Wireless LAN Technologies Final Exam - 504 Verified Questions

Page 1


Wireless LAN Technologies Final Exam

Course Introduction

Wireless LAN Technologies explores the principles, architectures, and protocols underlying wireless local area networks. The course covers key standards such as IEEE 802.11 (Wi-Fi), wireless network design and deployment, radio frequency fundamentals, security mechanisms, performance optimization, and troubleshooting techniques. Students gain hands-on experience configuring wireless devices, analyzing network traffic, and addressing real-world challenges in wireless communication. Emphasis is placed on emerging trends, interoperability, and best practices for secure and efficient wireless network operations in both home and enterprise environments.

Recommended Textbook

CWNA Guide to Wireless LANs Networking 2nd Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1032

Page 2

Chapter 1: Its a Wireless World

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20462

Sample Questions

Q1) Where can a RFID tag be read?

A) only when next to the scanner

B) anywhere within the range of a transmitted radio signal

C) only within the line of sight of the scanner

D) when physically connected to the scanner

Answer: B

Q2) Describe free space optics (FSO) wireless technology. Answer: FSO can transmit at speeds up to 1.25 Gbps (gigabits, or billion bits, per second) over a distance of 6.4 kilometers (4 miles). Transmissions are sent by low-powered infrared beams through the open air. These beams, which do not harm the human eye, are received by transceivers. Because it is a line-of-sight technology, the transceivers are mounted in the middle or upper floors of office buildings to provide a clear transmission path. However, unlike other wireless technologies such as WiMax that require the units to be located on an open roof, transceivers can be mounted behind a window in the existing offices.

Q3) It is well documented that high levels of RF can produce biological damage.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Wireless LAN Devices and Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20463

Sample Questions

Q1) What is IEEE 802.11n?

Answer: In September of 2004 the IEEE started working on a new standard to significantly increase the bandwidth of today's WLANs. Known as 802.11n, it will set standards for transmissions exceeding 100 Mbps. The 802.11n committee is evaluating over 60 different proposals regarding how to accomplish this. The top speed of the 802.11n standard will be anywhere from 100 Mbps to 500 Mbps, depending on which proposal is approved. Although the final proposal might not be ratified until the year 2006, devices that follow one of the proposed options will appear much earlier than that. This is because there is a significant time lag between the time the final proposal is published and when it is ultimately ratified by the IEEE. This occurred with the 802.11g standard: devices were marketed and sold months before the standard was finally ratified. A WLAN based on one of the 802.11n proposals appeared in mid-2004 under the name "802.11 pre-N".

Q2) Ultimately, who regulates standards that are developed by consortia?

A) a regulatory body

B) the marketplace

C) the government

D) the manufacturers

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Wireless Works

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20464

Sample Questions

Q1) Highly-directional antennas are generally concave dish-shaped devices.

A)True

B)False

Answer: True

Q2) When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line. This is known as ____.

A) reflection

B) absorption

C) refraction

D) scattering

Answer: C

Q3) ____ antennas are used for long distance, point-to-point wireless links, such as connecting buildings that are up to 42 kilometers (25 miles) apart.

A) Fresnel

B) Omni-directional

C) Semi-directional

D) Highly-directional

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: IEEE 80211 Physical Layer Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20465

Sample Questions

Q1) The Physical Layer Convergence Procedure (PLCP) standards for 802.11b are based on ____.

A) DSSS

B) FHSS

C) OFDM

D) PYS

Q2) Narrowband transmissions require significant power for the signal to be transmitted because the signal must exceed the ____________________, or the total amount of outside interference, by a substantial margin.

Q3) What are the fields that make up a PLCP frame?

Q4) According to FCC regulations, all FHSS systems in the 900 MHz band must change frequencies through 50 channels and cannot spend more than ____ on one frequency each 20 seconds.

A) 20 milliseconds

B) 30 milliseconds

C) 400 milliseconds

D) 1 second

Q5) What is the Open Systems Interconnection (OSI) reference model?

Q6) What are the advantages to using DSSS with a chipping code?

Q7) There are two disadvantages to using U-NII. What are they?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: IEEE 80211 Media Access Control and Network Layer Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20466

Sample Questions

Q1) All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection.

A) unit

B) flag

C) sum

D) check sequence

Q2) How does open system authentication work?

Q3) What is the first step in shared key authentication?

A) AP encrypts challenge text and sends it to wireless device

B) wireless device encrypts challenge text and sends it to AP

C) AP sends wireless device an authentication frame that contains a block of text known as the challenge text

D) wireless device sends an authentication frame to the AP

Q4) CSMA/CA reduces collisions is by using explicit frame acknowledgment. Describe how frame acknowledgment works.

Q5) What fields are contained in the body of a beacon frame?

Q6) A wireless device sends an authentication frame to the AP. The AP sends back an authentication frame that contains a block of text known as the

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Planning and Deploying a Wireless LAN

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20467

Sample Questions

Q1) What should you do when electrical alternating current power is not available near the AP location?

A) move it to another location

B) use wireless power

C) use a battery

D) user Power over Ethernet

Q2) Two significant changes in the business world have occurred in the last 15 years. What are they?

Q3) Two adjacent access points that use the same ____ can cause interference and lost frames.

A) station

B) channel

C) hotspot

D) ESS

Q4) ____ should be considered when calculating ROI.

A) Customer satisfaction

B) Implementation costs

C) Training

D) All of the above

Q5) What is the final step in the wireless LAN model developed by Intel Corporation?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Conducting a Site Survey

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20468

Sample Questions

Q1) What are the steps involved in gathering data for a site survey?

Q2) How is RF information actually (physically) collected?

Q3) What should be included in a site survey report?

Q4) What should you be sure to do when collecting RF information?

A) take pictures of your location as you move around

B) connect to the Internet and download a file to test bandwidth

C) write down your perception of connection speed

D) observe the data being displayed by the software measurement tools

Q5) What is a drawback of a spectrum analyzer?

A) information is displayed in graphical form and not as raw data

B) information is displayed as raw data, not in graphical form

C) information only applies to one frequency

D) only made by a single manufacturer and very expensive

Q6) The ____ setting of a site survey analyzer specifies the AP that will be involved in the test.

A) Destination MAC Address

B) Continuous Link Test

C) Packet Tx Type

D) Delay Between Packets

Q7) What is a site survey analyzer?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless LAN Security and Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20469

Sample Questions

Q1) Briefly describe cryptography and discuss its history.

Q2) A ____ is not malicious but often seeks to expose security flaws.

A) cracker

B) script kiddie

C) spy

D) hacker

Q3) Employees pose only a small threat to networks.

A)True

B)False

Q4) Describe the five steps in the process of WEP encryption.

Q5) In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.

Q6) While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.

Q7) Describe at least four weaknesses of open system authentication.

Page 10

Q8) Describe a man-in-the-middle attack.

Q9) Briefly describe the goal of InfraGard.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Implementing Wireless Lan Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20470

Sample Questions

Q1) Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.

Q2) What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

A) key caching

B) port security

C) pre-authentication

D) message passing

Q3) What is a wireless gateway?

Q4) ____ was designed to address WEP vulnerabilities with a minimum of inconvenience.

A) IEEE 802.11i

B) TGi

C) dynamic WEP

D) WPA

Q5) Describe Advanced Encryption Standard (AES).

Q6) In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Managing a Wireless LAN

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20471

Sample Questions

Q1) The first step in creating a security policy is ____.

A) risk assessment

B) security auditing

C) impact analysis

D) documentation

Q2) Many enterprise-level access points provide utilities that offer three types of information. What are they?

Q3) A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.

A) bidirectional

B) pre-injection

C) unidirectional

D) internal

Q4) It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.

A) manual

B) event

C) network

D) AP

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Network Settings and Wireless LAN

Troubleshooting

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20472

Sample Questions

Q1) When using WEP as part of the transitional security model, the same ____ key must be installed on the access point and the device. If not the wireless device may not operate properly.

A) secure

B) linked

C) shared

D) private

Q2) Devices using ____ may cause all-band interference.

A) Mobile IP

B) WEP

C) frequency hopping spread spectrum

D) IEEE 802.11g

Q3) Some computer viruses are known to cause ____.

A) duplicate SSID

B) incorrect MAC addresses

C) WLAN interference

D) intermittent connectivity problems for wireless connections

Q4) How would you solve a near/far transmission problem?

Page 14

Q5) Describe the LED indicator lights that appear on an AP.

Q6) What are some of the factors that influence system throughput?

To view all questions and flashcards with answers, click on the resource link above.

Page 15

Chapter 12: Personal, Metropolitan, and Wide Area Wireless

Networks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20473

Sample Questions

Q1) Power consumption is so low for 802.15.4 devices that it is estimated that batteries powering the devices can last up to ____.

A) 4 months

B) 1 year

C) 2 years

D) 5 years

Q2) The ZigBee group has drafted standards relating to network configuration, security, and other higher-level features that are not covered by the IEEE 802.15.4 standard.

A)True

B)False

Q3) Describe the last mile connection problem.

Q4) ____ is another name for IEEE 802.15.3a.

A) Megaband

B) Bluetooth

C) Ultrawideband

D) Broadband

Q5) Describe the way cellular telephone networks work.

Q6) What is a piconet?

16

Q7) What are the two different types of RFID tags?

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook