Sabtu, 30 Oktober 2010

chapter 7 quiz


JAWABAN CHAPTER 7 QUIZ:
1.why is ieee 802.11 wireless technology able to transmit further distances than Bluetooth technology:
·         Transmits at much lower frequencies
·         Has higher power output
·         Transmits at much higher frequencies
·         Uses better encryption methods
2.what are three advantages of wireless over wired LAN technology?(choose three)
·         Lower on going costs
·         Longer transmission distances
·         Ease of installation
·         Easily expandable
·         Higher level of security
·         Cheaper host adapters
3.in which scenario would wireless security be most important?
·         Your wireless mouse uses he irDA port on your destop PC
·         The local coffee shop provides free internet access as a wireless hot spot
·         A real estate agent sends imformation on sale of a house through a cell phone
·         Two users create a wireless peer to peer network in order to share a music file
4.which wireless technology standard provides the most compatibility with older wireless standards,but has greater performance?
·         802.11a
·         802.11b
·         802.11g
·         802.11n
5.drag the characteristic on the left to the WLAN component on he right
Wireless client
Participates as a host devicein a wireless network
Referred to as a STA
Access point
Acts as a media converter
Controls access beween a wired and wireless network
Wireless bridge
Connect two wired networks through a wireless link
Allows long range point to point connections between network

6.drag the characteristic on the left to the installation type on te right
Ad-hoc
Usually a less expensive network
Two or more wireless clients in peer to peer
Does not include an AP
Infrastructure mode
Individual STAs do not communicate directly with each other
an AP controls who talks and when
Larger network require this type of instalation

7.what is CSMA/CA on a network?
·         An access method used by wireless technology o avoid duplicate SSIDs
·         An access method used by any technology that has excessive collisions
·         An access method used by wired Ethernet technology to avoid collisions
·         An access method used by wireless technology to avoid collisions
8.drag the ststement on the left to the category on the right
true
A wireless hacker within radio range of any access point could launch an attack
If someone you don’t know gains access o your wireless network,they can use your internet connection
False
The purpose of war challing is o attack a wireless nework and deny access o the internet to the wireless network owner
A wireless attacker needs pyisical access to your network in order to launch an attack

9.what statement is true about authentication using pre shared keys when EAP is enabled?
·         Uses a key to encrypt a random string of bytes sent by the AP
·         Requires a backend authentication server such as RADIUS
·         Performs one way authentication only
·         Allows client to associate based on MAC addres
10.when is client considered to be authenticated when only mac addres filtering is enabled on the access point?
·         When the client gives the access points the correct
·         When the client sends the mac address to the access point
·         When the access points verifies that the mac address is in the mac table and sends a confirmation message to the client
·         When the access point sends the mac address to the server and receives notification that the mac address is a valid one
11.drag the statement on the left to the category on the right
true
A mac address of a pc can be used by another pc controlled by another one
The mac address filtering feature requires manual entry of approved mac addresses
false
The mac address filtering feaure requires EAP to be enabled
A wireless access point with mac filtering configuredbdisables non authorized wireless NICs

12.drag the term on the left to the category on the right.note that all terms will be used
authentification
Open
Pre-shared keys
EAP
encription
WPA
WEP

Tidak ada komentar:

Posting Komentar