Question

In: Electrical Engineering

Question 41 The 802.11 standard specifies the use of what technique in order to minimize the...

Question 41

  1. The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

    a.

    Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    b.

    Carrier Sense Single Access with Collision Adaptation (CSSA/CA)

    c.

    Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)

    d.

    Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

1.25 points

Question 42

  1. The LLC sublayer is primarily concerned with managing MAC addresses in message frames.

    True

    False

1.25 points

Question 43

  1. The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes.

    True

    False

1.25 points

Question 44

  1. The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

    True

    False

1.25 points

Question 45

  1. The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.

    True

    False

1.25 points

Question 46

  1. The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.

    True

    False

1.25 points

Question 47

  1. The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

    a.

    channel bonding

    b.

    multiple input-multiple output (MIMO)

    c.

    spread spectrum frequency hopping

    d.

    frame aggregation

1.25 points

Question 48

  1. The wireless spectrum, as defined by the FCC, spans between which two frequencies?

    a.

    3 kHz and 500 GHz

    b.

    9 kHz and 300 GHz

    c.

    125 kHz and 150 GHz

    d.

    3 MHz and 300 GHz

1.25 points

Question 49

  1. Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

    a.

    captive portal

    b.

    guest network profile

    c.

    WPA2-Enterprise

    d.

    browser hijacking

1.25 points

Question 50

  1. Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?

    a.

    frequency division multiplexing

    b.

    time division multiplexing

    c.

    statistical time division multiplexing

    d.

    wavelength division multiplexing

1.25 points

Question 51

  1. What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

    a.

    control frames

    b.

    extended frames

    c.

    management frames

    d.

    data frames

1.25 points

Question 52

  1. What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?

    a.

    10TBase-T

    b.

    10GBase-T

    c.

    1000Base-T

    d.

    100Base-T

1.25 points

Question 53

  1. What is the industry standard angle for an Angle Polished Connector (APC)?

    a.

    16 degrees

    b.

    14 degrees

    c.

    12 degrees

    d.

    8 degrees

1.25 points

Question 54

  1. What is the maximum supported throughput of a CAT6 cable?

    a.

    100 Mbps

    b.

    1 Gbps

    c.

    100 Gbps

    d.

    10 Gbps

1.25 points

Question 55

  1. What is the minimum category of UTP cable required in order to support Gigabit speeds?

    a.

    Cat 5

    b.

    Cat 5e

    c.

    Cat 3

    d.

    Cat 6

1.25 points

Question 56

  1. What is the purpose of the Layer 2 LLC sublayer?

    a.

    It is used to manage MAC addresses in message frames.

    b.

    It is used to handle multiplexing, flow and error control, and reliability.

    c.

    It performs management of the physical layer's modulation techniques.

    d.

    It is used to manage low-level encryption on a network.

1.25 points

Question 57

  1. What kind of tool can you use to measure voltage on a cable length?

    a.

    time domain reflectometer

    b.

    light meter

    c.

    multimeter

    d.

    continuity tester

1.25 points

Question 58

  1. What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?

    a.

    dense wavelength division multiplexing

    b.

    spaced wavelength division multiplexing

    c.

    coarse wavelength division multiplexing

    d.

    statistical time division multiplexing

1.25 points

Question 59

  1. What optional protocol can be used in 802.11 to reserve the medium for one node's use?

    a.

    RTS/CTS (Request to Send/Clear to Send)

    b.

    HA/RA (Hold Airtime/Reserved Airtime)

    c.

    RAR/CTU (Reserve Airtime Request/Clear to Use)

    d.

    RT/FT (Request Time/Fair Time)

1.25 points

Question 60

  1. What scenario describes an evil twin attack?

    a.

    A hacker is actively sending wireless probes to discover available wireless networks.

    b.

    A malicious access point is configured with the SSID of a non-malicious public access point.

    c.

    An attacker is actively attempting to brute force the PIN of a WPS enabled access point.

    d.

    A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.

Solutions

Expert Solution

41.Carrier sense multiple access with collision avoidance (CSMA/CA) try to prevent or stop collisions before it happens.

42.The LLC subplayer is primarily concerned with multiplexing.that means 42 is false.

43. LC connectors used mostly for their smaller size.That means 43 is false.

44.Brute force attack can easily cracked wifi set up pins that means 44 is true.

45. 802.15 defines WPAN /BLUETOOTH.That means  45 is true.

46.WPA or WPA2 Enterprise is a secure wi-fi system which is made combining a RADIUS server.That means 46 is true.

47.Use of multiple antennas on an access point to issue a signal to one or more than one receivers is enabled by MIMO 802.11.

48. 9KHZ AND 300GHZ is the wireless spectrum as defined by FCC.

49. Captive Portal uses terms service before being connected.

50. Statistical time division multiplexing utilizing time slots accordance to priority.

51.Management frame is involved in association and reassociation including probe and beacon.

52. 10GBase-T is the fastest Ethernet standard that can possibly be used on twisted-pair cabling.

53. 8 degree is the standard angle for APC.

54. 10Gbps is the maximum supported throughput of a CAT6 cable.

55. Cat5e is the min category of UTP cable to support gigabit speed

56. Purpose of 2LLc sublayer is to handle multiplexing,flow and error control and reliability.

57. multimeter measures voltage,current,frequency,resistance.

58.Coarse wavelength division multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment.

59. Request to send and clear to send mainly used protocol in 802.11 to reserve the medium for one node uses.

60. A malicious access point is configured with the SSID of a non malicious public access point describes and evil twin attack.


Related Solutions

Use the technique developed in this section to solve the minimization problem. Minimize   C = −3x...
Use the technique developed in this section to solve the minimization problem. Minimize   C = −3x − 2y − z subject to   −x + 2y − z ≤ 12 x − 2y + 2z ≤ 15 2x + 4y − 3z ≤ 18 x ≥ 0, y ≥ 0, z ≥ 0   The minimum is C = at (x, y, z) = .
Please use the PICO technique to answer the research question "What are the health consequences of...
Please use the PICO technique to answer the research question "What are the health consequences of obesity in childhood?" Also find peer-reviewed articles that supports each aspect of PICO. You dont need to cite, just copy-paste the URL. PICO techniques are: 1. Problem/ patient/ population 2. Intervention/ indicator 3. Comparison and 4) Outcome Answer in paragraphs.
Suggest, as a budget accountant, what procedures you would advise in order to minimize the likelihood...
Suggest, as a budget accountant, what procedures you would advise in order to minimize the likelihood of such biased estimate arising.
Use the Black-Scholes formula for the following stock: Time to expiration 6 months Standard deviation 41%...
Use the Black-Scholes formula for the following stock: Time to expiration 6 months Standard deviation 41% per year Exercise price $42 Stock price $42 Annual interest rate 7% Dividend 0 Recalculate the value of the call with the following changes: a. Time to expiration 3 months b. Standard deviation 20% per year c. Exercise price $50 d. Stock price $50 e. Interest rate 9% Calculate each scenario independently. (Round your answers to 2 decimal places.) C rises or falls for...
State at least two research problems or question that requires the use of the Chi-Square Technique
State at least two research problems or question that requires the use of the Chi-Square Technique
1. To minimize the chance of losses, what process should a contractor use for updating the...
1. To minimize the chance of losses, what process should a contractor use for updating the schedule, if litigation is expected? 2. Explain how prefabrication can change the critical path of a schedule. 3. For the ISU Chiller Plant, how did craft workers lift heavy items inside the plant?
Question 1: a) What are the advantages and disadvantages of each technique? ( Be specific about...
Question 1: a) What are the advantages and disadvantages of each technique? ( Be specific about each type of chromatography as well as extraction) b) When would the application of each technique be appropriate? c) What are the factors that affect the separation of substances in each technique? 1) Is it better to do a series of small volume extractions or one large one? Explain why. 2) TLC: What factors affect the Rf values? 3) Column Chromatography: What factors affect...
what sampling technique would u use to select the sample study
what sampling technique would u use to select the sample study
describe the fundaments of the IR following technique (what do you use it for?)
describe the fundaments of the IR following technique (what do you use it for?)
Use the z-table provided and answer the following questions. 41. What is the proportion of scores...
Use the z-table provided and answer the following questions. 41. What is the proportion of scores greater than z = 1.15? 42. What is the proportion of scores less than z = 1.73? 43. What is the proportion of scores greater than z = -0.90? 44. What is the proportion of scores between z = -1.04 and z = 1.39? 45. What is the proportion of scores between z = 1.08 and z = 1.21? 46. If the proportion of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT