Back to AI Flashcard MakerInformation Technology /CompTIA Network+ N10-008 CH14 - Course Quiz

CompTIA Network+ N10-008 CH14 - Course Quiz

Information Technology60 CardsCreated 3 months ago

In an Independent Basic Service Set (IBSS) or ad hoc wireless network, nodes generate a 48-bit identifier that mimics a MAC address. This helps devices communicate directly without a central access point.

The nodes that connect ad hoc in an IBSS randomly generate a ______________ string of number sthat looks and functions just like a MAC address?

64-byte
48-bit
48-byte
64-bit

48-bit


Tap or swipe ↕ to flip
Swipe ←→Navigate
1/60

Key Terms

Term
Definition

The nodes that connect ad hoc in an IBSS randomly generate a ______________ string of number sthat looks and functions just like a MAC address?

64-byte
48-bit
48-byte
64-bit

48-bit


Which concept defines the most basic infrastructure mode network: a BSS of one WAP and one or more wireless clients?

extended service set (ESS)
basic service set (BSS)
basic service set identifier (BSSID)
independent basic service set (IBSS)

basic service set identifier (BSSID)

Which element did the WIFI developers create to use as another level of naming to apply to the BSS or IBSS to help the connection happen?

link state
supplicant
mode
service set identifier (SSID)

service set identifier (SSID)

Which type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?

basic service set (BSS)
basic service set identifier (BSSID)
extended service set (ESS)
independent basic service set (IBSS)

extended service set (ESS)

A Wireless Access Point (WAP) that can only be configured by a Wireless Controller is called a thick client?

True
False

False

Leightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco Wireless Products?

True
False

True

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

The nodes that connect ad hoc in an IBSS randomly generate a ______________ string of number sthat looks and functions just like a MAC address?

64-byte
48-bit
48-byte
64-bit

48-bit


Which concept defines the most basic infrastructure mode network: a BSS of one WAP and one or more wireless clients?

extended service set (ESS)
basic service set (BSS)
basic service set identifier (BSSID)
independent basic service set (IBSS)

basic service set identifier (BSSID)

Which element did the WIFI developers create to use as another level of naming to apply to the BSS or IBSS to help the connection happen?

link state
supplicant
mode
service set identifier (SSID)

service set identifier (SSID)

Which type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?

basic service set (BSS)
basic service set identifier (BSSID)
extended service set (ESS)
independent basic service set (IBSS)

extended service set (ESS)

A Wireless Access Point (WAP) that can only be configured by a Wireless Controller is called a thick client?

True
False

False

Leightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco Wireless Products?

True
False

True

_________ broadcasts data in small, discrete chunks over the different frequencies available within a certain frequency range?

Transmit beamforming
CSMA/CD
Channel Bonding
Spread-Spectrum

Spread-Spectrum

One of the big challenges to larger enterprise networks is the large number of clients that might be on a single ___________ at any given moment?

MAC Address
SSID
NIC
Router

SSID (Service Set Identifier)

Which Wireless Bridge can only communicate with a single other bridge and is used to connect two wireless network segments?

point-to-point
point-to-multipoint
omnidirectional
dipole

point-to-point

Which setting should be modified when there are overlapping WIFI signals?

channel and frequency
signal and link state
beacon and interframe gap
MAC address and NIC address

channel and frequency

Which term describes a method that enables an administrator to limit access to a network based on the physical address of Wireless NICs?

MAC Address Filtering
WEP
WPA
802.1X

MAC Address FIltering

Many wireless access points (WAPs) have removable device antennas?

True
False

True

Which term describes a portion of the available spectrum for WIFI network communications?

interframe space
frequency
channel
frame

channel

Whitelisting and blacklisting are labor-intensive processes, with whitelisting requiring far more work?

True
False

True

The _____________ standard established the baseline features common to all subsequent WIFI standards?

  1. 802. 11

  2. 803. 3

  3. 804. 4

  4. 805. 16

802.11

Provide examples of NON-WIFI source of RF interference. Explain why they are a problem to wireless networks and how to correct the problem?

It can come from natural phenomena like lightning and sun spots to a diverse of man-made sources like:
AM/FM Radio and TV Transmitters
Mobile Phones
Bluetooth SYstems
Microwaves
…among many others
The only way to eliminate this type of interference is to shut down or move the devices.

Briefly define the goodput of a wireless network and the concepts behind this factor?

Goodput is used to describe the number of packets that are exchanged between the applications that use the Network.
Commonly known as Throughput, measures the number of packets exchanged over the network to determine network efficiency.
Goodput is also described as measuring the Throughput at the Application Level.

Describe Channel Bonding?

Enables devices to use 2 channels for transmission to increase throughput.

Describe infrastructure mode as it pertains to wireless networking?

Uses a WAP (Wireless Access Point) that acts as a hub for all wireless clients.

Describe ad hoc mode as it pertains to wireless networking?

Two or more devices communicate Directly without any other intermediary hardware.

When an antenna strengthens and focuses the radio frequency (RF) output from a WAP, the ratio of increase is called __________?

gain

The process whereby nonmetallic building materials such as brick, sheetrock, and wood absorb radio signals, greatly reducing or in some cases eliminating a WIFI signal completely, is called ____________?

absorption

The IEEE ____________ standard defines both how wireless devices communicate and how to secure that communication?

802.11

_____________ is the current 802.11 collision avoidance method that specifies rules for sending data onto the network media?

Distributed Coordination Function (DCF)

We measure RFI with the _, essentially comparing the signal strength and the overall interference in the space?

signal-to-noise-ratio (SNR)

Which term describes the predetermined silence period that is added to the length of the current frame to determine the waiting period for a network device after it has detected traffic on the media?

wait time
PCF
link state
interframe gap

interframe gap (IFG)

What happens when frames are transmitted on the network from two different devices at the same time, corrupting each other's signals?

Interframe space expands
A collision occurs.
A channeling error occurs.
Transmit beamforming occurs.

A collision occurs.


Which technology enables WAPs to receive their power from the same Ethernet cables that transfer their data?

Power over Ethernet (PoE)
VLAN pooling
near-field communication (NFC)
mobile device management (MDM)

Power over Ethernet (PoE)

MAC Filtering with a blacklist means an administrator allows only specific computers to JOIN the Network?

True
False

False

Explanation:
Blacklist = When you deny specific computers.
Whitelist = When you allow only specific computers to join the Network.

The Point Coordination Function (PCF) is the currently implemented wireless collision avoidance system?

True
False

False

Explanation:
It's DCF = Distributed Coordiantion Function

Which Wi-Fi standard offers speeds of up to 54 Mbps, offers a range of up to about 300 feet, operates in the 2.4-GHz frequency, and is backward-compatible with an earlier, popular Wi-Fi standard?

  1. 802. 11g

  2. 803. 11b

  3. 804. 11a

  4. 805. 11n

802.11g

With an omnidirectional antenna, the radio wave flows outward from the wireless access (WAP) in one direction?

True
False

False

Explanation:
Omnidirectional is in ALL Directions.

Which term represents a measurement of how well a wireless device is connecting to other devices?

signal strength
access
mode
link state

signal strength


Describe what an Admin must do to configure encryption in a Wireless Network?

  1. 1. Selects an Authentication Method. (Always use the strongest Encryption you can.)

  2. 2. Create a Strong Password

  3. 3. Configure all connected Wireless Clients on the Network

What is the FULL name for the acronym RADIUS?


Remote Authentication Dial-In User Service


Describe a Rogue Access Point (AP)?


An unauthorized Access Point, most Rogue APs aren't Evil and may have been setup by mistake, but some are Evil.

Discuss why using the 5 GHz range for Wireless Networking produces less interference than the 2.4 GHz range?

Because more devices operate at 2.4 GHz Frequencies and tend to step all over each other and is much much more crowded than 5 GHz.

Define Service Set Identifier (SSID)?

It's the Network Name and is a 32 bit identification string that's inserted into the header of each frame processed by a WAP.

Parabolic, dish, and Yagi are all examples of antennas?

unidirectional (ONE Direction)

Explanation:
Omnidirectional (ALL Directions)

The standard straight-wire antennas that provide the most omnidirectional function are called _ antennas?

dipole


A ____ is a Rogue AP that intentionally mimics an existing SSID in order to get people to connect to it instead of the proper WAP?

Evil Twin


In _ mode, the 802.11n WAP sends out separate packets just for legacy devices?

Legacy


One of the big challenges to larger enterprise Networks is the large number of clients that might be on a single _ at any given moment?

MAC Address
NIC
Router
SSID

SSID (Service Set Identifier)

Which wireless bridge can talk to more than one other bridge at a time and can connect multiple network segments?

omnidirectional
dipole
point-to-point
point-to-multipoint

point-to-multipoint


Which standard includes Secure Authentication using RADIUS server and password encryption using EAP?

WPA
WEP
IEEE 802.1X
MAC Address Filtering

IEEE 802.1X

A Word Document that stops loading or an online file that stops downloading are examples of ___?

latency
attenuation
absorption
reflection

latency

What type of unit is formed by two or more wireless nodes communicating in ad hoc mode?

basic service set identifier (BSSID)
basic service set (BSS)
extended service set (ESS)
independent basic service set (IBSS)

independent basic service set (IBSS)

WAPs use an Access Control List (ACL) to enable or deny specific MAC Addresses?

True
False

True

Describe 802.1X and explain what was used before 802.1X and the issue associated with it?

802.1X is a Port-based Authentication Network Access Control mechanism for Networks.
Before 802.1X, a system on a Wired Network could always access another system's Port, an attacker wouldn't be able to do much until he gave a username and password or certificate, but he could still send packets to another computer on the same Network.

What is the trade-off an Admin must consider when modifying the beacon interval on a WAP?

You can adjust the rate of the beacon traffic down - and improve your Network traffic speeds, but you lower the speed at which devices can negotiate to get on the Network, amont other things.

What two pieces of software are needed by every wireless Network Adapter to function with an operating system?

  1. 1. Device Driver to talk to the Wireless NIC | 2. Configuration Utility to configure it.

Explain why the omnidirectional and centered approach does not work for every network?

3 Reasons

  1. If the signal exceeds the size of the Network Space, the signal bleeds out.

  2. If your Network Space exceeds the signal of your WAP, you'll need to get some sort of signal booster.

  3. Any obstacles will produce glaring Dead Spots in the Network Coverage.

Every WIFI Network communicates on a _, a portion of the spectrum available?

channel


The 802.11n specification requires all but handheld devices to use multiple antennas to implement a feature called , which enables the devices to make multiple simultaneous connections called streams?

Multiple Input/Multiple Output (MIMO)

Explanation:

  1. 802. 11n

  2. 803. 11ac

Before installing a WIFI Network, be sure to do a to locate any obstacles that need to be overcome to determine the best location for your Access Points?

site survey


Many 802.11n WAPs employ, a multiple-antenna technology that helps get rid of - places where the radio signal just does not penetrate at all - or atleast make them not so bad?

dead spots


Aside from the SSID, broadcast traffic includes the _, essentially a timing frame sent from the WAP at regular intervals?

beacon


Wireless Devices can Listen and Send at the same time?

True
False

False

Explanation:
Wireless runs at Half Duplex where Wired runs at Full Duplex.

Which term describes a graphical representation of the Radio Frequency (RF) sources on a Site?

Heat Map

Which encryption standard uses AES 128-bit block that is much tougher to crack than 128 bit TKIP RC4 Wrapper?

WPA2

Explanation:
WPA = TKIP/PSK
WPA2 = AES/PSK