Deck 6: Wireless Networking

Full screen (f)
exit full mode
Question
NFC tags are very expensive and cannot be purchased blank,requiring them to be pre-loaded.
Use Space or
up arrow
down arrow
to flip the card.
Question
What 802.11 frame type is involved in association and reassociation,including probe and beacon frames?

A)management frames
B)control frames
C)data frames
D)extended frames
Question
The WPS PIN is vulnerable to brute force attacks.
Question
Which of the following is not a valid wireless network topology?

A)bus
B)infrastructure
C)mesh
D)ad hoc
Question
Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:

A)5.1 GHz
B)5.3 GHz
C)5.4 GHz
D)5.9 GHz
Question
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?

A)ifconfig
B)iwconfig
C)wlanconfig
D)ipconfig
Question
Which 802.11 standard was the first to utilize the 5 GHz band?

A)802.11b
B)802.11a
C)802.11g
D)802.11n
Question
What signal propagation phenomena causes the diffusion,or the reflection in multiple different directions,of a signal?

A)reflection
B)bounce
C)diffraction
D)scattering
Question
Ideally,stations must remain within what range of an access point in order to maintain optimal transmission speeds?

A)100 feet
B)200 feet
C)300 feet
D)600 feet
Question
What is the maximum theoretical throughput of 802.11n?

A)54 Mbps
B)65 Mbps
C)600 Mbps
D)1.3 Gbps
Question
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?

A)reflection
B)bounce
C)diffraction
D)scattering
Question
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities,and operates on the 5 GHz band?

A)802.11a
B)802.11b
C)802.11n
D)802.11ac
Question
Which 802.11 frame type is related to medium access and data delivery,and includes ACK and RTS/CTS frames?

A)management frames
B)control frames
C)data frames
D)extended frames
Question
How many address fields exist in an 802.11 frame?

A)2
B)3
C)4
D)6
Question
In IEEE terminology,a group of stations that share an access point are said to be part of what option below?

A)extended service set
B)basic service set
C)modified service set
D)generic service set
Question
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?

A)broadcast frame
B)hello packet
C)beacon frame
D)announcement message
Question
At what layer of the OSI model do the 802.11 standards vary?

A)Physical layer
B)Network layer
C)Data link layer
D)Transport layer
Question
All wireless signals are carried through the air by electromagnetic waves.
Question
Unlike wired signals,wireless signals originate from electrical current traveling along a capacitor.
Question
Multipath signaling is a significant cause of fading.
Question
What two terms describe a wireless network topology in which access points work as peer devices on the same network?

A)mesh WLAN
B)infrastructure WLAN
C)wireless gateway
D)wireless mesh network (WMN)
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
An 802.11 frame type that is responsible forcarrying data between stations.Two other frame typesinclude management frames,which are involved in associationand reassociation,and control frames,which are relatedto medium access and data delivery.
Question
The proportion of noise to the strength of a signal is called the _________________.
Question
How many data streams are used in 802.11ac Wave 2 devices?

A)2 data streams
B)3 data streams
C)4 data streams
D)8 data streams
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A security exploit in which a WPS PIN is discoveredby means of a brute force attack,giving the attackeraccess to the network's WPA2 key.The PIN feature in WPSshould be disabled if possible.
Question
All 802.11 standards use ______________ signaling,meaning a wireless station can only transmit or receive,but cannot do both simultaneously.
Question
At which two layers do wireless LANs operate?

A)Layer 1
B)Layer 2
C)Layer 3
D)Layer 4
Question
_________________ is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.
Question
Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data,or download data without permission?

A)bluesniffing
B)bluejacking
C)bluespoofing
D)bluesnarfing
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
The act of driving around an area while runninga laptop configured to detect and capture wireless datatransmissions.
Question
How does the 802.11 data frame indicate how a large packet should be fragmented?

A)It uses the preamble header
B)The frame check sequence dictates packet size
C)The sequence control field indicates how packets will be subdivided
D)The duration field determines how long the station can transmit a packet,which then determines how it is divided.
Question
The wireless spectrum,as defined by the FCC,spans between which two frequencies?

A)2 KHz
B)9 KHz
C)300 GHz
D)500 GHz
Question
What two frequencies are used for most wireless networks?

A)900 MHz
B)2.4 GHz
C)4.9 GHz
D)5 GHz
Question
__________________ is a form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A method used by wireless stations to detectthe presence of an access point.Using this method,the stationissues a probe to each channel in its frequency range andwaits for the access point to respond.
Question
In an 802.11 data frame,what is the size of the frame check sequence field?

A)2 bytes
B)4 bytes
C)6 bytes
D)8 bytes
Question
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?

A)MIMO
B)channel bonding
C)frame aggregation
D)radio duplexing
Question
What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?

A)600 Mbps
B)1.3 Gbps
C)3.47 Gbps
D)6.93 Gbps
Question
Access points that include routing functions are also called _______________.
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
In the context of wireless signal propagation,thephenomenon that occurs when an electromagnetic waveencounters an obstruction and splits into secondary waves.The secondary waves continue to propagate in the directionin which they were split.
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
The use of chalk to draw symbols on a sidewalkor wall within range of an access point.The symbols,patterned after marks that hobos devised to indicate hospitableplaces for food or rest,indicate the access point's SSIDand whether it's secured.
Question
Describe the 802.11a standard,and detail some of its history and advantages / disadvantages versus other 802.11 standards.
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
The throughput experienced at the applicationlevel,such as the quality of a video feed or the speed of aWeb page loading in the browser.
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A type of antenna that issues wirelesssignals along a single direction,or path.Also called adirectional antenna.
Question
Provide information on fading,and describe the different effects that fading can have on wireless transmissions.
Question
Explain the difference between a unidirectional antenna and an omnidirectional antenna.
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
An attack in which a Bluetooth connection isused to download data from a device without the owner'spermission.
Question
Elaborate on the three different types of wireless network topologies.
Question
Describe the hidden node problem,and explain how it can be mitigated.
Question
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A type of antenna that issues andreceives wireless signals with equal strength and clarity in alldirections.This type of antenna is used when many differentreceivers must be able to pick up the signal,or when thereceiver's location is highly mobile.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Wireless Networking
1
NFC tags are very expensive and cannot be purchased blank,requiring them to be pre-loaded.
False
2
What 802.11 frame type is involved in association and reassociation,including probe and beacon frames?

A)management frames
B)control frames
C)data frames
D)extended frames
A
3
The WPS PIN is vulnerable to brute force attacks.
True
4
Which of the following is not a valid wireless network topology?

A)bus
B)infrastructure
C)mesh
D)ad hoc
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:

A)5.1 GHz
B)5.3 GHz
C)5.4 GHz
D)5.9 GHz
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which command below can be used on Linux to modify the SSID of the access point you choose to associate with?

A)ifconfig
B)iwconfig
C)wlanconfig
D)ipconfig
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which 802.11 standard was the first to utilize the 5 GHz band?

A)802.11b
B)802.11a
C)802.11g
D)802.11n
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
What signal propagation phenomena causes the diffusion,or the reflection in multiple different directions,of a signal?

A)reflection
B)bounce
C)diffraction
D)scattering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Ideally,stations must remain within what range of an access point in order to maintain optimal transmission speeds?

A)100 feet
B)200 feet
C)300 feet
D)600 feet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What is the maximum theoretical throughput of 802.11n?

A)54 Mbps
B)65 Mbps
C)600 Mbps
D)1.3 Gbps
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?

A)reflection
B)bounce
C)diffraction
D)scattering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities,and operates on the 5 GHz band?

A)802.11a
B)802.11b
C)802.11n
D)802.11ac
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which 802.11 frame type is related to medium access and data delivery,and includes ACK and RTS/CTS frames?

A)management frames
B)control frames
C)data frames
D)extended frames
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
How many address fields exist in an 802.11 frame?

A)2
B)3
C)4
D)6
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
In IEEE terminology,a group of stations that share an access point are said to be part of what option below?

A)extended service set
B)basic service set
C)modified service set
D)generic service set
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What is the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point?

A)broadcast frame
B)hello packet
C)beacon frame
D)announcement message
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
At what layer of the OSI model do the 802.11 standards vary?

A)Physical layer
B)Network layer
C)Data link layer
D)Transport layer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
All wireless signals are carried through the air by electromagnetic waves.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Unlike wired signals,wireless signals originate from electrical current traveling along a capacitor.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Multipath signaling is a significant cause of fading.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What two terms describe a wireless network topology in which access points work as peer devices on the same network?

A)mesh WLAN
B)infrastructure WLAN
C)wireless gateway
D)wireless mesh network (WMN)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
An 802.11 frame type that is responsible forcarrying data between stations.Two other frame typesinclude management frames,which are involved in associationand reassociation,and control frames,which are relatedto medium access and data delivery.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The proportion of noise to the strength of a signal is called the _________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
How many data streams are used in 802.11ac Wave 2 devices?

A)2 data streams
B)3 data streams
C)4 data streams
D)8 data streams
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A security exploit in which a WPS PIN is discoveredby means of a brute force attack,giving the attackeraccess to the network's WPA2 key.The PIN feature in WPSshould be disabled if possible.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
All 802.11 standards use ______________ signaling,meaning a wireless station can only transmit or receive,but cannot do both simultaneously.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
At which two layers do wireless LANs operate?

A)Layer 1
B)Layer 2
C)Layer 3
D)Layer 4
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
_________________ is an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following are two different types of attacks against Bluetooth connections that can be used to send unsolicited data,or download data without permission?

A)bluesniffing
B)bluejacking
C)bluespoofing
D)bluesnarfing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
The act of driving around an area while runninga laptop configured to detect and capture wireless datatransmissions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
How does the 802.11 data frame indicate how a large packet should be fragmented?

A)It uses the preamble header
B)The frame check sequence dictates packet size
C)The sequence control field indicates how packets will be subdivided
D)The duration field determines how long the station can transmit a packet,which then determines how it is divided.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The wireless spectrum,as defined by the FCC,spans between which two frequencies?

A)2 KHz
B)9 KHz
C)300 GHz
D)500 GHz
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What two frequencies are used for most wireless networks?

A)900 MHz
B)2.4 GHz
C)4.9 GHz
D)5 GHz
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
__________________ is a form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A method used by wireless stations to detectthe presence of an access point.Using this method,the stationissues a probe to each channel in its frequency range andwaits for the access point to respond.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
In an 802.11 data frame,what is the size of the frame check sequence field?

A)2 bytes
B)4 bytes
C)6 bytes
D)8 bytes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?

A)MIMO
B)channel bonding
C)frame aggregation
D)radio duplexing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?

A)600 Mbps
B)1.3 Gbps
C)3.47 Gbps
D)6.93 Gbps
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Access points that include routing functions are also called _______________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
In the context of wireless signal propagation,thephenomenon that occurs when an electromagnetic waveencounters an obstruction and splits into secondary waves.The secondary waves continue to propagate in the directionin which they were split.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
The use of chalk to draw symbols on a sidewalkor wall within range of an access point.The symbols,patterned after marks that hobos devised to indicate hospitableplaces for food or rest,indicate the access point's SSIDand whether it's secured.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the 802.11a standard,and detail some of its history and advantages / disadvantages versus other 802.11 standards.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
The throughput experienced at the applicationlevel,such as the quality of a video feed or the speed of aWeb page loading in the browser.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A type of antenna that issues wirelesssignals along a single direction,or path.Also called adirectional antenna.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Provide information on fading,and describe the different effects that fading can have on wireless transmissions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain the difference between a unidirectional antenna and an omnidirectional antenna.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
An attack in which a Bluetooth connection isused to download data from a device without the owner'spermission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Elaborate on the three different types of wireless network topologies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the hidden node problem,and explain how it can be mitigated.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Matching
Match each correct item with the statement below.
a.active scanning
b.bluesnarfing
c.data frame
d.diffraction
e.goodput
f.omnidirectional antenna
g.unidirectional antenna
h.war chalking
i.war driving
j.WPS attack
A type of antenna that issues andreceives wireless signals with equal strength and clarity in alldirections.This type of antenna is used when many differentreceivers must be able to pick up the signal,or when thereceiver's location is highly mobile.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.