Which statements are true of the Bluetooth 802.15.3 standard? (Choose 2)
It is used for peer-to-peer devices that are close to each other. It is used for medium sized !"s. It is used for mo#ile de$ices that communicate %ith a satellite. It operates with a speed of less than 1 Mbps. It o&erates %ith a s&eed of 1 ' 10 (#&s. It o&erates %ith a s&ed of 10 ' 100 (#&s. Which statements are true of the 802.11 standard? (Choose 2) It is used for &eer'to'&eer de$ices that are close to each other. It is used for medium sized LANs. It is used for mo#ile de$ices that communicate %ith a satellite. It o&erates %ith a s&eed of less than 1 (#&s. It o&erates %ith a s&eed of 1 ' 10 (#&s. It operates with a speed of 10 - 100 Mbps. In %hich %a$e #and does 802.11) o&erate? 1.3 *+z 2. !"z 5., *+z 10 *+z What %as an ad$anta)e of 802.11# o$er 802.11a? 802.11# %as faster than 802.11a. 802.11# %as less &rone to interference than 802.11a. #02.11b was cheaper than #02.11a. 802.11# o&erated o$er a lon)er distance than 802.11a. Which statements are true of 802.11)? (Choose all that a&&l-.) It o&erates in the same %a$e #and as 802.11a. It operates in the same wave band as #02.11b. $peratin% speed is faster than #02.11b. .&eratin) s&eed is slo%er than 802.11#. It is com&ati#le %ith 802.11a #ut not 802.11#. It is com&ati#le %ith 802.11# #ut not 802.11a. /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc Wh- do %ireless "ICs not detect collisions? Collisions do not occur %ith %ireless communication #ecause there is no shared medium. !ccess &oints #eha$e li3e s%itches and &ro$ide dedicated #and%idth to each de$ice. Communication #et%een %ireless "ICs and access &oints is full du&le4. It would be too e&pensive to ma'e wireless NI(s that are capable of detectin% collisions. Wh- is access to the %ireless medium re)arded as distri#uted? It is the responsibilit) of all devices to detect *+ si%nals and wait until the medium is free before transmittin%. 5he access &oint recei$es si)nals from de$ices that are distri#uted around it. /i)nals are distri#uted o$er the %a$e #and. 5he access &oint controls the allocation of the shared medium to the %ireless de$ices. If %ireless de$ices are on o&&osite sides of the access &oint and are too far a&art to sense each other6 the hidden node &ro#lem occurs. What is this &ro#lem? 5he de$ices %ill not recei$e ac3no%led)ement of their transmissions and %ill therefore assume that the messa)e %as lost and send it a)ain. 5he t%o de$ices %ill #e una#le to communicate %ith each other. $ne device ma) transmit while the other is transmittin%, resultin% in a collision. /tructural features of the #uildin) are li3el- to interfere %ith si)nals. Which de$ice does a Cisco %ireless access &oint most resem#le in its #eha$iour? An -thernet hub !n 7thernet la-er 2 s%itch !n 7thernet la-er 3 s%itch ! router +o% does 85/0C5/ resol$e the hidden node &ro#lem? It stren)thens the si)nals so that de$ices on o&&osite sides of the access &oint are a#le to sense each other. .he access point allocates the medium to one device, on re/uest, for as lon% as it needs to transmit. /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc It allo%s transmissions to #e re&eated %hen there is a collision. 9e$ices ta3e turns to transmit6 and can do so %hen the- hold the to3en. Which de$ice t-&icall- com#ines the roles of %ireless access &oint6 7thernet s%itch6 and router? (odem a-er 3 s%itch 0ireless router Wireless "IC ! sin)le access &oint and the de$ices connected to it are 3no%n as: A 122 !n 7// !n 7/! !n ad hoc to&olo)- What is the effect of 8; si)nal attenuation? It causes interference. It causes collisions. It limits the area covered b) an access point. It limits the num#er of access &oints in an 7//. What name is commonl- )i$en to &eo&le %ho loo3 for unsecured %ireless net%or3s and use them to )ain Internet access? +ac3ers Crac3ers /urfers 0ar drivers !n access &oint is usin) channel 1. !nother access &oint must #e added on the same net%or3 to e4tend the area co$ered. What channel should this additional access &oint use in order to a$oid &erformance &ro#lems? Channel 1. Channel 2 or hi)her num#er. Channel 2 or hi)her num#er. (hannel 3 or hi%her number. +o% far should an access &oint #e from the nearest &erson? !t least 10 cm /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc At least 20 cm !t least 50 cm !t least 1 m +o% far should an access &oint #e from metal o#<ects? !t least 1 foot !t least 2 feet At least 4 feet !t least 2 feet +o% should an access &oint #e mounted? +orizontall- 5erticall) !t an an)le of 25 de)rees !t the same hei)ht as the %ireless de$ices What is C/(!0C!? ! method used to detect collisions on %ireless net%or3s and allo% de$ices to resend messa)es that ha$e #een lost after %aitin) for a random len)th of time. ! s-stem for a$oidin) collisions #- ma3in) de$ices %ait until the- hold a to3en #efore the- are allo%ed to transmit. A s)stem for avoidin% collisions b) ma'in% devices chec' if the medium if free before transmittin%, then usin% ac'nowled%ements to confirm that the messa%e was received. ! method used so that %ireless de$ices can connect to a %ired 7thernet net%or3 %ithout causin) collisions on the %ired net%or3. Which is true of an e4tended ser$ice set6 %here se$eral access &oints %ith o$erla&&in) co$era)e areas are de&lo-ed on a net%or3? 5he o$erla& in co$era)e must not #e more than 5= other%ise there %ill #e interference and &oor &erformance. .he access points should use the same 22I6 so that mobile devices can roam from one area to another. 5he access &oints should use different //I9s for securit- &ur&oses. 5he access &oints must use different 8; %a$e #ands. +o% man- methods of authentication are s&ecified in the 802.11 standard? "one. /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc .ne: o&en authentication. .wo7 open authentication and shared 'e). 5hree: o&en authentication6 shared 3e- and 5>I?. ;our: o&en authentication6 shared 3e-6 5>I? and !7/. Where &ossi#le6 %ireless net%or3s should use securit- that follo%s the 802.11i standard. 5his is e@ui$alent to: 5>I? W7? W?! 08A2 When is it sensi#le to set u& o&en access on the access &oint? When //I9 #roadcasts are turned off. .n a home net%or3. When securit- is #ased on chec3in) (!C addresses. 0hile a new wireless networ' is bein% set up. Which statements are true of the //I9? (Choose 2) It identifies a particular wireless networ'. It identifies a s&ecific access &oint. +or securit) reasons, the default value should not be used. 5urnin) off //I9 #roadcasts %ill ensure net%or3 securit-. ! ro)ue access &oint can com&romise net%or3 securit-. Which is an e4am&le of a ro)ue access &oint? An emplo)ee connects his own access point in order to use his wireless laptop in his office. ! technician installs an access &oint %ith a channel that o$erla&s %ith an e4istin) access &oint. !n access &oint is installed on an outside %all so that its ran)e e4tends %ell outside the #uildin). !n access &oint is confi)ured to #roadcast //I9s6 %hereas the other access &oints on the net%or3 do not. What are the effects of modif-in) a %ireless "IC so that it acce&ts all traffic and not <ust traffic destined for its o%n (!C address? (Choose 2) .he NI( will behave li'e an access point. /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc .he NI( can be used to carr) out a 9man in the middle: securit) attac'. 5he "IC %ill transmit simultaneousl- %ith the ori)inal access &oint and cause collisions. 5he "IC %ill #e o$erloaded and disassociate itself. +o% could an attac3er %ho has modified his la&to&As %ireless "IC mount a denial of ser$ice attac3? (Choose 2) 2end repeated (.2 ;clear to send< messa%es, so that devices transmit simultaneousl) and cause collisions. /end transmissions on a different channel so that other de$ices do not detect them. 2end repeated disassociate commands so that devices disassociate and then %enerate traffic as the) tr) to reassociate. Chan)e the &ass%ord for authentication so that de$ices are loc3ed out of the net%or3. Wh- do some &eo&le choose to lea$e //I9 #roadcasts ena#led rather than disa#lin) them? It allo%s mo#ile de$ices to mo$e from one access &oint to another %ithin the net%or36 other%ise the- %ould need to #e reconfi)ured. "ac'ers can detect 22I6s relativel) easil), so disablin% 22I6 broadcasts is not re%arded as an effective securit) measure. "e% de$ices cannot detect an access &oint if //I9 #roadcasts are disa#led. 9isa#lin) //I9 #roadcasts &re$ents a net%or3 from ha$in) se$eral access &oints o&eratin) simultaneousl-. In %hich order does a %ireless de$ice carr- out &rocedures for connectin) to a %ireless net%or3? !ssociate6 ?ro#e6 !uthenticate !uthenticate6 &ro#e6 !ssociate 8robe, Authenticate, Associate ?ro#e6 !ssociate6 !uthenticate +o% should -ou set the channel on -our access &oint for #est &erformance? (Choose 2) Wide channel (20(+z) if -ou ha$e Wireless'*6 Wireless'B and Wireless'" de$ices. 0ide channel ;0M"z< if the mode is 0ireless-N onl). 2tandard channel if the mode is 0ireless-! onl). !uto if the mode settin) is 9isa#led. /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc Which statements are true of a 8!9IB/ ser$er? (Choose 2) #02.11i includes the optional use of a *A6I=2 server for authentication. 802.11i s&ecifies that a 8!9IB/ ser$er must #e used for securit-. .he *A6I=2 option that is available for a Lin's)s wireless router allows )ou to use a *A6I=2 server in combination with 0-8. 7ach access &oint contains its o%n 8!9IB/ ser$er soft%are6 a central !!! ser$er is not needed. 5he &rocess of #roadcastin) a net%or3As //I9 is called: ?ro#in) !ssociatin) 1eaconin% !d$ertisin) Which statements are true of 5>I?? (Choose 2) .>I8 uses a different encr)ption 'e) for each pac'et. .>I8 uses the same encr)ption al%orithm as 0-8. 5>I? failed to address the %ea3nesses of W7? securit-. 5>I? com&lies %ith #roader I5 industr- standards and &articularl- I777 802.11i. /W 230100200, 0$ar0%%%0a&&s0con$ersion0tm&0scratch120228285222.doc