Sei sulla pagina 1di 9

Name: __________________________ Date: _____________ 1. Which of the following is not a WLAN standard? A) 802.15 B) 802.11a C) 802.3 D) 802.11b E) 802.

11g

2. Which of the following is not an advantage of a WLAN? A) The ability to use the network in places where it is impractical to install a wired network. B) WLANs enable mobile users to work at different locations within an office building and stay connected to the network. C) WLANs enable business travelers to connect the Internet from within waiting areas. D) WLANs allow users to work more securely than a wired LAN. E) WLANs cost less to install and operate in most cases (except new buildings) than wired networks. 3. The IEEE designation for the most common type of wireless standard is __________. A) 802.15 B) 802.11a C) 802.3 D) 802.11b E) 802.11g

4. _____________ run at 1Mbps and 2Mbps transmission speeds. A) Direct-Sequence Spread-Spectrum B) Frequency-hopping Spread Spectrum C) Distributed Coordination Function D) Point Coordination Function

Page 1

E) Physical Layer Convergence Protocol

5. A(n) _____________ is required to connect a computer to WLAN. A) Ethernet NIC B) antennae C) wireless NIC D) access point E) hub

6. A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. A) Ethernet NIC B) antennae C) wireless NIC D) access point E) hub

7. How many channels does the 802.11b standard provide for communication between the access point and clients? A) 4 B) 6 C) 3 D) 11 E) 2

8. How can a set of 802.11b access points be configured to operate without interference? A) assigning each access point a different channel to communicate with clients B) separate each access point by more than 10 meters C) assign the same channel to no more than two access points

Page 2

D) use omnidirectional antennas on some access points and directional on others. E) none of the above

9. __________ antennas transmit the signal in all directions. A) directional B) microware C) omnidirectional D) radio E) vertical

10. __________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. A) directional B) microware C) omnidirectional D) radio E) vertical

11. CSMA/CA is an acronym for: A) Carrier Sense Multiple Access with Collision Acknowledgment B) Carrier Sense Mode Access with Carrier Avoidance C) Carrier Sense Multiple Access with Collision Avoidance D) Carrier Sensory Multiple Access without Collision Acknowledgment E) Carrier Sense Multiple Acknowledgment with Collision Avoidance

12. Another name for distributed coordination function (DCF) is __________. A) distributed carrier sense method B) physical carrier sense method

Page 3

C) physical carrier sense mode D) distributed carrier sense mode E) distributed coordination mode

13. When a computer transmit at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: A) out of range problem B) collision problem C) hidden node problem D) controlled access problem E) media access problem

14. At the physical layer, 802.11b uses radio waves which is a form of: A) digital transmission B) analog transmission C) binary transmission D) byte transmission E) circuit transmission

15. __________ refers to the range of frequencies available. A) bandwidth B) frequency C) phase D) amplitude E) broadband

16. Which is true about bandwidth? A) Bandwidth and transmission speed are not related.

Page 4

B) The larger the range of frequencies, the smaller the amount of bandwidth available. C) The greater the bandwidth, the faster we can transmit data. D) Bandwidth is usually measured in bytes/second E) The sum of the lowest and highest frequencies is the bandwidth.

17. The maximum data rate of a an 802.11a WLAN is A) 24 Mbps B) 36 Mbps C) 11 Mbps D) 54 Mbps E) 9 Mbps

18. 802.11g is backward compatible with which type of LAN? A) 802.11a B) 802.11b C) 802.15 D) 802.3 E) 802.5

19. In the U.S. 802.11g WLANs operate in the ________ band. A) 2.4 GHz B) 2.4 MHz C) 5 GHz D) 5 MHz E) 11 GHz

20. How many channels does 802.11g provide for communication with clients, A) 20

Page 5

B) 12 C) 10 D) 3-6 E) 8

21. The maximum data rate of an 802.11g WLAN is A) 24 Mbps B) 36 Mbps C) 11 Mbps D) 54 Mbps E) 9 Mbps

22. _____ is standardized as IEEE 802.15 A) Bluetooth B) Wireless Ethernet C) Token Ring D) FDDI E) VLAN

23. The maximum data rate of Bluetooth is A) 2 Mbps B) 4 Mbps C) 1 Mbps D) 11 Mbps E) 5 Mbps

24. A Bluetooth network is called ____________. A) WLAN

Page 6

B) Piconet C) LAN D) area E) WAN

25. Bluetooth operate in the ________ band. A) 2.4 GHz B) 2.4 MHz C) 5 GHz D) 5 MHz E) 11 GHz

26. Which of the following WLANs have the highest efficiency? A) 802.11a B) 802.11b C) 802.11g D) 802.15 E) a and c are equally efficient.

27. Which wireless standard will become the dominant standard of all the current standards? A) 802.11a B) 802.11b C) 802.11g D) 802.15 E) none of the above

Page 7

28. ___________ are usually provided in hallways and lunchrooms where wired network connectivity is not available and allows employees to work in these areas.. A) overlay networks B) Bluetooth C) cellular networks D) mobile networks E) Ethernet networks

29. Which of the following is not determined by a site survey? A) feasibility of the desired coverage B) potential sources of interference C) the security of the WLAN D) estimated number of access points needed to provide coverage E) current locations of the wired network into which the WLAN will connect.

30. What percentage of overlap in coverage by access points (AP) is needed to provide smooth and transparent roaming from AP to AP. A) 25 % B) 15 % C) 50 % D) 40 % E) 60 %

31. _____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. A) wardriving B) chalking C) warchalking D) marking

Page 8

E) identifying

32. The most common type of wireless security is __________ . A) EAP. B) SSID C) WEP D) EWEP E) SWEP

33. When an access point configured to use EAP discovers a new client, the access point:: A) issues a WEP key to the client B) asks the client to provide a WEP key C) requires the user authenticate against a login server D) grants the client access to the network E) none of the above

34. A major difference between Wi-Fi Protected Access (WPA) and WEP or EAP is A) WPA keys are longer than WEP keys. B) WPA keys are encrypted C) WPA keys cannot be broken by a brute force attack D) WPA keys easier to manage E) WEP keys are changed for every packet that is transmitted to the client.

Page 9

Potrebbero piacerti anche