Exam 12: Operational Support and Wireless Convergence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How can wireless segmentation be accomplished?

(Essay)
4.8/5
(43)

All networks require effective operational support to ensure that everything functions as intended.

(True/False)
4.9/5
(35)

WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.

(True/False)
4.7/5
(24)

The ____ is an interim step between 2G and 3G digital cellular networks.

(Multiple Choice)
4.7/5
(38)

Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

(Multiple Choice)
4.9/5
(35)

IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

(Multiple Choice)
4.8/5
(45)

A ____ constantly monitors the radio frequency for attacks.

(Multiple Choice)
4.8/5
(29)

WPA replaces WEP with an encryption technology called ____.

(Multiple Choice)
4.8/5
(32)

A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.

(Short Answer)
4.7/5
(35)

A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.

(True/False)
4.9/5
(37)

What are the characteristics of 3G technology for data communications?

(Essay)
4.8/5
(35)

The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.

(Multiple Choice)
4.8/5
(41)

A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.

(Multiple Choice)
4.9/5
(45)
Match each item with an statement below:
specifies information that access points need to exchange to support WLAN roaming.
Network segment
verifies that the person requesting access to the network is who they claim to be.
2G cellular telephony
subset of a larger network.
Wireless authentication
Correct Answer:
Verified
Premises:
Responses:
specifies information that access points need to exchange to support WLAN roaming.
Network segment
verifies that the person requesting access to the network is who they claim to be.
2G cellular telephony
subset of a larger network.
Wireless authentication
adds mobility components to the Fixed WiMAX standard.
Traffic filtering
original IEEE 802.11 encryption mechanism.
IEEE 802.11F
used circuit-switched digital networks and started in the early 1990s.
WLAN management system
standard network management protocol for both wired and wireless networks.
SNMP
restricts the traffic on a network based on specific criteria.
Wired equivalent privacy (WEP)
uses discovery tools to continuously monitor the RF for attacks
Mobile WiMAX
(Matching)
4.8/5
(26)

The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.

(Multiple Choice)
4.8/5
(31)

With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.

(Multiple Choice)
4.8/5
(30)

In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.

(Multiple Choice)
4.8/5
(33)

A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.

(Short Answer)
4.7/5
(44)

____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.

(Multiple Choice)
4.9/5
(38)

How does RADIUS work?

(Essay)
4.8/5
(40)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)