Deck 12: Operational Support and Wireless Convergence
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 12: Operational Support and Wireless Convergence
1
The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.
A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
A
2
WPA replaces WEP with an encryption technology called ____.
A) Secure Shell (SSH)
B) Temporal Key Integrity Protocol (TKIP)
C) Message Integrity Check (MIC)
D) Message Authentication Code (MAC)
A) Secure Shell (SSH)
B) Temporal Key Integrity Protocol (TKIP)
C) Message Integrity Check (MIC)
D) Message Authentication Code (MAC)
B
3
WiMAX is based on the IEEE ____ standard approved in June 2004.
A) 802.3
B) 802.16
C) 802.32
D) 802.56
A) 802.3
B) 802.16
C) 802.32
D) 802.56
B
4
____, or controlling changes made to the WLAN after installation, is another key element of operational support.
A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
In a wireless LAN access control is often performed by enterprise ____.
A) wireless gateways
B) wireless probes
C) router probes
D) AP gateways
A) wireless gateways
B) wireless probes
C) router probes
D) AP gateways
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.
A) WIDS
B) IDS
C) WLAN management system
D) WIPS
A) WIDS
B) IDS
C) WLAN management system
D) WIPS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ allows computers and network equipment to gather data about network performance.
A) FTP
B) SNMP
C) SFTP
D) L2TP
A) FTP
B) SNMP
C) SFTP
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
All networks require effective operational support to ensure that everything functions as intended.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ constantly monitors the radio frequency for attacks.
A) WIDS
B) SNMP
C) WLAN management system
D) SFTP system
A) WIDS
B) SNMP
C) WLAN management system
D) SFTP system
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.
A) Fixed WiMAX
B) 3G
C) Mobile WiMAX
D) DSL WiMAX
A) Fixed WiMAX
B) 3G
C) Mobile WiMAX
D) DSL WiMAX
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.
A) pedagogical
B) neurological
C) visual
D) kinesthetic
A) pedagogical
B) neurological
C) visual
D) kinesthetic
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
All computer users share responsibility for protecting the assets of an organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.
A) VPN
B) filtering
C) segmentation
D) firewalling
A) VPN
B) filtering
C) segmentation
D) firewalling
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.
A) RF channel
B) coverage area
C) WLAN baseline
D) AP area
A) RF channel
B) coverage area
C) WLAN baseline
D) AP area
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
At the heart of any secure WLAN is ____.
A) traffic filtering
B) protocol monitoring
C) education and training
D) strong encryption
A) traffic filtering
B) protocol monitoring
C) education and training
D) strong encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.
A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.
A) mobile
B) fast
C) scalable
D) global
A) mobile
B) fast
C) scalable
D) global
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The first generation of wireless cellular technology is known as ____.
A) 0G
B) 1G
C) 2.5G
D) 3G
A) 0G
B) 1G
C) 2.5G
D) 3G
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What elements can be identified using WLAN monitoring tools?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Why is operational support important for a WLAN?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
How can wireless segmentation be accomplished?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Briefly describe traffic filtering.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Briefly describe role-based access control.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.
A) 1G
B) 2G
C) 2.5G
D) 3G
A) 1G
B) 2G
C) 2.5G
D) 3G
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ is an interim step between 2G and 3G digital cellular networks.
A) 2.1G
B) 2i.G
C) 2.5G
D)2.Ig
A) 2.1G
B) 2i.G
C) 2.5G
D)2.Ig
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What are the types of changes that can be made to an WLAN?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.
A) packet-switch
B) frame-switch
C) unit-switch
D) circuit-switch
A) packet-switch
B) frame-switch
C) unit-switch
D) circuit-switch
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
How does RADIUS work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.
A) circuit-switched
B) packet-switched
C) channel-switched
D) path-switched
A) circuit-switched
B) packet-switched
C) channel-switched
D) path-switched
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The IEEE ____ standard would permit users to roam up to 15 kilometers and to deliver those high-speed rates to mobile users even when they are traveling at speeds up to 250 kilometers per hour (155 miles per hour).
A) 802.3
B) 802.16
C) 802.17i
D) 802.20
A) 802.3
B) 802.16
C) 802.17i
D) 802.20
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Why is it important to train and educate all network users?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the characteristics of 3G technology for data communications?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck