Top-Rated Free Essay
Preview

Check Understanding

Powerful Essays
1457 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Check Understanding
Check Your Understanding 1. Fill in IEEE 802.11 B, 802.11 G, 802.11 A, or 802.11 and in the blank to match the description.
802.11b Specifies data rates of 1, 2, 5.5, in 11 Mbps do two different sized spreading sequences specified in the DSSS modulation technique.
802.11g Uses the 802.11 MAC, but with higher data rates in the 2.4 GHz ISN band by using the OFDM modulation technique.
802.11a Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range.
802.11n Uses multiple radios in antenna at endpoints, each broadcasting on the same frequency to establish multiple streams. 2. Fill in the term for the wires networking device in the blank to match the description.
Wireless NIC Encodes a data stream onto an RF signal using the configured modulation technique.
Access point Connects multiple to wireless clients or stations to a wired LAN.
Wireless router Connects to separated, isolated wired networks together. 3. At which layer of the OSI model do wireless access points operate? a. Physical b. data link c. network d. application 4. Which two steps are required for a wireless client to associate with an access point? e. IP addressing f. wireless address translation g. wireless client authentication h. channel identification i. wireless client Association 5. Which three WLAN client authentication types require a preprogrammed network key to be set on the client? j. Open with data encryption disabled k. shared with data encryption algorithm WEP l. WPA with data encryption algorithm TK IP m. WPA – PSK with data encryption algorithm TK IP n. WPA 2 – PSK with data encryption algorithm AES 6. Which two items contribute to the security of a WLAN? o. WPA 2 p. use of multiple channels q. hiding the SS ID r. open authentication s. AES 7. Which term is used for products that are tested to be an operable in both PSK and 802.1x E AP operation for authentication? t. Personal mode u. WPA two compatible v. R ADI US authenticated w. enterprise mode x. pre-shared key authenticated 8. To help ensure a secure wireless network, most enterprise network should follow which IEEE standard? y. 802.11 a z. 802.11 B {. 802.11 C |. 802.11 I 9. The authentication and encryption menu options are displayed. Which wireless settings provide the highest level of security? }. Open ~. shared . WPA . WPA – PSK 10. Which two combinations of 802.11 B RF channels would allow to wireless APs to operate simultaneously in the same room with no channel overlap? . Channels 10 and a 6 . channels 9 and 6 . channels 8 and 5 . channels 7 and 2 . channels 6 and 2 . channels 6 and 11 11. Why do cordless devices, such as cordless telephones, sometimes interfere with wireless access points? . These devices operate as similar frequencies. . These devices operate at the same frequencies and have higher RF power settings. . These devices flood the entire frequency spectrum of low powered noise, which may cause less of signal for wireless devices trying to connect with an access point. . The signal from the cordless device is not polarized and combines with the access point polarized signal, thus reducing the old overall signal strength. 12. What is the recommended overlap between the two wireless access points to provide proper connectivity for users? . 5 to 10% . 10 to 15% . 15 to 20% . 20 to 25% 13. Fill in the authentication method in the blank that matches the encryption algorithm or security protocol listed.
Open Disabled
WEP RC4
WPA TKIP
WPA2 AES 14. Which W LA and client settings would be reviewed to resolve problems accessing the network? . Wireless mode (802.11 A, 802.11 B, 802.11 G, 802.11n) . wireless network card drivers . channel selection for ad hoc networks . TCP/IP properties . wireless Association properties
Study Guide 1. L 2. F 3. M 4. O 5. N 6. D 7. H 8. a 9. E 10. J 11. C 12. B 13. I 14. G 15. K 16. Wireless is now consider required component for business communications because people don’t sit at their desks they want to be able to access their information wherever they are whether it be on their smart phone or on their laptop or their tablet. This increases production and reduce costs and makes businesses more flexible. 17. 802.3 18. 802 11 19. radio frequencies 20. radiofrequency 21. cable 22. collision avoidance 23. collision detection 24. anyone with a NIC and an access point 25. cable connection 26. yes 27. no usually not but possibly 28. FCC 29. IEEE 30. industrial 31. scientific 32. medical 33. ISAM 34. 1 to 2 Mb per second 35. 2.4 GHz 36. 1999 37. 2.4 GHz 38. DSSS 39. up to 11 Mb per second 40. hundred and 50 feet 41. 1999 42. 5 GHz 43. OFDM 44. of 54 Mb per second 45. hundred 50 feet 46. 2003 47. 2.4 GHz 48. OF DM and DSSS 49. up to 54 Mb per second 50. 150 feet 51. 2008 52. unknown 53. M IMO 54. 240 Mb per second 55. 230 feet 56. direct sequence spread spectrum 57. Orthogonal frequency division multiplexing 58. OFDM 59. DSSS 60. OFDM 61. higher frequency radio waves are more easily absorbed by obstacles making 802.11 a have poor performance 62. higher frequency has lower range than either 802.11 B or 11 G 63. some countries do not prove met the use of 5 GHz band 64. most devices use the 2.4 GHz band causing 802.11 and 11 G devices to have more interference 65. 802.11 and uses multiple radio and antenna at endpoints, each broadcasting on the same frequency to establish multiple streams. The multiple input output or capital M I am all technology splits a high data rate stream into multiple lower level it rate streams and broadcast them simultaneously over the available radio and antennas. This allows for the theological maximum data rate of 248 Mb per second using to streams. 66. ITU – R 67. IEEE 68. Wi-Fi alliance 69. wireless N I C 70. access point 71. 802.11 72. 802.3 73. associate 74. carrier sense multiple access 75. collision avoidance 76. CSMA/CA 77. When the access point receives data, is something knowledge management that data has been received. This technology management lets us know that no collisions occurred and prevents retransmission of data. 78. If two machines are at the maximum range of the access point, they may not detect each other. So they may end up transmitting simultaneously. Capital CSMA/CA use is capital RTS/CTS between the access point in the client to avoid collisions. 79. Wireless access point 80. switch 81. router 82. service set identifier 83. 2 84. 32 85. channels one, six and 11 do not overlap 86. If there are three access points you use channel 1, 6, and 11. If there are only two you may use any two channels as long as they are five channels apart the way two and seven are. 87. B SS is a wireless topology with a single access point use fact all mobile clients in a service area. Capital ESS is wireless topology that uses two or more B SS as the distribution system to provide coverage where a BSS would not be enough. 88. Beacons 89. probes 90. authentication 91. Association 92. war driving 93. Off-the-shelf devices sold today have default settings when people don’t take the time to change the configurations it leaves that open to anyone that knows the off-the-shelf settings. 94. Rogue 95. A man in the middle attack is when a person uses packet sniffing software to intercept the transmission between the computer and the access point. 96. All three ways are creating noise channel, a flood the BSS with the CTS message, and a DOS attack. 97. The algorithm is crackable 98. 32 bit WEP keys are manually managed, so uses enter them by hand so there is more chance of a typo. 99. 802.11 I 100. WPA 2 101. extensible authentication protocol 102. 802.1 acts 103. temp oral key integration protocol 104. advanced encryption standard 105. encrypts layer 2 payload 106. does a message in tag ready check to check for tampering 107. AES uses the Mac header to check for tampering. AES also includes a sequence number on the encrypted data 108. SS ID cloaking 109. Mac address filtering 110. W LA and security implementation 111. Mac addresses are easily spoofed, SS IDs are easily to discover even if access points do not broadcast

Packet Tracer

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Week 5 6 ILAB SriLakshmi

    • 773 Words
    • 3 Pages

    6. Supposedly, 802.11b is “backwards compatible” with 802.11g, yet this lab demonstrates there are significant problems with allowing the two to coexist. What is the primary “incompatibility” between b and g?…

    • 773 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Case Study

    • 257 Words
    • 2 Pages

    2. After doing some reaserach I found that 802.11b and 802.11g equipment suffer interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz ISM band.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The type of signal being shown is 802.11g and the signal is -60 to -50 dBms.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    b. Provides mobility and availability, in order to hook up to the network, you only need to open your laptop and push button to enable the wireless network. You do not have to worry about cable length or finding the plug.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    A(n) ____ is a piece of wireless communication hardware that creates a central point of wireless connectivity.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    5. When using a cable modem to connect to the Internet, the data transmission shares the cabling with what other technology?…

    • 1262 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 7 ITM 4272

    • 851 Words
    • 4 Pages

    3) The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes…

    • 851 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Image a business environment without networking wires connecting to every device. How would information travel to their destination? Well, there is an emerging technology that is here and can transmit packets wirelessly, but it is not being fully utilized in the business world like it could be. That technology is called Wi-Fi. Wi-Fi does not stand for anything nor is it an acronym. The Wi-Fi Alliance defines Wi-Fi as any “wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards”. (Wi-Fi) There are several components that make up Wi-Fi, so naming a single inventor would be difficult. Let's take a look at the history of the 802.11 standard (the radio frequency)…

    • 3783 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Radio waves offer another benefit to the wireless system in addition to their range. With radio signals it is possible for multiple carriers to exist in the same space at the same time without interfering with each other. The key to making this possible is variation of frequencies. As long as concurrent frequencies are no…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Study Guide

    • 1194 Words
    • 5 Pages

    9. What is the frequency range used by 802.11a, and what modulation technique is used?…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays