Вы находитесь на странице: 1из 7

CCNA3 Chapter 7 Practice Test Answers

Which statements are true of the Bluetooth 802.15.3 standard? (Choose 2)


It is used for peer-to-peer devices that are close to each other.
It is used for medium sized !"s.
It is used for mo#ile de$ices that communicate %ith a satellite.
It operates with a speed of less than 1 Mbps.
It o&erates %ith a s&eed of 1 ' 10 (#&s.
It o&erates %ith a s&ed of 10 ' 100 (#&s.
Which statements are true of the 802.11 standard? (Choose 2)
It is used for &eer'to'&eer de$ices that are close to each other.
It is used for medium sized LANs.
It is used for mo#ile de$ices that communicate %ith a satellite.
It o&erates %ith a s&eed of less than 1 (#&s.
It o&erates %ith a s&eed of 1 ' 10 (#&s.
It operates with a speed of 10 - 100 Mbps.
In %hich %a$e #and does 802.11) o&erate?
1.3 *+z
2. !"z
5., *+z
10 *+z
What %as an ad$anta)e of 802.11# o$er 802.11a?
802.11# %as faster than 802.11a.
802.11# %as less &rone to interference than 802.11a.
#02.11b was cheaper than #02.11a.
802.11# o&erated o$er a lon)er distance than 802.11a.
Which statements are true of 802.11)? (Choose all that a&&l-.)
It o&erates in the same %a$e #and as 802.11a.
It operates in the same wave band as #02.11b.
$peratin% speed is faster than #02.11b.
.&eratin) s&eed is slo%er than 802.11#.
It is com&ati#le %ith 802.11a #ut not 802.11#.
It is com&ati#le %ith 802.11# #ut not 802.11a.
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc
Wh- do %ireless "ICs not detect collisions?
Collisions do not occur %ith %ireless communication #ecause there is
no shared medium.
!ccess &oints #eha$e li3e s%itches and &ro$ide dedicated #and%idth
to each de$ice.
Communication #et%een %ireless "ICs and access &oints is full
du&le4.
It would be too e&pensive to ma'e wireless NI(s that are capable
of detectin% collisions.
Wh- is access to the %ireless medium re)arded as distri#uted?
It is the responsibilit) of all devices to detect *+ si%nals and wait
until the medium is free before transmittin%.
5he access &oint recei$es si)nals from de$ices that are distri#uted
around it.
/i)nals are distri#uted o$er the %a$e #and.
5he access &oint controls the allocation of the shared medium to the
%ireless de$ices.
If %ireless de$ices are on o&&osite sides of the access &oint and are too far
a&art to sense each other6 the hidden node &ro#lem occurs. What is this
&ro#lem?
5he de$ices %ill not recei$e ac3no%led)ement of their transmissions
and %ill therefore assume that the messa)e %as lost and send it a)ain.
5he t%o de$ices %ill #e una#le to communicate %ith each other.
$ne device ma) transmit while the other is transmittin%, resultin%
in a collision.
/tructural features of the #uildin) are li3el- to interfere %ith si)nals.
Which de$ice does a Cisco %ireless access &oint most resem#le in its
#eha$iour?
An -thernet hub
!n 7thernet la-er 2 s%itch
!n 7thernet la-er 3 s%itch
! router
+o% does 85/0C5/ resol$e the hidden node &ro#lem?
It stren)thens the si)nals so that de$ices on o&&osite sides of the
access &oint are a#le to sense each other.
.he access point allocates the medium to one device, on re/uest,
for as lon% as it needs to transmit.
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc
It allo%s transmissions to #e re&eated %hen there is a collision.
9e$ices ta3e turns to transmit6 and can do so %hen the- hold the
to3en.
Which de$ice t-&icall- com#ines the roles of %ireless access &oint6 7thernet
s%itch6 and router?
(odem
a-er 3 s%itch
0ireless router
Wireless "IC
! sin)le access &oint and the de$ices connected to it are 3no%n as:
A 122
!n 7//
!n 7/!
!n ad hoc to&olo)-
What is the effect of 8; si)nal attenuation?
It causes interference.
It causes collisions.
It limits the area covered b) an access point.
It limits the num#er of access &oints in an 7//.
What name is commonl- )i$en to &eo&le %ho loo3 for unsecured %ireless
net%or3s and use them to )ain Internet access?
+ac3ers
Crac3ers
/urfers
0ar drivers
!n access &oint is usin) channel 1. !nother access &oint must #e added on
the same net%or3 to e4tend the area co$ered. What channel should this
additional access &oint use in order to a$oid &erformance &ro#lems?
Channel 1.
Channel 2 or hi)her num#er.
Channel 2 or hi)her num#er.
(hannel 3 or hi%her number.
+o% far should an access &oint #e from the nearest &erson?
!t least 10 cm
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc
At least 20 cm
!t least 50 cm
!t least 1 m
+o% far should an access &oint #e from metal o#<ects?
!t least 1 foot
!t least 2 feet
At least 4 feet
!t least 2 feet
+o% should an access &oint #e mounted?
+orizontall-
5erticall)
!t an an)le of 25 de)rees
!t the same hei)ht as the %ireless de$ices
What is C/(!0C!?
! method used to detect collisions on %ireless net%or3s and allo%
de$ices to resend messa)es that ha$e #een lost after %aitin) for a
random len)th of time.
! s-stem for a$oidin) collisions #- ma3in) de$ices %ait until the- hold
a to3en #efore the- are allo%ed to transmit.
A s)stem for avoidin% collisions b) ma'in% devices chec' if the
