Which Carrier Sense technology is used on wireless networks
Layer 3
·
What is the lowest
layer of the OSI model at which wired and wireless transmissions share the same
protocols?
Wi-Fi
·
Which one of the
following wireless transmission types doe NOT require a clear LOS to function?
Class 1
·
Which Bluetooth class has
the highest power output?
Bluesnarfing
·
A hacker takes
advantage of a Bluetooth connection to send a virus to a user's phone. What
kind of security breach has occurred?
NFC
·
A user swipes her
smartphone across a tag on a poster to obtain showtimes for a movie she wants
to see later that evening. What wireless technology transmitted the data?
Ad hoc
·
A student has
completed his part of a group research paper, and needs to share it with a
classmate. He sees the classmate as they're crossing the parking lot between
classes. Which WLAN architecture could they use to transfer the file from one
laptop to the other?
802.11n
·
Which 802.11 standard
can be used in both the 2.4-GHz and the 5-GHz bands?
CSMA/CA
·
Which Carrier Sense
technology is used on wireless networks to reduce collisions?
Rogue access point
·
You've just completed
a survey of the wireless signals traversing the airspace in your employer's
vicinity, and you've found an unauthorized AP with a very strong signal near
the middle of the 100-acre campus. What kind of threat do you need to report to
your boss?
Evil twin
·
You just settled in
for some study time at the local coffee shop, and you pause long enough to
connect your computer to the Wi-Fi so you can listen to some music while you study.
As you're about to sign in, you realize you clicked on an SSID called
"Free Coffee and Internet." What kind of security trap did you almost
fall for?
Diffraction
·
What signal
propagation phenomena causes a wireless signal to split into secondary waves
when it encounters an obstruction?
Scattering
·
What signal
propagation phenomena causes the diffusion, or the reflection in multiple
different directions, of a signal?
Iwconfig
·
Which command below
can be used on Linux to modify the SSID of the access point you choose to
associate with?
4
·
How many address
fields exist in an 802.11 frame?
5.9 GHz
·
Select below the band
that is not one of the four frequency bands used in the 5 GHz range for
wireless LANs:
Bus
·
Select below the
network topology that is not a valid wireless network topology:
300 feet
·
Ideally, stations must
remain within what range of an access point in order to maintain optimal
transmission speeds?
Physical layer
·
At what layer of the
OSI model do the 802.11 standards vary?
802.11a
·
Which 802.11 standard
was the first to utilize the 5 GHz band?
802.11ac
·
Which 802.11
technology is the first Wi-Fi standard to approach gigabit Ethernet
capabilities, and operates on the 5 GHz band?
600 Mbps
·
.
·
What is the maximum
theoretical throughput of 802.11n?
beacon frame
·
Select below the name
for the special signal that contains information that a wireless node requires
in order to associate itself with an access point:
basic service set
·
In IEEE terminology, a
group of stations that share an access point are said to be part of what option
below?
management frames
·
What 802.11 frame
type is involved in association and reassociation, including probe and beacon
frames?
control frames
·
Which 802.11 frame
type is related to medium access and data delivery, and includes ACK and
RTS/CTS frames?
The frame check
sequence dictates packet size
·
How does the 802.11
data frame indicate how a large packet should be fragmented?
MIMO
·
Which 802.11 wireless
innovation allows for the use of multiple antennas on an access point that can
issue a signal to one or more receivers?
6 bytes
·
In an 802.11 data
frame, what is the size of the frame check sequence field?
4 data streams
·
How many data streams
are used in 802.11ac Wave 2 devices?
1.3 Gbps
·
What is the max
theoretical throughput of the 802.11ac wireless technology when using Wave 1
devices?