JAWABAN CHAPTER 7 QUIZ:
1.why is ieee 802.11 wireless technology able to transmit further distances than Bluetooth technology:
· Transmits at much lower frequencies
· Has higher power output
· Transmits at much higher frequencies
· Uses better encryption methods
2.what are three advantages of wireless over wired LAN technology?(choose three)
· Lower on going costs
· Longer transmission distances
· Ease of installation
· Easily expandable
· Higher level of security
· Cheaper host adapters
3.in which scenario would wireless security be most important?
· Your wireless mouse uses he irDA port on your destop PC
· The local coffee shop provides free internet access as a wireless hot spot
· A real estate agent sends imformation on sale of a house through a cell phone
· Two users create a wireless peer to peer network in order to share a music file
4.which wireless technology standard provides the most compatibility with older wireless standards,but has greater performance?
· 802.11a
· 802.11b
· 802.11g
· 802.11n
5.drag the characteristic on the left to the WLAN component on he right
| Wireless client |
| Participates as a host devicein a wireless network |
| Referred to as a STA |
| Access point |
| Acts as a media converter |
| Controls access beween a wired and wireless network |
| Wireless bridge |
| Connect two wired networks through a wireless link |
| Allows long range point to point connections between network |
6.drag the characteristic on the left to the installation type on te right
| Ad-hoc |
| Usually a less expensive network |
| Two or more wireless clients in peer to peer |
| Does not include an AP |
| Infrastructure mode |
| Individual STAs do not communicate directly with each other |
| an AP controls who talks and when |
| Larger network require this type of instalation |
7.what is CSMA/CA on a network?
· An access method used by wireless technology o avoid duplicate SSIDs
· An access method used by any technology that has excessive collisions
· An access method used by wired Ethernet technology to avoid collisions
· An access method used by wireless technology to avoid collisions
8.drag the ststement on the left to the category on the right
| true |
| A wireless hacker within radio range of any access point could launch an attack |
| If someone you don’t know gains access o your wireless network,they can use your internet connection |
| False |
| The purpose of war challing is o attack a wireless nework and deny access o the internet to the wireless network owner |
| A wireless attacker needs pyisical access to your network in order to launch an attack |
9.what statement is true about authentication using pre shared keys when EAP is enabled?
· Uses a key to encrypt a random string of bytes sent by the AP
· Requires a backend authentication server such as RADIUS
· Performs one way authentication only
· Allows client to associate based on MAC addres
10.when is client considered to be authenticated when only mac addres filtering is enabled on the access point?
· When the client gives the access points the correct
· When the client sends the mac address to the access point
· When the access points verifies that the mac address is in the mac table and sends a confirmation message to the client
· When the access point sends the mac address to the server and receives notification that the mac address is a valid one
11.drag the statement on the left to the category on the right
| true |
| A mac address of a pc can be used by another pc controlled by another one |
| The mac address filtering feature requires manual entry of approved mac addresses |
| false |
| The mac address filtering feaure requires EAP to be enabled |
| A wireless access point with mac filtering configuredbdisables non authorized wireless NICs |
12.drag the term on the left to the category on the right.note that all terms will be used
| authentification |
| Open |
| Pre-shared keys |
| EAP |
| encription |
| WPA |
| WEP |
Tidak ada komentar:
Posting Komentar