In: Electrical Engineering
Question 41
The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?
a. |
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) |
|
b. |
Carrier Sense Single Access with Collision Adaptation (CSSA/CA) |
|
c. |
Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM) |
|
d. |
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) |
1.25 points
Question 42
The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
True
False
1.25 points
Question 43
The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes.
True
False
1.25 points
Question 44
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
True
False
1.25 points
Question 45
The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
True
False
1.25 points
Question 46
The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.
True
False
1.25 points
Question 47
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
a. |
channel bonding |
|
b. |
multiple input-multiple output (MIMO) |
|
c. |
spread spectrum frequency hopping |
|
d. |
frame aggregation |
1.25 points
Question 48
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
a. |
3 kHz and 500 GHz |
|
b. |
9 kHz and 300 GHz |
|
c. |
125 kHz and 150 GHz |
|
d. |
3 MHz and 300 GHz |
1.25 points
Question 49
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
a. |
captive portal |
|
b. |
guest network profile |
|
c. |
WPA2-Enterprise |
|
d. |
browser hijacking |
1.25 points
Question 50
Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?
a. |
frequency division multiplexing |
|
b. |
time division multiplexing |
|
c. |
statistical time division multiplexing |
|
d. |
wavelength division multiplexing |
1.25 points
Question 51
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
a. |
control frames |
|
b. |
extended frames |
|
c. |
management frames |
|
d. |
data frames |
1.25 points
Question 52
What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?
a. |
10TBase-T |
|
b. |
10GBase-T |
|
c. |
1000Base-T |
|
d. |
100Base-T |
1.25 points
Question 53
What is the industry standard angle for an Angle Polished Connector (APC)?
a. |
16 degrees |
|
b. |
14 degrees |
|
c. |
12 degrees |
|
d. |
8 degrees |
1.25 points
Question 54
What is the maximum supported throughput of a CAT6 cable?
a. |
100 Mbps |
|
b. |
1 Gbps |
|
c. |
100 Gbps |
|
d. |
10 Gbps |
1.25 points
Question 55
What is the minimum category of UTP cable required in order to support Gigabit speeds?
a. |
Cat 5 |
|
b. |
Cat 5e |
|
c. |
Cat 3 |
|
d. |
Cat 6 |
1.25 points
Question 56
What is the purpose of the Layer 2 LLC sublayer?
a. |
It is used to manage MAC addresses in message frames. |
|
b. |
It is used to handle multiplexing, flow and error control, and reliability. |
|
c. |
It performs management of the physical layer's modulation techniques. |
|
d. |
It is used to manage low-level encryption on a network. |
1.25 points
Question 57
What kind of tool can you use to measure voltage on a cable length?
a. |
time domain reflectometer |
|
b. |
light meter |
|
c. |
multimeter |
|
d. |
continuity tester |
1.25 points
Question 58
What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?
a. |
dense wavelength division multiplexing |
|
b. |
spaced wavelength division multiplexing |
|
c. |
coarse wavelength division multiplexing |
|
d. |
statistical time division multiplexing |
1.25 points
Question 59
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
a. |
RTS/CTS (Request to Send/Clear to Send) |
|
b. |
HA/RA (Hold Airtime/Reserved Airtime) |
|
c. |
RAR/CTU (Reserve Airtime Request/Clear to Use) |
|
d. |
RT/FT (Request Time/Fair Time) |
1.25 points
Question 60
What scenario describes an evil twin attack?
a. |
A hacker is actively sending wireless probes to discover available wireless networks. |
|
b. |
A malicious access point is configured with the SSID of a non-malicious public access point. |
|
c. |
An attacker is actively attempting to brute force the PIN of a WPS enabled access point. |
|
d. |
A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents. |
41.Carrier sense multiple access with collision avoidance (CSMA/CA) try to prevent or stop collisions before it happens.
42.The LLC subplayer is primarily concerned with multiplexing.that means 42 is false.
43. LC connectors used mostly for their smaller size.That means 43 is false.
44.Brute force attack can easily cracked wifi set up pins that means 44 is true.
45. 802.15 defines WPAN /BLUETOOTH.That means 45 is true.
46.WPA or WPA2 Enterprise is a secure wi-fi system which is made combining a RADIUS server.That means 46 is true.
47.Use of multiple antennas on an access point to issue a signal to one or more than one receivers is enabled by MIMO 802.11.
48. 9KHZ AND 300GHZ is the wireless spectrum as defined by FCC.
49. Captive Portal uses terms service before being connected.
50. Statistical time division multiplexing utilizing time slots accordance to priority.
51.Management frame is involved in association and reassociation including probe and beacon.
52. 10GBase-T is the fastest Ethernet standard that can possibly be used on twisted-pair cabling.
53. 8 degree is the standard angle for APC.
54. 10Gbps is the maximum supported throughput of a CAT6 cable.
55. Cat5e is the min category of UTP cable to support gigabit speed
56. Purpose of 2LLc sublayer is to handle multiplexing,flow and error control and reliability.
57. multimeter measures voltage,current,frequency,resistance.
58.Coarse wavelength division multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment.
59. Request to send and clear to send mainly used protocol in 802.11 to reserve the medium for one node uses.
60. A malicious access point is configured with the SSID of a non malicious public access point describes and evil twin attack.