels into and through a different transmission medium.
b. It splits the signal into secondary waves that continue in the direction in which they split.
c. It causes the signal to be returned back towards the source of the origin.
d. It causes the signal to be absorbed by the refracting material.
ANSWER: a
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Characteristics of Wireless Transmissions
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

13. In Linux, what command can be used for viewing and setting wireless interface parameters?
a. ifconfig
b. iwconfig
c. wlanconf
d. wifid
ANSWER: b

Copyright Cengage Learning. Powered by Cognero. Page 4


Name: Class: Date:

Chapter 6 - Wireless Networking


POINTS: 1
DIFFICULTY: Easy
REFERENCES: Implementing a Wi-Fi Network
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.4 - Implement a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

14. At what layer of the OSI model do the 802.11 standards vary?
a. Physical layer
b. Network layer
c. Data link layer
d. Transport layer
ANSWER: a
POINTS: 1
DIFFICULTY: Easy
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

15. What special signal is issued periodically from an AP and contains the network transmission rate and
service set identifier (SSID), as well as other information needed for a computer to associate with the AP?
a. broadcast frame
b. beacon frame
c. announcement packet
d. alert message
ANSWER: b
POINTS: 1
DIFFICULTY: Easy
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

16. In IEEE terminology, a group of stations that share an access point are said to be part of which of the
following?
Copyright Cengage Learning. Powered by Cognero. Page 5
Name: Class: Date:

Chapter 6 - Wireless Networking


a. extended service set
b. basic service set
c. modified service set
d. generic service set
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

17. What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
a. management frames
b. control frames
c. data frames
d. extended frames
ANSWER: a
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

18. Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS
frames?
a. management frames
b. control frames
c. data frames
d. extended frames
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:

Chapter 6 - Wireless Networking


LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

19. How does the 802.11 data frame indicate how a large packet should be fragmented?
a. It uses the preamble header to estimate the ideal packet size.
b. The frame check sequence dictates the calculated packet size.
c. The sequence control field indicates how packets will be subdivided.
d. The duration field determines how long the station can transmit a packet, which then determines how
it is divided.
ANSWER: c
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

20. The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what
802.11 innovation?
a. multiple input-multiple output (MIMO)
b. channel bonding
c. frame aggregation
d. spread spectrum frequency hopping
ANSWER: a
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

21. In an 802.11 data frame, what is the size of the frame check sequence field?
a. 2 bytes
b. 4 bytes
c. 6 bytes
d. 8 bytes
ANSWER: c
Copyright Cengage Learning. Powered by Cognero. Page 7
Name: Class: Date:

Chapter 6 - Wireless Networking


POINTS: 1
DIFFICULTY: Difficult
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

22. How many data streams are used in 802.11ac Wave 2 devices?
a. 2 data streams
b. 3 data streams
c. 4 data streams
d. 8 data streams
ANSWER: c
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

23. The wireless spectrum, as defined by the FCC, spans between which two frequencies?
a. 9 kHz and 300 GHz
b. 125 kHz and 150 GHz
c. 3 kHz and 500 GHz
d. 3 MHz and 300 GHz
ANSWER: a
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Characteristics of Wireless Transmissions
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

24. The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?
a. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Copyright Cengage Learning. Powered by Cognero. Page 8


Name: Class: Date:

Chapter 6 - Wireless Networking


b. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
c. Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)
d. Carrier Sense Single Access with Collision Adaptation (CSSA/CA)
ANSWER: a
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

25. 802.11ac Wave 2 devices can theoretically support how much maximum throughput?
a. 600 Mbps
b. 1.3 Gbps
c. 3.47 Gbps
d. 6.93 Gbps
ANSWER: c
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

26. A wireless node that is in active scanning mode transmits what special type of frame in order to find
available access points?
a. beacon frame
b. association request
c. probe frame
d. ping frame
ANSWER: c
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations

Copyright Cengage Learning. Powered by Cognero. Page 9


Name: Class: Date:

Chapter 6 - Wireless Networking


DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

27. What type of device can be used to assess the quality of a wireless signal?
a. Wi-Fi analyzer
b. spectrum analyzer
c. channel scanner
d. frequency hopper
ANSWER: b
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Troubleshooting Wi-Fi Networks
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

28. What scenario describes an evil twin attack?


a. A malicious access point is configured with the SSID of a non-malicious public access point.
b. An attacker is actively attempting to brute force the PIN of a WPS enabled access point.
c. A hacker is actively sending wireless probes to discover available wireless networks.
d. A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.
ANSWER: a
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

29. Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?
a. Class 1
b. Class 2
c. Class A
d. Class X
ANSWER: a
POINTS: 1
DIFFICULTY: Easy

Copyright Cengage Learning. Powered by Cognero. Page 10


Name: Class: Date:

Chapter 6 - Wireless Networking


REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

30. Healing messages are a feature of what smart home protocol?


a. ZigBee
b. Bluetooth
c. Z-Wave
d. ANT+
ANSWER: c
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

31. When using RFID, what is an ARPT (Active Reader Passive Tag)?
a. It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be
read remotely.
b. It is a tag that requires an active reader, but still contains a battery in the tag.
c. It is a tag that is activated by an active reader, and uses power from the reader's radio to power its
transmission.
d. It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.
ANSWER: c
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

32. Near-field communication devices send data at what fixed frequency?


a. 8.65 MHz
b. 13.56 MHz
Copyright Cengage Learning. Powered by Cognero. Page 11
Name: Class: Date:

Chapter 6 - Wireless Networking


c. 21.39 MHz
d. 47.1 MHz
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Wireless Standards for the IoT (Internet of Things)
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

33. What is the purpose of the Layer 2 LLC sublayer?


a. It is used to handle multiplexing, flow and error control, and reliability.
b. It is used to manage MAC addresses in message frames.
c. It performs management of the physical layer's modulation techniques.
d. It is used to manage low-level encryption on a network.
ANSWER: a
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

34. What optional protocol can be used in 802.11 to reserve the medium for one node's use?
a. RTS/CTS (Request to Send/Clear to Send)
b. RAR/CTU (Reserve Airtime Request/Clear to Use)
c. HA/RA (Hold Airtime/Reserved Airtime)
d. RT/FT (Request Time/Fair Time)
ANSWER: a
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

Copyright Cengage Learning. Powered by Cognero. Page 12


Name: Class: Date:

Chapter 6 - Wireless Networking


35. In an 802.11 data frame, what is the maximum amount of data that can be sent?
a. 1500 bytes
b. 2312 bytes
c. 4582 bytes
d. 9000 bytes
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

36. Which of the following statements regarding the 802.11ac standard is NOT accurate?
a. The standard was officially approved in early 2014.
b. 802.11ac access points function more like a hub than a switch.
c. 802.11ac access points can handle multiple transmissions at one time over the same frequency.
d. 802.11ac operates on the 5-GHz band.
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

37. You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client
from connecting to the network?
a. The client has a wireless profile configured for the "campus" SSID, but the access point is
broadcasting the "CAMPUS" SSID.
b. The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g.
c. The client is using a network adapter with outdated firmware.
d. The client is only able to get line of sight with an omnidirectional antenna.
ANSWER: a
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Troubleshooting Wi-Fi Networks

Copyright Cengage Learning. Powered by Cognero. Page 13


Name: Class: Date:

Chapter 6 - Wireless Networking


QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

38. When troubleshooting wireless issues, what statement is accurate?


a. A WPA key can be used to associate with a WEP configured access point.
b. Access points that use overlapping channels can cause interference with each other if they are too
close.
c. Simultaneous wired and wireless network connections do not affect the ability to communicate on
the network.
d. Access point power levels should always be configured to output as much power as possible.
ANSWER: b
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Troubleshooting Wi-Fi Networks
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

39. If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify
security threats, what tool should you use?
a. spectrum analyzer
b. protocol analyzer
c. Wi-Fi analyzer
d. air scanner
ANSWER: c
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Troubleshooting Wi-Fi Networks
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

40. Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of
service before being connected. What is this an example of?
a. guest network profile
Copyright Cengage Learning. Powered by Cognero. Page 14
Name: Class: Date:

Chapter 6 - Wireless Networking


b. captive portal
c. WPA2-Enterprise
d. browser hijacking
ANSWER: b
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

41. What are some of the different types of wireless topologies that can be created?
ANSWER: Some of the different types of wireless topologies are as follows:
* ad hoc-A small number of nodes closely positioned transmit directly to each other without
an intervening connectivity device.
* infrastructure-An intervening connectivity device, a WAP (wireless access point) or AP
(access point), accepts wireless signals from multiple nodes and retransmits them to the rest
of the network. To cover its intended range, an access point must have sufficient power and
be strategically placed so that all connected nodes can communicate with it.
* mesh-Several access points work as peer devices on the same network, where the AP
devices cooperate to provide more fault tolerant network access to clients. A wireless
controller might be used only initially to configure the APs, or the APs might remain
connected to the wireless controller for continued management.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Implementing a Wi-Fi Network
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.4 - Implement a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

42. Describe the 802.11a standard, and detail some of its history and advantages / disadvantages versus other
802.11 standards.
ANSWER: Although the 802.11a task group began its standards work before the 802.11b group, 802.11a
was released after 802.11b. The higher throughput of 802.11a, as compared with 802.11b, is
attributable to its use of higher frequencies, its unique method of modulating data, and more
available bandwidth. Perhaps most significant is that the 5-GHz band is not as congested as
the 2.4-GHz band. Thus, 802.11a signals are less likely to suffer interference from
microwave ovens, cordless phones, motors, and other (incompatible) wireless LAN signals.
However, higher-frequency signals require more power to transmit, and they travel shorter
distances than lower-frequency signals. As a result, 802.11a networks require a greater
density of access points between the wired LAN and wireless clients to cover the same

Copyright Cengage Learning. Powered by Cognero. Page 15


Name: Class: Date:

Chapter 6 - Wireless Networking


distance that 802.11b networks cover. The additional access points, as well as the nature of
802.11a equipment, make this standard more expensive than either 802.11b or 802.11g. For
this and other reasons, 802.11a is rarely preferred.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

43. What is the hidden node problem, and how can it be mitigated?
ANSWER: The hidden node problem occurs where a node is not visible to other nodes on the other side
of a coverage area. One way to ensure that packets are not inhibited by other transmissions is
to reserve the medium for one station's use. In 802.11, this can be accomplished through the
optional RTS/CTS (Request to Send/Clear to Send) protocol. RTS/CTS enables a source
node to issue an RTS signal to an access point requesting the exclusive opportunity to
transmit. If the access point agrees by responding with a CTS signal, the access point
temporarily suspends communication with all stations in its range and waits for the source
node to complete its transmission.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: 802.11 WLAN Standards
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

44. Most wireless devices use one of two technologies to avoid interference. What are these technologies?
ANSWER: The two technologies used are as follows:
* FHSS (frequency hopping spread spectrum)-Short bursts of data are transmitted on a
particular frequency within the band and the next burst goes to the next frequency in the
sequence. Frequency hopping can happen hundreds of times a second. FHSS is cheaper to
implement than DSSS and performs better than DSSS in crowded, indoor environments.
* DSSS (direct sequence spread spectrum)-Data streams are divided and encoded into small
chunks, called chips, which are spread over all available frequencies within one of three,
wide channels, all at the same time. The process of dividing and encoding the data is called
chipping, and the spreading ratio used to transform the data is called the chipping code,
which is unique to each device. DSSS uses the available bandwidth more efficiently than
FHSS and tends to have a higher throughput.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Characteristics of Wireless Transmissions
QUESTION TYPE: Subjective Short Answer
Copyright Cengage Learning. Powered by Cognero. Page 16
Name: Class: Date:

Chapter 6 - Wireless Networking


HAS VARIABLES: False
LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

45. Radiation patterns can be used to classify antennas into what two basic categories?
ANSWER: The two basic categories that antennas can be classified under are:
* unidirectional antenna (also called a directional antenna)-Issues wireless signals along a
single direction. This type is used when the source needs to communicate with one
destination, as in a point-to-point link, or in a specific area. A satellite downlink (for
example, the kind used to receive digital TV signals) uses directional antennas
* omnidirectional antenna-Issues and receives wireless signals with equal strength and clarity
in all directions. This type is used when many different receivers must be able to pick up the
signal in many directions, or when the receiver's location is highly mobile. TV and radio
stations use omnidirectional antennas, as do most towers that transmit cellular signals.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Characteristics of Wireless Transmissions
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

46. Why should an access point not always utilize all the power it has for broadcasting wireless signals?
ANSWER: Each access point's power level, or the strength of the signal the access point emits, should be
optimized for the geographic area covered by that AP. Power levels that are too low will
result in dropped signals as clients roam to the peripheral areas of the AP's range. However,
maxed out power levels will result in too much overlap between AP coverage areas, causing
clients from other coverage areas to attempt to connect with APs that are farther away but
transmitting the stronger signal.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Troubleshooting Wi-Fi Networks
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

47. When deciding antenna types, why might the use of an omnidirectional antenna be inadvisable?
ANSWER: You might think that omnidirectional antennas would nearly always be the best
choice when setting up Wi-Fi coverage. The idea is to place the AP in the center of its
coverage area, then send the signal out in all directions. However, in many situations,
installing unidirectional antennas instead will enhance a signal's availability, directing
Copyright Cengage Learning. Powered by Cognero. Page 17
Name: Class: Date:

Chapter 6 - Wireless Networking


the signal right where you need it while not wasting a signal in areas where you don't.
For example, suppose a company installs an omnidirectional antenna near a factory's
30-foot high ceiling. Because the antenna's signal is broadcast in all directions from
its location, distributing its signal strength in a spherical shape, the best possible
signal would only be available to workers who could walk on the ceiling-obviously,
that's not a viable situation. To be useful, the signal needs to be directed down to the
floor. A unidirectional antenna, in this case, can be positioned up high and pointed
down to create a dome-shaped coverage that spreads out as it nears the plant floor
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Troubleshooting Wi-Fi Networks
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 2/2/2018 2:56 PM

48. What is the difference between war driving and war chalking?
ANSWER: In war driving, a hacker searches for unprotected wireless networks by driving around with a
laptop or smartphone configured to receive and capture wireless data transmissions. (The
term is derived from the term war dialing, which is a similar tactic involving old, dial-up
modems.) War driving is surprisingly effective for obtaining private information. War
chalking occurs when a hacker discovers vulnerable access points, and makes this
information public by drawing symbols with chalk on the sidewalk or wall within range of a
wireless network. The symbols, patterned after marks that hobos devised to indicate
hospitable places for food or rest, indicate the access point's SSID and whether it's secured.
Alternatively, many websites offer maps of these open networks, as reported by war drivers.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

49. How does configuration of wireless clients for wireless access in an enterprise environment differ from
normal setup?
ANSWER: In an enterprise environment, configuring clients for wireless access to the network
can entail a much more involved, two-part process:
* on-boarding-Users or network technicians install a specific app, called an agent, on a user's
device, whether the device is a smartphone, laptop, or tablet. This gives the device trusted
access to certain portions of the network. Access to email services, file-sharing services, and
certain network administrative features might all be controlled by the device's permission
levels enabled by on-boarding that device.
* off-boarding-The reverse procedure involves removing the agent. For security purposes,
Copyright Cengage Learning. Powered by Cognero. Page 18
Test Bank for Network Guide to Networks 8th Edition by West

Name: Class: Date:

Chapter 6 - Wireless Networking


network administrators need a feature that allows them to do this remotely, in case a device is
lost or stolen. This feature, called a remote wipe, clears a device of all important information,
permissions, and apps without having physical access to the device. It might even allow you
to completely disable the device, making any network or data access impossible.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Implementing a Wi-Fi Network
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.4 - Implement a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

50. Why should the WPS PIN feature be avoided if possible?


ANSWER: WPS (Wi-Fi Protected Setup) is a user-friendly but not very secure-security setting available
on some consumer-grade APs. Part of the security involves requiring a PIN (personal
identification number) in order to access the AP's settings or to associate a new device with
the network. The problem is that the PIN can be easily cracked through a brute force attack,
which means simply trying numerous possible character combinations to find the correct
combination. This gives the attacker access to the network's WPA2 key.
POINTS: 1
DIFFICULTY: Difficult
REFERENCES: Wi-Fi Network Security
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network
DATE CREATED: 1/27/2018 1:21 PM
DATE MODIFIED: 1/27/2018 1:21 PM

Copyright Cengage Learning. Powered by Cognero. Page 19

Visit TestBankBell.com to get complete for all chapters

You might also like