(TCO 1) _____ generates the highest level of reflection. (Points : 5)
Marble
Bulletproof glass
Paper
Metal
Question 2. 2. (TCO 1) When an RF signal moves from one medium to another of a different density, the signal actually bends instead of traveling in a straight line. This is known as _____. (Points : 5)
reflection
absorption
refraction
scattering
Question 3. 3. (TCO 2) Which is the lowest frequency commonly used for unlicensed radio frequency connections? (Points : 5)
700 GHz
800 Hz
800 GHz
700 MHz
Question 4. 4. (TCO 3) Which is the only part the user of a radio can typically change? (Points : 5)
The amplifier
The mixer
The switch
The antenna
Question 5. 5. (TCO 4) Which is a problem with standards-based solutions? (Points : 5)
Standards require all parts come from the same manufacturer.
Standards are slow to be produced.
Standards are required by Part 15 of Title 47 of the CFR.
Standards are proprietary.
Question 6. 6. (TCO 5) In an infrastructure network, the beacon interval is normally set to _____ ms, although it can be modified. (Points : 5)
1
10
100
1,000
Question 7. 7. (TCO 6) Which is the shape of a Fresnel zone? (Points : 5)
Circular
Rectangular
Ellipsoidal
Elliptical
Question 8. 8. (TCO 7) Most industry experts recommend one access point for no more than _____ users if they are performing basic e-mail, light web surfing, and occasionally transferring medium-sized files. (Points : 5)
10
30
50
100
Question 9. 9. (TCO 8) A _____ VPN is a user-to-LAN connection used by remote users. (Points : 5)
remote-access
site-to-site
peer-to-peer
remote-to-LAN
Question 10. 10. (TCO 8) MAC address filtering is vulnerable because there are programs available that allow users to _____ a MAC address. (Points : 5)
spoof
break
modify
disable
(TCO 9) Which is a disadvantage of thin access points? (Points : 5)
[removed] It has complicated network management.
[removed] Hand-off time is increased.
[removed] It is very expensive.
[removed] All thin access points and switches are proprietary.
Question 2.
2.
(TCO 10) Which is an application of RFID technology? (Points : 5)
[removed] Cards with embedded RFID chips are widely used as electronic cash in casinos.
[removed] Major retailers are requiring that cases and pallets of merchandise shipped to their warehouses from large vendors have an RFID tag affixed.
[removed] Beginning in 2005, U.S. passports will have an RFID tag embedded in the document.
[removed] All of the above
Question 3.
3.
(TCO 6) With _____ broadband, also known as WiMax, the signal is transmitted between the antennas of the buildings at speeds up to 75 Mbps and at distances up to 53 kilometers (35 miles). (Points : 5)
[removed] fixed
[removed] bridges
[removed] point-to-multipoint
[removed] mesh
Question 4.
4.
(TCO 7) Access points are typically mounted on a(n) _____ to reduce interference from s.
(TCO 1) _____ generates the highest level of reflection. (Points 5.docx
1. (TCO 1) _____ generates the highest level of reflection. (Points
: 5)
Marble
Bulletproof glass
Paper
Metal
Question 2. 2. (TCO 1) When an RF signal moves from one
medium to another of a different density, the signal actually
bends instead of traveling in a straight line. This is known as
_____. (Points : 5)
reflection
absorption
refraction
scattering
Question 3. 3. (TCO 2) Which is the lowest frequency
commonly used for unlicensed radio frequency connections?
(Points : 5)
700 GHz
800 Hz
800 GHz
700 MHz
2. Question 4. 4. (TCO 3) Which is the only part the user of a
radio can typically change? (Points : 5)
The amplifier
The mixer
The switch
The antenna
Question 5. 5. (TCO 4) Which is a problem with standards-
based solutions? (Points : 5)
Standards require all parts come from the same manufacturer.
Standards are slow to be produced.
Standards are required by Part 15 of Title 47 of the CFR.
Standards are proprietary.
Question 6. 6. (TCO 5) In an infrastructure network, the beacon
interval is normally set to _____ ms, although it can be
modified. (Points : 5)
1
10
100
1,000
3. Question 7. 7. (TCO 6) Which is the shape of a Fresnel zone?
(Points : 5)
Circular
Rectangular
Ellipsoidal
Elliptical
Question 8. 8. (TCO 7) Most industry experts recommend one
access point for no more than _____ users if they are
performing basic e-mail, light web surfing, and occasionally
transferring medium-sized files. (Points : 5)
10
30
50
100
Question 9. 9. (TCO 8) A _____ VPN is a user-to-LAN
connection used by remote users. (Points : 5)
remote-access
site-to-site
peer-to-peer
remote-to-LAN
Question 10. 10. (TCO 8) MAC address filtering is vulnerable
4. because there are programs available that allow users to _____ a
MAC address. (Points : 5)
spoof
break
modify
disable
(TCO 9) Which is a disadvantage of thin access points? (Points
: 5)
[removed] It has complicated network management.
[removed] Hand-off time is increased.
[removed] It is very expensive.
[removed] All thin access points and switches are
proprietary.
Question 2.
2.
(TCO 10) Which is an application of RFID technology? (Points
: 5)
[removed] Cards with embedded RFID chips are widely
used as electronic cash in casinos.
[removed] Major retailers are requiring that cases and
pallets of merchandise shipped to their warehouses from large
vendors have an RFID tag affixed.
[removed] Beginning in 2005, U.S. passports will have an
RFID tag embedded in the document.
[removed] All of the above
Question 3.
3.
(TCO 6) With _____ broadband, also known as WiMax, the
5. signal is transmitted between the antennas of the buildings at
speeds up to 75 Mbps and at distances up to 53 kilometers (35
miles). (Points : 5)
[removed] fixed
[removed] bridges
[removed] point-to-multipoint
[removed] mesh
Question 4.
4.
(TCO 7) Access points are typically mounted on a(n) _____ to
reduce interference from surrounding objects. (Points : 5)
[removed] ceiling
[removed] ROI
[removed] bandwidth
[removed] hotspots
Question 5.
5.
(TCO 8) In a _____ attack, an attacker attempts to create every
possible key combination by using a program to systematically
change one character at a time in a possible default key and
then using each newly generated key to decrypt a message.
(Points : 5)
[removed] brute force
[removed] temporal key integrity protocol (TKIP)
[removed] social
[removed] probe request
Question 6.
6.
(TCO 9) _____ involves dividing the data to be transmitted
from one large frame into several smaller ones. (Points : 5)
6. [removed] Fragmentation
[removed] Agent
[removed] Spectrum analyzer
[removed] None of the above
Question 7.
7.
(TCO 1) A _____ transmission means that a frame is sent from
one sender to multiple receivers with a single transmit
operation. (Points : 5)
[removed] decibels
[removed] noise level
[removed] multicast
[removed] None of the above
Question 8.
8.
(TCO 8) Following authentication, if the access point accepts
the wireless device, it reserves memory space in the AP and
establishes a(n) _____ ID for it. (Points : 5)
[removed] association
[removed] device
[removed] member
[removed] authentication
Question 9.
9.
(TCO 5) When an AP accepts or rejects a wireless device, it
sends a(n) _____ frame. (Points : 5)
[removed] association request
[removed] association response
[removed] disassociation
[removed] reassociation
7. Question 10.
10.
(TCO 1) How does OFDM work? (Points : 5)
[removed] Signals are broken up and the parts are sent in
parallel.
[removed] The same signal is sent on multiple channels.
[removed] One signal is sent twice on the same channel.
[removed] A signal is sent over a wired network at the
same time as the wireless network.
There are several advantages of digital modulation over analog
modulation. What are they? (Points : 20)
Question 2. 2. (TCO 2) Explain the advantages and the
disadvantages of 2.4 GHz versus 5 GHz. (Points : 20)
Question 3. 3. (TCO 3) What is an RF amplifier? (Points : 20)
Question 4. 4. (TCO 4) List at least three advantages of
standards for wireless technology. (Points : 20)
Question 5. 5. (TCO 5) CSMA/CA reduces collisions by using
explicit frame acknowledgment. Describe how frame
acknowledgment works. (Points : 20)
8. (TCO 6) Describe a geosynchronous earth orbit. (Points : 20)
Question 2. 2. (TCO 7) When should an 802.11a network be
installed instead of an 802.11g network? (Points : 20)
Question 3. 3. (TCO 8) What is a dictionary attack? (Points :
20)
Question 4. 4. (TCO 10) What is the difference between radio
frequency identification (RFID) and a barcode? (Points : 20)
Question 5. 5. (TCO 9) What is a spectrum analyzer? (Points :
20)