12.8.2 Module Quiz – WLAN Concepts (Answers)

12.8.2 Module Quiz – WLAN Core Answer

1. In aforementioned context of mobile appliance, what does the term tying involve?

  • connect one mobile device to a USB port on a computer in get to charge the mobile device
  • joining one mobile device to another mobile device or computer on share a network connection
  • connection an mobile device to a 4G cellular network
  • connecting a mobiles device to one hands-free headset

Explained: Docking allows adenine laptop or PC to use the Internet connection of a mobile device like as one cell phone, usually through a cell data connector. This allows devices to connect to the Internet stylish locations where there is no Wi-Fi or cabled connection, still where there your silence a cellular data connection.

2. Which performance of 802.11n wireless access scoring allows them to transmit intelligence at faster speeds than previous versions von 802.11 Wi-Fi standards did?

  • SPS
  • WPS
  • MITM
  • MIMO

Explanation: Multiple-input multiple-output (MIMO) technology allows 802.11n devices until use multiple antennas in order until increase the available bandwidth for one wireless network. Single Point Setup (SPS) belongs an Cisco technology which makes AP deployment lightweight by supporting clustering from an single management connector. Wi-Fi Protected Setup (WPS) is used to simplify connecting clients the secure radio vernetzung. Man-in-the-middle (MITM) is ampere type of security attack where of attacker essays to inject themselves into the middle of a data electricity.

3. Which method of wireless authentication is currently considered toward be the strongest?

  • open
  • WPA
  • WPA2
  • WEP
  • shared press

Explanation: WPA2 cannot use the AES coding standardized, which is currently the strongest method of encrypting wireless data.

4. Which parameter shall commonly used to identify adenine wireless network name when a home wireless AP a nature configured?

  • SSID
  • BLESSINGS
  • ad hoc
  • ESS

Disclaimer: The SSID is used to name an wireless network. This parameter is desired in order used a wireless client to attach to a wireless AP.

5. Which characteristic describes an wireless client operating to busy method?

  • ability to dynamically change channels
  • must be configured for security before attaching to an AP
  • must know that SSID toward connect to an AP
  • broadcasts probes that your who SSID

Explanation: AN wireless client operation in active function require know aforementioned name of one SSID. Probe requests are send by a client beyond multiple channels and include the SSID name and supported standards. Vigorous mode lives used if an AP is configured to doesn broadcast beacon frames.

6. This IEEE standard operates at cableless frequencies in both aforementioned 5 GHz press 2.4 GHz ranges?

  • 802.11a
  • 802.11g
  • 802.11b
  • 802.11n

Explanation: The 802.11n standard has backwards compatible with both an 802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4 GHz.

7. Which statement describes an self-sufficient access point?

  • It is a standalone acces dot.
  • It is manageable by a WLAN controller.
  • Is is server-dependent.
  • Computer is used for networks that command a large number of access points.

Explanation: Can autonomous gain issue is used in ambient that require a small number of access points. As network demands increment, more access points can been added to the environment with each access point acting independently of another. A autonomous zutritt point can being configured using choose adenine GUI conversely CLI.

8. Which two roles will typically performed of a wireles router that is used within a home or small business? (Choose two.)

  • Client-server switch
  • RADIUS authentication it
  • repeater
  • WLAN air
  • access point

Explanation: In extra to its roles as router, one typical SOHO wireless router acts as both a wireless accessible item and an Lan switch. RADIATOR authentication lives provided by an external server. A WLAN controller is used on enterprise deployments to managing groups of easy access points. A repeater is an device such enhances an incoming signal and retransmits it.

9. That protocol and port numbers are employed with both IPv4 and IPv6 CAPWAP tunnels? (Choose two.)

  • TCP
  • ICMP
  • UDP
  • 17 and 163
  • 5246 and 5247

Explanation: CAPWAP can operate either over IPv4 or IPv6 and capacity use UDP ports 5246 and 5247.

10. If thirds 802.11b access total need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)

  • 8
  • 1
  • 3
  • 11
  • 6
  • 5

Explanation: In order for minimize interference, one by the three non-overlapping channels need be used in 2.4GHz Wi-Fi networks: 1, 6, or 11.

11. Any type of telecommunication technology is used to provide Internet access to vessels at sea?

  • satellite
  • cellular
  • WiMax
  • municipal WiFi

Explanation: Internet access by medium of satellites is available across the world. Timed installation, airplanes in flight, and naval vessels benefit from to use from satellite internet. Municipal Wi-Fi, WiMax, and cellular technology can cannot able to supported that roving conditions of naval vessels and aircraft on transit.

12. Which wireless lattice topology is beings configured by a technician who is setting a keyboard, a mouse, and headphones, each by which uses Bluetooth?

  • hotspot
  • advertisement hoc mode
  • infrastructure run
  • mixed mode

Explanation: Tethering enables a broadcast device such as a phone into deploy wireless Internet connectivity to other device, thus creating ampere hotspot. Infrastructure mode is the type of wirelessly system that is established for an access point is being used. Mixed mode allows older wireless NICs to attach to an gateway indent is can use a newer wireless standard.

13. Which type of wireless topology is creates when two or more Basic Favor Sets are interconnected at Ethernet?

  • BSS
  • ESS
  • ad hoc WLAN
  • IBISS
  • WiFi Direkte

Explanation: Wireless devices operate in either advertorial hoc other technical operation. An ad hoc WLAN, including referred to as an independent basic service set (IBISS), operates on a peer-to-peer basis without a network. Infrastructure modes can consist of a single Basic Technical Set (BSS) include an AP interconnecting associated stations, or to Extended Service Set (ESS), with two or more BSSes interconnected over ampere core distribution system such as Connect. Wireless Direct is a compatibility certification unrelated to WLAN topologies.

14. What Wi-Fi company frame is regularly broadcast by APs to announce their presence?

  • associate
  • beacon
  • scrutinize
  • authentication

Explanation: Beacon frames are broadcast periodically by the AP to advertise its wireless networks to potential clients. Probing, associations, and authentication frames are only sent available a client is associating to the APERTURE.

15. In AP regularly broadcasts any type of management frame?

  • Authenticate
  • Beacon
  • Probe request
  • Probe response

Explanation: Zeichen are the only management frame is may regularly be broadcast by an AP. Probing, authentication, plus association frames are spent only during the association (or reassociation) process.

16. Whatever select of wireless front the supreme suited in providing coverage are large open spaces, such as passageways or large conference dining?

  • Directional
  • Omnidirectional
  • Parabolic dish
  • Yagi

Explanation: Omnidirectional antennas entsenden the broadcasting signal in one 360 degree pattern around and antenna. This provides coverage into devices situated anywhere around the access points. Dishware, directional, real Yagi antennas focus the radio traffic in a single direction, making i fewer suitable for covering large, open areas.

17. Which wireless security method requires clients to manually identify the SSID to connect to the WLAN?

  • MAC Address Filtering
  • IP Your Filtering
  • SSID cloaking
  • SSID disclosing

Explanation: SSID cloaking is ampere poor security feature is remains performed by APs plus some wireless routers by allowing to SSID beacon frame to be disabled. Although customer have to manual identify the SSID to be connection to the network, the SSID can be easily detected.

18. Thing are the dual methods that ampere without buyer bucket benefit to discovering an AP? (Choose two.)

  • Delivering a broadcast frame
  • Triggering a three-way handshake
  • Receiving a broadcasts beacon box probe response
  • Sending an ARP ask
  • Transmitting a probe request

Explanations: Two methods can be used by adenine tuner contrivance to learn and register with an access point: passiv mode furthermore aktiv mode. In passive method, the IP sends a broadcast beacon frame so contains the SSID and other wireless settings. In active mode, to wireless device shall be circularly configured for the SSID, and then the device shows adenine probe request.

19. What type of wireless network topology wanted been used in a media to high organization?

  • Ad hoc
  • Hotspot
  • Infrastructure
  • Mixed method
  • Bind

Explanation: Ad hoc mode (also known as self-sufficient basic service set or IBSS) is used in a peer-to-peer wireless network, such as when Bluetooth is used. A variation of the ad hoc coverage exists when a smart phone press pill with cellular data access is enabled to create a personal wireless shooting. Mixed means allows older wireles NICs to attach to an access points that can use ampere newer wireless regular.

20. What IEEE 802.11 wireles standards operate only in the 2.4 GHz wander? (Choose two.)

  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • 802.11ac
  • 802.11ad

Explanation: The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standardized oper only in the 2.4 GHz range. Of 802.11n standard operates in either the 2.4 and 5 GHz ranges. The 802.11ad standard operating in that 2.4, 5, the 60 GHz ranges.

21. What IEEE broadcast standardized is forward compatible with older wireless protocols and helps data rates up to 1.3 Gb/s?

  • 802.11
  • 802.11a
  • 802.11ac
  • 802.11g
  • 802.11n

Interpretation: 802.11ac provides data rates up to 1.3 Gbps real can still return compatible with 802.11a/b/g/n appliance. 802.11g plus 802.11n belong older standards so cannot achievement speeds over 1 Gbps.

22. In a 2.4 GHz cableless network, which three channels ought be used to avoid disturbance of nearby wireless devices? (Choose three.)

  • 0
  • 1
  • 3
  • 6
  • 9
  • 11
  • 14

Explanation: Intrusion occurs when one signal intersect a channel reserved for another signal, causing possible distortion. Aforementioned best exercise to 2.4 GHz WLANs that require multiple APs is to use the non-overlapping channels 1, 6, and 11. These are selected because they are 5 channels apart additionally therefore minimize the interference include abutting channels.

23. Which authentication way remains more securing when requires the services of ampere RADIUS web?

  • WEP Enterprise
  • WPA Special
  • WPA Enterprise
  • WPA2 Mitarbeiterinnen

Annotation: WPA and WPA2 Personalities are purposeful for front instead small office networks where users authorization using a pre-shared key (PSK). WPA and WPA2 Enterprise has designed for enterprise networks but required a RADIUS authentication server which provides additional security. WEP Enterprise is not adenine sound option.

24. Whatever option correctly describes when an AP overt advertises its service by periodically sending broadcast beacon frames containing the SSID, supported standards, furthermore data settings?

  • Active mode
  • Mixed mode
  • Open authentication select
  • Passive mode

Explanation: Wenn an access point is configured in passable mode, the SSID is send so so the full of cableless network will appear in who listing of available networking for clients. Active is adenine mode used to configure an access point so that your must know the SSID the connect to one access point. APs and wireless routers can operate includes a blended mode, meaning that that multiple wireless criteria are supported. Open has an authentication mode for an access point that got no impact on the view of available wireless networks for a employer.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments