Hybrid Wireless Topologies and Implementation Models Quiz
49 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which wireless modulation technology is used for spread-spectrum transmission?

  • Quadrature phase shift keying (QPSK)
  • Direct-sequence spread spectrum (DSSS) (correct)
  • Quadrature amplitude modulation (QAM)
  • Orthogonal frequency-division multiplexing (OFDM)

Which IEEE 802.11 standard introduced security improvements and supported data rates up to 600Mbps?

  • 802.11n (correct)
  • 802.11g
  • 802.11b
  • 802.11a

Which wireless standard is an open standard for short-range wireless communication between devices?

  • WiMedia
  • Bluetooth (correct)
  • WiMAX
  • ZigBee

What is the basic building block of a wireless network that connects clients using wireless connectivity interfaces to a WAP?

<p>Basic service set (BSS) (D)</p> Signup and view all the answers

Which wireless topology is also called the hub-and-spoke model?

<p>Star (A)</p> Signup and view all the answers

Which wireless topology provides larger geographic coverage by connecting individual stations to a higher-level WAP?

<p>Hierarchical (B)</p> Signup and view all the answers

Which wireless technology became popular in the 1990s and had transmission rates of about 1 Mbps in the 900 mHz band?

<p>WLAN (A)</p> Signup and view all the answers

What is the main reason why wireless network security is difficult?

<p>Signal is uncontrolled (C)</p> Signup and view all the answers

Which encryption key is used in Wi-Fi Protected Access (WPA)?

<p>128-bit key per packet (C)</p> Signup and view all the answers

What is the role of a wireless access point (WAP) in a wireless network?

<p>Takes signal from wired network and broadcasts it to wireless receivers (B)</p> Signup and view all the answers

Which protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

<p>Advanced Encryption Standard (AES) (D)</p> Signup and view all the answers

What is a characteristic that differentiates wireless networks from wired networks?

<p>Signaling method does not have readily observable boundaries (B)</p> Signup and view all the answers

Which wireless security measure is NOT recommended for securing wireless networks?

<p>LEAP authentication (C)</p> Signup and view all the answers

Which frequency range has data rates up to 54 Mbps and is commonly used for Wi-Fi?

<p>2.4 GHz range (B)</p> Signup and view all the answers

Which Bluetooth attack exploits the OBEX connection to grab unauthorized information?

<p>Bluesnarf (D)</p> Signup and view all the answers

What are some of the security concerns related to WLANs?

<p>Lack of full connectivity among nodes (A)</p> Signup and view all the answers

What is the range of Bluetooth communication?

<p>30 to 300 feet (D)</p> Signup and view all the answers

What is the new security mechanism in Bluetooth 2.1?

<p>Secure Simple Pairing (SSP) (B)</p> Signup and view all the answers

Which of the following is a weakness of the Wired Equivalent Privacy (WEP) security protocol?

<p>No key management defined in the protocol (A)</p> Signup and view all the answers

What is the main difference between WEP and Wi-Fi Protected Access (WPA)?

<p>WPA has better key management than WEP (A)</p> Signup and view all the answers

What is the purpose of the Robust Security Network (RSN) in IEEE 802.11i?

<p>To enhance the confidentiality and integrity of wireless LAN protocols (A)</p> Signup and view all the answers

What encryption method does Wi-Fi Protected Access 2 (WPA2) use?

<p>CCMP encryption method (A)</p> Signup and view all the answers

What is the purpose of the four-way handshake protocol in IEEE 802.11i?

<p>To derive keys used for confidentiality and integrity (D)</p> Signup and view all the answers

What is the main advantage of Wi-Fi Protected Access 2 (WPA2) over WEP?

<p>WPA2 provides better key management than WEP (C)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 1, where UserD uses the protocol HTTP and UserD uses WPA3 to protect its WIFI communications?

<p>No one (B)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 2, where UserD uses the protocol HTTPS and UserD uses WPA3 to protect its WIFI communications?

<p>No one (B)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 3, where UserD uses the protocol HTTP and UserD doesn’t use any protocol to protect its WIFI communications?

<p>UserE (C)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, when UserD creates a VPN connection with the VPN provider?

<p>No one (A)</p> Signup and view all the answers

Which security objective ensures that communication cannot be read by unauthorized parties in WiFi networks?

<p>Confidentiality (C)</p> Signup and view all the answers

Which security protocol used in WLANs is easily intercepted with a receiver and packet sniffer?

<p>Wired Equivalent Privacy (WEP) (D)</p> Signup and view all the answers

Which frequency range has data rates up to 1.3 Gbps and is commonly used for Wi-Fi?

<p>5 GHz (B)</p> Signup and view all the answers

What is the main difference between a wireless local area network (WLAN) and a wired network?

<p>WLANs have less reliable connections (C)</p> Signup and view all the answers

Which wireless technology became popular in the 1990s and had transmission rates of about 1 Mbps in the 900 mHz band?

<p>WLAN (A)</p> Signup and view all the answers

Which wireless technology is an open standard for short-range wireless communication between devices?

<p>Bluetooth (C)</p> Signup and view all the answers

Which wireless standard introduced security improvements and supported data rates up to 600 Mbps?

<p>802.11n (D)</p> Signup and view all the answers

Which wireless topology provides a hierarchy of stars, where individual stations connect to a WAP that connects to a higher-level WAP?

<p>Hierarchical (A)</p> Signup and view all the answers

Which wireless modulation technology is used for manipulating the medium signal to carry data in wireless communications?

<p>QAM (C)</p> Signup and view all the answers

Which encryption method is used in Wired Equivalent Privacy (WEP)?

<p>Rivest Cipher 4 (RC4) (B)</p> Signup and view all the answers

What is a weakness of the Wi-Fi Protected Access (WPA) security protocol?

<p>No user authentication (C)</p> Signup and view all the answers

Which authentication methods are used in IEEE 802.11i security?

<p>Pre-shared key (PSK) and EAP based authentication (D)</p> Signup and view all the answers

What are some compromises made in Wi-Fi Protected Access (WPA) to allow backwards compatibility?

<p>Temporal Key Integrity Protocol (TKIP) (D)</p> Signup and view all the answers

Which wireless security measure is NOT recommended for securing wireless networks?

<p>SSID hiding (B)</p> Signup and view all the answers

What is the purpose of the Robust Security Network (RSN) in IEEE 802.11i?

<p>To provide secure communication between wireless clients and access points (A)</p> Signup and view all the answers

What is the range of Bluetooth communication?

<p>Up to 300 feet (A)</p> Signup and view all the answers

Which wireless technology became popular in the 1990s and had transmission rates of about 1 Mbps in the 900 MHz band?

<p>Wi-Fi (A)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 1, where UserD uses the protocol HTTP and UserD uses WPA3 to protect its WIFI communications?

<p>None of the above (D)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 2, where UserD uses the protocol HTTPS and UserD uses WPA3 to protect its WIFI communications?

<p>None of the above (D)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 3, where UserD uses the protocol HTTP and UserD doesn’t use any protocol to protect its WIFI communications?

<p>UserE (A)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, when UserD creates a VPN connection with the VPN provider?

<p>UserC (B)</p> Signup and view all the answers

More Like This

Hybrid
16 questions

Hybrid

CherishedCurium avatar
CherishedCurium
Hybrid Vehicle Types and Characteristics
20 questions
Use Quizgecko on...
Browser
Browser