Hybrid Wireless Topologies and Implementation Models Quiz
49 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which frequency range is commonly used for wireless transmissions with data rates up to 54 Mbps?

  • 2.4 GHz (correct)
  • 900 mHz
  • 1.3 Gbps
  • 5 GHz

What is a wireless access point (WAP)?

  • A device that connects computers wirelessly
  • A device that broadcasts signals to wireless receivers (correct)
  • A device that connects wired and wireless networks
  • A device that transmits signals using a radiated signal

What are some characteristics of wireless networks compared to wired networks?

  • They have readily observable boundaries
  • The number of devices being networked may change frequently (correct)
  • They are more reliable
  • They are not susceptible to interference from other devices

Which encryption protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

<p>Advanced Encryption Standard (AES) (D)</p> Signup and view all the answers

Which wireless security mechanism is recommended to spot rogue access points?

<p>Wireless IDS (A)</p> Signup and view all the answers

Which of the following is a Bluetooth attack that exploits the OBEX connection to grab emails and text?

<p>Bluesnarf (C)</p> Signup and view all the answers

What is the new security mechanism in Bluetooth 2.1?

<p>Secure Simple Pairing (SSP) (C)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in the following scenarios?

<p>UserC (B)</p> Signup and view all the answers

Which security objective ensures that communication cannot be read by unauthorized parties?

<p>Confidentiality (A)</p> Signup and view all the answers

Which set of protocols is used to secure wireless networks?

<p>Wi-Fi Protected Access (WPA) (B)</p> Signup and view all the answers

Which wireless architecture allows any station to send and receive data from any other station?

<p>Mesh multipoint (A)</p> Signup and view all the answers

Which encryption protocol is considered too weak and vulnerable to attacks?

<p>WEP (B)</p> Signup and view all the answers

What are the reasons for the weakness of WEP?

<p>No key management defined in the protocol (A)</p> Signup and view all the answers

Which authentication method is used in WPA2?

<p>EAP-based authentication (A)</p> Signup and view all the answers

What is the main difference between WEP and WPA2?

<p>WEP uses AES-based encryption, while WPA2 uses TKIP encryption (B)</p> Signup and view all the answers

Which wireless modulation technology manipulates the medium signal to carry data?

<p>Quadrature amplitude modulation (QAM) (A)</p> Signup and view all the answers

Which IEEE 802.11 standard supports data rates up to 54Mbps and is backwards compatible with 802.11b?

<p>802.11g (C)</p> Signup and view all the answers

Which wireless standard is an open standard for short-range wireless communication between devices, with a transmission rate of up to 1Mbps?

<p>Bluetooth (B)</p> Signup and view all the answers

What is the basic building block of a wireless network that provides connection between clients and other networks?

<p>Wireless access point (WAP) (C)</p> Signup and view all the answers

Which wireless standard supports data rates up to 600Mbps and includes security improvements?

<p>802.11n (D)</p> Signup and view all the answers

What is the range of Bluetooth for short-range wireless communication between devices?

<p>Up to 33 feet (C)</p> Signup and view all the answers

Which wireless standard is used for devices in geographically dispersed facilities with a range of up to 30 miles?

<p>WiMAX (A)</p> Signup and view all the answers

Which wireless personal area network (WPAN) standard is used for monitoring and control devices?

<p>ZigBee (C)</p> Signup and view all the answers

What is the basic building block of a wireless network that provides connection between clients and other networks?

<p>Wireless access point (C)</p> Signup and view all the answers

Which wireless topology is also known as the hub-and-spoke model?

<p>Star (D)</p> Signup and view all the answers

Which encryption protocol is used in Wi-Fi Protected Access II (WPA2)?

<p>AES-CCMP (D)</p> Signup and view all the answers

Which wireless security mechanism is recommended to restrict access based on the unique identifier of a device's network interface?

<p>MAC filtering (D)</p> Signup and view all the answers

Which Bluetooth attack allows an attacker to send commands to a vulnerable phone?

<p>BlueBug (D)</p> Signup and view all the answers

Which wireless network implementation mode provides a temporary and spontaneous connection between devices?

<p>Ad hoc (D)</p> Signup and view all the answers

Which wireless modulation technology is commonly used in modern WLANs?

<p>IEEE 802.11 (A)</p> Signup and view all the answers

Which Bluetooth security mechanism is recommended to enhance security in Bluetooth 2.1?

<p>Secure Simple Pairing (SSP) (A)</p> Signup and view all the answers

Which security mechanism was introduced to resolve the issues with Wired Equivalent Privacy (WEP)?

<p>WPA (C)</p> Signup and view all the answers

Which encryption method is used in Wi-Fi Protected Access (WPA)?

<p>TKIP (A)</p> Signup and view all the answers

What is the main difference between WPA and WPA2?

<p>WPA2 uses AES encryption, while WPA uses TKIP encryption (B)</p> Signup and view all the answers

What is the purpose of the Robust Security Network (RSN) in IEEE 802.11i?

<p>To derive keys used for confidentiality and integrity (C)</p> Signup and view all the answers

What is the recommended authentication protocol in WPA2?

<p>Extensible Authentication Protocol (EAP) (D)</p> Signup and view all the answers

What is the purpose of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) in WPA2?

<p>To enhance confidentiality and integrity of wireless LAN protocols (B)</p> Signup and view all the answers

Which wireless technology became popular in the 1990s and connected computers wirelessly?

<p>Wi-Fi (B)</p> Signup and view all the answers

Which frequency range is commonly used for wireless transmissions with data rates up to 54 Mbps?

<p>2.4 GHz (D)</p> Signup and view all the answers

What is the main security concern regarding Bluetooth technology?

<p>Uncontrolled signal (B)</p> Signup and view all the answers

Which wireless security protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

<p>WPA3 (A)</p> Signup and view all the answers

What is the basic building block of a wireless network that provides connection between clients and other networks?

<p>Wireless access point (WAP) (C)</p> Signup and view all the answers

What are some characteristics of wireless networks compared to wired networks?

<p>Number of devices being networked may change frequently (A)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 1?

<p>None of the above (D)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 2?

<p>None of the above (D)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 3?

<p>UserE (A)</p> Signup and view all the answers

Who can understand or modify the messages of UserD to the server www.example.com, when UserD creates a VPN connection with the VPN provider?

<p>UserC (B)</p> Signup and view all the answers

Which wireless security protocol is considered weak and vulnerable to attacks?

<p>WEP (A)</p> Signup and view all the answers

Which wireless architecture provides point-to-multipoint connectivity and allows a station to move between adjacent BSSs without losing connectivity?

<p>Mesh multipoint (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser