Review Questions
Use the questions here to review what you learned in this chapter. The correct answers can be found in the appendix, "Answers to Chapter Review Questions."
-
What is the most tangible benefit of wireless implementation?
- Cost reduction
- Increased mobility
- Better productivity
- Improved security
-
What method does a WLAN use to control transmissions?
- CSMA/CA (carrier sense multiple access with collision avoidance)
- CSMA/CD (carrier sense multiple access collision detect)
- CSMA/CR (carrier sense multiple access with collision rejection)
- CSMA/CW (carrier sense multiple access with collision weighting)
-
Match each factor that influences the transmission of radio waves to its correct description.
- ____ Occurs when RF waves bounce off metal or glass surfaces
- ____ Occurs when RF waves are soaked up by walls
- ____ Occurs when RF waves strike an uneven surface and are reflected in many directions
- absorption
- reflection
- scattering
-
Which regulatory agency controls the 801.11 standard that governs WLANs?
- Wi-Fi Alliance
- IEEE
- EMA
- WISC
-
Which organization offers certification for interoperability among vendors of 802.11 products?
- Wi-Fi
- IEEE
- EMA
- WISC
-
Which two are the unlicensed bands used by WLANs?
- 2.4-MHz band
- 900-MHz band
- 2.4-GHz band
- 5-GHz band
- 900-GHz band
-
Which two of the 802.11 standards has the highest possible data rates?
- 802.11
- 802.11a
- 802.11b
- 802.11d
- 802.11g
-
Which 802.11 standard transmits using the 5-GHz band?
- 802.11
- 802.11a
- 802.11b
- 802.11d
- 802.11g
-
Which is true about the Wi-Fi Alliance organization?
- It is a global standards organization that controls the compatibility of Wi-Fi products.
- It operates only in the United States and ensures the compatibility of Wi-Fi products.
- It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LANs.
- It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations.
-
What is a rogue access point?
- An access point that has an open WEP key
- An access point that is broadcasting its SSID
- An unsecured access point that has been placed on a WLAN
- An access point that has had a hardware failure that causes it to endlessly broadcast its SSID
-
Which three are the steps to secure a WLAN?
- Encryption for providing privacy and confidentiality
- Authentication to ensure that legitimate clients and users access the network via trusted access points
- Controls to transmit power to limit the access point access range to the property boundaries of the parent organization
- Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
-
Which standard provides the strongest level of WLAN security?
- EAP
- WEP
- WPA
- 802.11i/WPA2
-
What factor determines which access point a client associates with?
- The access point with the lowest SSID
- The access point with the highest SSID
- The access point whose SSID is received first
- The access point that is received with the strongest signal
-
When you are using 802.11x, how is the client authenticated?
- The client is authenticated against a local database stored on the access point.
- The access point forwards all network traffic to the server where it is either authenticated or blocked.
- The access point encapsulates any 802.1x traffic bound for the authentication server and sends it to the server.
- The client encapsulates the 802.1x authentication traffic before sending it to the access point. This causes the access point to forward it to the server.
-
Which is true when comparing WPA and WPA2?
- WPA uses preshared keys whereas WPA 2 uses PSK.
- WPA uses EAP authentication whereas WPA 2 uses 802.11x.
- WPA uses a Personal Mode whereas WPA 2 uses an Enterprise Mode.
- WPA uses TKIP/MIC encryption whereas WPA 2 uses AES-CCMP encryption.
-
Match each of the following 802.11 topologies to its description.
- ___ Mobile clients connect directly without an intermediate access point.
- ___ The communication devices use a single access point for connectivity to each other or to wired network resources.
- ___ The wireless topology is two or more service sets connected by a distribution system (DS) or, more commonly, a wired infrastructure.
- Ad hoc mode
- Basic Service Set (BSS)
- Extended Services Set (ESS)
-
What does the physical area of radio frequency coverage provided by an access point define?
- The RF service area
- The basic service area
- The ad hoc service area
- The extended services area
-
When implementing Extended Service Areas, how much overlap is suggested?
- 5 to 10 percent
- 10 to 15 percent
- 15 to 20 percent
- 25 to 30 percent
-
What strategy enables a client to communicate while moving?
- The ability to shift data rates
- The ability to vary transmit levels
- The ability to match the transmit level to the receive level
- The ability to perform error correction as the signal level changes
-
Which three are basic wireless access point parameters?
- SSID
- Authentication
- Data exchange rates
- Transmit band selection
- RF channel with optional power
-
When implementing a WLAN, when should you use WEP?
- Only if an AAA server is available
- When you need the increased security of WEP
- When you are planning to enable 802.11x authentication
- Only if the hardware equipment does not support WPA
-
Match the wireless client to its description.
- ___ Full-featured supplicant for both wired and wireless client
- ___ Windows operating systems basic wireless supplicant client
- ___ More advanced wireless client features than those of native operating system
- WZC
- Cisco Compatible Extensions
- Cisco Secure Services Client