Hybrid Wireless Topologies and Implementation Models Quiz
49 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which frequency range is commonly used for wireless transmissions with data rates up to 54 Mbps?

  • 2.4 GHz (correct)
  • 900 mHz
  • 1.3 Gbps
  • 5 GHz
  • What is a wireless access point (WAP)?

  • A device that connects computers wirelessly
  • A device that broadcasts signals to wireless receivers (correct)
  • A device that connects wired and wireless networks
  • A device that transmits signals using a radiated signal
  • What are some characteristics of wireless networks compared to wired networks?

  • They have readily observable boundaries
  • The number of devices being networked may change frequently (correct)
  • They are more reliable
  • They are not susceptible to interference from other devices
  • Which encryption protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

    <p>Advanced Encryption Standard (AES)</p> Signup and view all the answers

    Which wireless security mechanism is recommended to spot rogue access points?

    <p>Wireless IDS</p> Signup and view all the answers

    Which of the following is a Bluetooth attack that exploits the OBEX connection to grab emails and text?

    <p>Bluesnarf</p> Signup and view all the answers

    What is the new security mechanism in Bluetooth 2.1?

    <p>Secure Simple Pairing (SSP)</p> Signup and view all the answers

    Who can understand or modify the messages of UserD to the server www.example.com, in the following scenarios?

    <p>UserC</p> Signup and view all the answers

    Which security objective ensures that communication cannot be read by unauthorized parties?

    <p>Confidentiality</p> Signup and view all the answers

    Which set of protocols is used to secure wireless networks?

    <p>Wi-Fi Protected Access (WPA)</p> Signup and view all the answers

    Which wireless architecture allows any station to send and receive data from any other station?

    <p>Mesh multipoint</p> Signup and view all the answers

    Which encryption protocol is considered too weak and vulnerable to attacks?

    <p>WEP</p> Signup and view all the answers

    What are the reasons for the weakness of WEP?

    <p>No key management defined in the protocol</p> Signup and view all the answers

    Which authentication method is used in WPA2?

    <p>EAP-based authentication</p> Signup and view all the answers

    What is the main difference between WEP and WPA2?

    <p>WEP uses AES-based encryption, while WPA2 uses TKIP encryption</p> Signup and view all the answers

    Which wireless modulation technology manipulates the medium signal to carry data?

    <p>Quadrature amplitude modulation (QAM)</p> Signup and view all the answers

    Which IEEE 802.11 standard supports data rates up to 54Mbps and is backwards compatible with 802.11b?

    <p>802.11g</p> Signup and view all the answers

    Which wireless standard is an open standard for short-range wireless communication between devices, with a transmission rate of up to 1Mbps?

    <p>Bluetooth</p> Signup and view all the answers

    What is the basic building block of a wireless network that provides connection between clients and other networks?

    <p>Wireless access point (WAP)</p> Signup and view all the answers

    Which wireless standard supports data rates up to 600Mbps and includes security improvements?

    <p>802.11n</p> Signup and view all the answers

    What is the range of Bluetooth for short-range wireless communication between devices?

    <p>Up to 33 feet</p> Signup and view all the answers

    Which wireless standard is used for devices in geographically dispersed facilities with a range of up to 30 miles?

    <p>WiMAX</p> Signup and view all the answers

    Which wireless personal area network (WPAN) standard is used for monitoring and control devices?

    <p>ZigBee</p> Signup and view all the answers

    What is the basic building block of a wireless network that provides connection between clients and other networks?

    <p>Wireless access point</p> Signup and view all the answers

    Which wireless topology is also known as the hub-and-spoke model?

    <p>Star</p> Signup and view all the answers

    Which encryption protocol is used in Wi-Fi Protected Access II (WPA2)?

    <p>AES-CCMP</p> Signup and view all the answers

    Which wireless security mechanism is recommended to restrict access based on the unique identifier of a device's network interface?

    <p>MAC filtering</p> Signup and view all the answers

    Which Bluetooth attack allows an attacker to send commands to a vulnerable phone?

    <p>BlueBug</p> Signup and view all the answers

    Which wireless network implementation mode provides a temporary and spontaneous connection between devices?

    <p>Ad hoc</p> Signup and view all the answers

    Which wireless modulation technology is commonly used in modern WLANs?

    <p>IEEE 802.11</p> Signup and view all the answers

    Which Bluetooth security mechanism is recommended to enhance security in Bluetooth 2.1?

    <p>Secure Simple Pairing (SSP)</p> Signup and view all the answers

    Which security mechanism was introduced to resolve the issues with Wired Equivalent Privacy (WEP)?

    <p>WPA</p> Signup and view all the answers

    Which encryption method is used in Wi-Fi Protected Access (WPA)?

    <p>TKIP</p> Signup and view all the answers

    What is the main difference between WPA and WPA2?

    <p>WPA2 uses AES encryption, while WPA uses TKIP encryption</p> Signup and view all the answers

    What is the purpose of the Robust Security Network (RSN) in IEEE 802.11i?

    <p>To derive keys used for confidentiality and integrity</p> Signup and view all the answers

    What is the recommended authentication protocol in WPA2?

    <p>Extensible Authentication Protocol (EAP)</p> Signup and view all the answers

    What is the purpose of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) in WPA2?

    <p>To enhance confidentiality and integrity of wireless LAN protocols</p> Signup and view all the answers

    Which wireless technology became popular in the 1990s and connected computers wirelessly?

    <p>Wi-Fi</p> Signup and view all the answers

    Which frequency range is commonly used for wireless transmissions with data rates up to 54 Mbps?

    <p>2.4 GHz</p> Signup and view all the answers

    What is the main security concern regarding Bluetooth technology?

    <p>Uncontrolled signal</p> Signup and view all the answers

    Which wireless security protocol replaced TKIP in Wi-Fi Protected Access (WPA)?

    <p>WPA3</p> Signup and view all the answers

    What is the basic building block of a wireless network that provides connection between clients and other networks?

    <p>Wireless access point (WAP)</p> Signup and view all the answers

    What are some characteristics of wireless networks compared to wired networks?

    <p>Number of devices being networked may change frequently</p> Signup and view all the answers

    Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 1?

    <p>None of the above</p> Signup and view all the answers

    Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 2?

    <p>None of the above</p> Signup and view all the answers

    Who can understand or modify the messages of UserD to the server www.example.com, in Scenario 3?

    <p>UserE</p> Signup and view all the answers

    Who can understand or modify the messages of UserD to the server www.example.com, when UserD creates a VPN connection with the VPN provider?

    <p>UserC</p> Signup and view all the answers

    Which wireless security protocol is considered weak and vulnerable to attacks?

    <p>WEP</p> Signup and view all the answers

    Which wireless architecture provides point-to-multipoint connectivity and allows a station to move between adjacent BSSs without losing connectivity?

    <p>Mesh multipoint</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser