f aculty of c omputer s cience & e ngineering chapter 04.wireless lan infrastructure devices and...
TRANSCRIPT
![Page 1: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/1.jpg)
FACULTY OF
COMPUTER SCIENCE & ENGINEERING
Chapter 04 .Wireless LAN Infrastructure Devices and 802.11 Network Architecture
![Page 2: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/2.jpg)
QUESTION 1
1. A client that can transmit data over a
wireless network is considered to be which of
the following? Choose all that apply.
A. Unauthenticated
B. Unassociated
C. Authenticated
D. Associated
![Page 3: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/3.jpg)
QUESTION 2
2. Which one of the following supports
Authentication, Authorization, and
Accounting (AAA)?
A. Open System authentication
B. Shared Key authentication
C. Open System and Shared Key authentication
D. 802.11
E. None of the above
![Page 4: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/4.jpg)
QUESTION 3
3. A basic service set has how many access
points?
A. None
B. 1
C. 2
D. Unlimited
![Page 5: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/5.jpg)
QUESTION 4
4. Shared Key authentication is more secure
than Open System authentication.
A. This statement is always true
B. This statement is always false
C. It depends on whether or not WEP is utilized
![Page 6: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/6.jpg)
QUESTION 5
5. A traffic indication map (TIM) is populated
with station information when using which
one of the following power management
features in a basic or extended service set?
A. Continuous aware mode
B. Continuous power mode
C. Power save polling mode
D. Power aware polling mode
![Page 7: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/7.jpg)
QUESTION 6
6. An ad hoc traffic indication message
(ATIM) is sent when using which one of the
following power management features in an
independent basic service set?
A. Continuous aware mode
B. Continuous power mode
C. Power save polling mode
D. Power aware polling mode
![Page 8: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/8.jpg)
QUESTION 7
7. An independent basic service set is also
commonly referred to as which one of the
following?
A. Ad hoc mode
B. Infrastructure mode
C. Network mode
D. Power save polling mode
![Page 9: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/9.jpg)
QUESTION 8
8. The 802.11 standard specifies which of the
following authentication processes? Choose
all that apply.
A. Open System authentication
B. 802.1x/EAP
C. Shared Key authentication
D. RADIUS
![Page 10: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/10.jpg)
QUESTION 9
9. Using power save polling mode (PSP) in a
wireless LAN will result in which of the
following? Choose all that apply.
A. Increased throughput on the network due to
less overhead traffic
B. Decreased throughput on the network due to
more overhead traffic
C. Network traffic is not effected by using PSP
D. Longer battery life on the clients that use PSP
![Page 11: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/11.jpg)
QUESTION 10
10. In an ad hoc network, every client station
buffers packets.
A. This statement is always true
B. This statement is always false
C. It depends on whether one station is acting as
a gateway
![Page 12: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/12.jpg)
QUESTION 11
11. Which of the following are functions of the
beacon frame?
A. Load balancing all clients across multiple access
points
B. Broadcasting the SSID so that clients can
connect to the access point
C. Synchronizing the time between the access
point and clients
D. Allowing client authentication with the access
point when using Shared Key authentication
![Page 13: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/13.jpg)
QUESTION 12
12. What is passive scanning used for in a
wireless LAN?
A. Allows clients to authenticate with an access
point
B. Allows clients to actively search for any access
points within range
C. Reduces the time it takes clients to locate and
associate to access points when roaming
D. Helps determine which bridge the client will
connect to
![Page 14: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/14.jpg)
QUESTION 13
13. What does the acronym "SSID" stand for?
A. Security Set Identifier
B. Service Set Information Directory
C. Service Set Identifier
D. Security Service Information Dependency
![Page 15: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/15.jpg)
QUESTION 14
14. The process of authentication and
association has how many distinct states?
A. 1
B. 2
C. 3
D. 4
E. 5
![Page 16: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/16.jpg)
QUESTION 15
15. Why is Shared Key authentication
considered a security risk?
A. The access point transmits the challenge text
in the clear and receives the same challenge text
encrypted with the WEP key
B. The keys are shared via broadcast with all
network nodes
C. A hacker could see the keys with a sniffer
D. The WEP keys used on all computers are the
same
![Page 17: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/17.jpg)
QUESTION 16
16. What is a basic service set?
A. The basic components of a wireless LAN
B. All clients in a wireless LAN that are being
serviced by one access point
C. The area around an access point which can be
serviced by the access point
D. One or more access points transmitting an RF
signal
![Page 18: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/18.jpg)
QUESTION 17
17. In a basic service set, or BSS, the access
point must operate in which mode?
A. Repeater
B. Router
C. Bridge
D. Infrastructure
E. Gateway
![Page 19: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/19.jpg)
QUESTION 18
18. An IBSS can also be called which of the
following? Choose all that apply.
A. Peer-to-peer
B. Indifferent Basic Service Set
C. Ad hoc network
D. Internet Bindery Set Solution
![Page 20: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/20.jpg)
Wireless LAN
Infrastructure Devices
![Page 21: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/21.jpg)
QUESTION 1
1. Why would it not be a good idea to have a
number of access points in repeater mode in
series? Choose all that apply.
A. Throughput would be reduced to unacceptable levels
B. The access points would all be required to be
physically connected to the network
C. Data corruption can occur over the series of hops
back to the root access point
D. Legacy serial devices would not be able to
communicate with the root access point
![Page 22: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/22.jpg)
QUESTION 2
2. You are installing a wireless LAN in a
factory, and the laptop client computers have
no USB support. Which one of the following
client devices could be used as a stand-alone
client connection to the wireless LAN?
A. ISA adapter
B. PCI adapter
C. PCMCIA card
D. Ethernet converter
![Page 23: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/23.jpg)
QUESTION 3
3. You need to connect two wired networks
together that currently share no network
connectivity between them. Using only
access points to connect the networks, what
mode would the access points need to be
placed in?
A. Root mode
B. Repeater mode
C. Bridging mode
![Page 24: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/24.jpg)
QUESTION 4
4. When an access point connects to another
access point wirelessly for the purpose of
extending the wireless segments to client out
of range of the access point connected to the
wired segment, the access point not connected
to the wired LAN segment is in ______ mode.
A. Root
B. Repeater
C. Bridge
![Page 25: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/25.jpg)
QUESTION 5
5. Wireless bridges are used for which of the
following functions? Choose all that apply.
A. Connecting mobile users to the wired LAN
B. Point-to-multipoint configurations
C. Building-to-building connectivity
D. Wireless security
![Page 26: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/26.jpg)
QUESTION 6
6. Properly aligning two wireless bridges will
optimize their throughput. This statement is:
A. Always true
B. Always false
C. Depends on the manufacturer
![Page 27: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/27.jpg)
QUESTION 7
7. Your friend owns a small business, and asks
you what he could buy to provide lowcost
wireless Internet access for his 5 salespeople
in the office. Which one of the following
devices would be an appropriate solution?
A. Access point
B. Wireless workgroup bridge
C. Enterprise wireless gateway
D. Wireless residential gateway
![Page 28: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/28.jpg)
QUESTION 1
8. A company has hired you to recommend
wireless LAN equipment that will allow them
to place limits on the bandwidth used by
each of their wireless users. Which one of the
following devices would you recommend?
A. Access point
B. Wireless workgroup bridge
C. Enterprise wireless gateway
D. Wireless residential gateway
![Page 29: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/29.jpg)
QUESTION 9
9. In a situation in which you need to allow
outdoor users to connect to your network via
a wireless LAN, which one of the following
features would allow you to use an indoor
access point with an outdoor antenna?
A. Antenna diversity
B. Detachable antennas
C. Plug and play support
D. Modular radio cards
![Page 30: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/30.jpg)
QUESTION 10
10. Which of the following wireless client
devices would not be a plug–n-play device?
A. USB Client
B. PCMCIA Card
C. ISA Card
D. Compact Flash Card
![Page 31: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/31.jpg)
QUESTION 11 11. Your client has a number of sales people that are located
in a remote office building.Each sales person has both a PC
and a laptop. The client wants to purchase a hardware
solution that will permit each sales person to have wireless
network connectivity for his or her PC and laptop. Only the
PC or the laptop needs network access at any given time,
and both have USB support. Which of the following solutions
would work? Choose all that apply.
A. 1 PCMCIA card
B. 1 PCMCIA card, 1 PCI adapter
C. 1 PCMCIA card, 1 USB adapter
D. 1 PCMCIA card, 1 CF card
![Page 32: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/32.jpg)
QUESTION 12
12. You have configured an access point in a small
office and are concerned about hackers intruding on
your wireless network. What settings will you adjust
(from the manufacturer’s default settings) on the unit
to address this potential problem? Choose all that
apply.
A. Detachable antennas
B. MAC Filtering
C. Radio card position
D. Output power
E. WEP configuration
![Page 33: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/33.jpg)
QUESTION 13
13. Which of the following are common
security options that most wireless
residential gateways include? Choose all that
apply.
A. PPPoE – Point-to-Point Protocol over Ethernet
B. Virtual Servers
C. Routing
D. PAT – Port Address Translation
E. VPN Client or VPN Client Passthrough
![Page 34: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/34.jpg)
QUESTION 14
14. Which of the following are wired
connectivity options that a wireless bridge
can include? Choose all that apply.
A. 10baseTx
B. 10baseFL
C. 10/100baseTx
D. 1000baseSX
E. 100baseFx
![Page 35: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/35.jpg)
QUESTION 15
15. A workgroup bridge is a(n) ______ device.
A. Client
B. Infrastructure
C. Gateway
D. Antenna
![Page 36: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/36.jpg)
QUESTION 16
16. Which one of the following is not a
hardware or software option on a wireless
bridge?
A. Fixed or detachable antennas
B. Advanced filtering capabilities
C. Removable (modular) radio cards
D. Full duplex radio links
E. Varied Types of Wired Connectivity
![Page 37: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/37.jpg)
QUESTION 17
17. Ethernet and serial converters are used
with devices having which of the following
physical connectivity? Choose all that apply.
A. 9-pin serial ports
B. Ethernet ports
C. USB Ports
D. Parallel Ports
![Page 38: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/38.jpg)
QUESTION 18
18. Why is an access point considered a
portal?
A. An access point allows client connectivity from
an 802.11 network to either
802.3 or 802.5 networks
B. An access point always connects users to the
Internet
C. An access point connects clients to one
another
D. An access point is a gateway to another
collision domain
![Page 39: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/39.jpg)
QUESTION 1
19. The statement that an access point is a
half duplex wireless device is which one of
the following?
A. Always true
B. Always false
C. Dependent on the maker of the access point
![Page 40: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/40.jpg)
QUESTION 1
20. A USB adapter is used with which type of
wireless LAN device?
A. Gateway
B. Access point
C. Bridge
D. Client
E. Converter
![Page 41: F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and 802.11 Network Architecture](https://reader035.vdocuments.us/reader035/viewer/2022081516/551763975503463e368b4818/html5/thumbnails/41.jpg)
The End