medium if free before transmittin%, then usin% ac'nowled%ements
to confirm that the messa%e was received.
! method used so that %ireless de$ices can connect to a %ired
7thernet net%or3 %ithout causin) collisions on the %ired net%or3.
Which is true of an e4tended ser$ice set6 %here se$eral access &oints %ith
o$erla&&in) co$era)e areas are de&lo-ed on a net%or3?
5he o$erla& in co$era)e must not #e more than 5= other%ise there %ill
#e interference and &oor &erformance.
.he access points should use the same 22I6 so that mobile
devices can roam from one area to another.
5he access &oints should use different //I9s for securit- &ur&oses.
5he access &oints must use different 8; %a$e #ands.
+o% man- methods of authentication are s&ecified in the 802.11 standard?
"one.
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc
.ne: o&en authentication.
.wo7 open authentication and shared 'e).
5hree: o&en authentication6 shared 3e- and 5>I?.
;our: o&en authentication6 shared 3e-6 5>I? and !7/.
Where &ossi#le6 %ireless net%or3s should use securit- that follo%s the 802.11i
standard. 5his is e@ui$alent to:
5>I?
W7?
W?!
08A2
When is it sensi#le to set u& o&en access on the access &oint?
When //I9 #roadcasts are turned off.
.n a home net%or3.
When securit- is #ased on chec3in) (!C addresses.
0hile a new wireless networ' is bein% set up.
Which statements are true of the //I9? (Choose 2)
It identifies a particular wireless networ'.
It identifies a s&ecific access &oint.
+or securit) reasons, the default value should not be used.
5urnin) off //I9 #roadcasts %ill ensure net%or3 securit-.
! ro)ue access &oint can com&romise net%or3 securit-. Which is an e4am&le
of a ro)ue access &oint?
An emplo)ee connects his own access point in order to use his
wireless laptop in his office.
! technician installs an access &oint %ith a channel that o$erla&s %ith
an e4istin) access &oint.
!n access &oint is installed on an outside %all so that its ran)e e4tends
%ell outside the #uildin).
!n access &oint is confi)ured to #roadcast //I9s6 %hereas the other
access &oints on the net%or3 do not.
What are the effects of modif-in) a %ireless "IC so that it acce&ts all traffic
and not <ust traffic destined for its o%n (!C address? (Choose 2)
.he NI( will behave li'e an access point.
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc
.he NI( can be used to carr) out a 9man in the middle: securit)
attac'.
5he "IC %ill transmit simultaneousl- %ith the ori)inal access &oint and
cause collisions.
5he "IC %ill #e o$erloaded and disassociate itself.
+o% could an attac3er %ho has modified his la&to&As %ireless "IC mount a
denial of ser$ice attac3? (Choose 2)
2end repeated (.2 ;clear to send< messa%es, so that devices
transmit simultaneousl) and cause collisions.
/end transmissions on a different channel so that other de$ices do not
detect them.
2end repeated disassociate commands so that devices
disassociate and then %enerate traffic as the) tr) to reassociate.
Chan)e the &ass%ord for authentication so that de$ices are loc3ed out
of the net%or3.
Wh- do some &eo&le choose to lea$e //I9 #roadcasts ena#led rather than
disa#lin) them?
It allo%s mo#ile de$ices to mo$e from one access &oint to another
%ithin the net%or36 other%ise the- %ould need to #e reconfi)ured.
"ac'ers can detect 22I6s relativel) easil), so disablin% 22I6
broadcasts is not re%arded as an effective securit) measure.
"e% de$ices cannot detect an access &oint if //I9 #roadcasts are
disa#led.
9isa#lin) //I9 #roadcasts &re$ents a net%or3 from ha$in) se$eral
access &oints o&eratin) simultaneousl-.
In %hich order does a %ireless de$ice carr- out &rocedures for connectin) to a
%ireless net%or3?
!ssociate6 ?ro#e6 !uthenticate
!uthenticate6 &ro#e6 !ssociate
8robe, Authenticate, Associate
?ro#e6 !ssociate6 !uthenticate
+o% should -ou set the channel on -our access &oint for #est &erformance?
(Choose 2)
Wide channel (20(+z) if -ou ha$e Wireless'*6 Wireless'B and
Wireless'" de$ices.
0ide channel ;0M"z< if the mode is 0ireless-N onl).
2tandard channel if the mode is 0ireless-! onl).
!uto if the mode settin) is 9isa#led.
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc
Which statements are true of a 8!9IB/ ser$er? (Choose 2)
#02.11i includes the optional use of a *A6I=2 server for
authentication.
802.11i s&ecifies that a 8!9IB/ ser$er must #e used for securit-.
.he *A6I=2 option that is available for a Lin's)s wireless router
allows )ou to use a *A6I=2 server in combination with 0-8.
7ach access &oint contains its o%n 8!9IB/ ser$er soft%are6 a central
!!! ser$er is not needed.
5he &rocess of #roadcastin) a net%or3As //I9 is called:
?ro#in)
!ssociatin)
1eaconin%
!d$ertisin)
Which statements are true of 5>I?? (Choose 2)
.>I8 uses a different encr)ption 'e) for each pac'et.
.>I8 uses the same encr)ption al%orithm as 0-8.
5>I? failed to address the %ea3nesses of W7? securit-.
5>I? com&lies %ith #roader I5 industr- standards and &articularl- I777
802.11i.
/W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc

Вам также может понравиться