JAWABAN CHAPTER 7 QUIZ:
1.why is ieee 802.11 wireless technology able to transmit further distances than Bluetooth technology:
· Transmits at much lower frequencies
· Has higher power output
· Transmits at much higher frequencies
· Uses better encryption methods
2.what are three advantages of wireless over wired LAN technology?(choose three)
· Lower on going costs
· Longer transmission distances
· Ease of installation
· Easily expandable
· Higher level of security
· Cheaper host adapters
3.in which scenario would wireless security be most important?
· Your wireless mouse uses he irDA port on your destop PC
· The local coffee shop provides free internet access as a wireless hot spot
· A real estate agent sends imformation on sale of a house through a cell phone
· Two users create a wireless peer to peer network in order to share a music file
4.which wireless technology standard provides the most compatibility with older wireless standards,but has greater performance?
· 802.11a
· 802.11b
· 802.11g
· 802.11n
5.drag the characteristic on the left to the WLAN component on he right
Wireless client |
Participates as a host devicein a wireless network |
Referred to as a STA |
Access point |
Acts as a media converter |
Controls access beween a wired and wireless network |
Wireless bridge |
Connect two wired networks through a wireless link |
Allows long range point to point connections between network |
6.drag the characteristic on the left to the installation type on te right
Ad-hoc |
Usually a less expensive network |
Two or more wireless clients in peer to peer |
Does not include an AP |
Infrastructure mode |
Individual STAs do not communicate directly with each other |
an AP controls who talks and when |
Larger network require this type of instalation |
7.what is CSMA/CA on a network?
· An access method used by wireless technology o avoid duplicate SSIDs
· An access method used by any technology that has excessive collisions
· An access method used by wired Ethernet technology to avoid collisions
· An access method used by wireless technology to avoid collisions
8.drag the ststement on the left to the category on the right
true |
A wireless hacker within radio range of any access point could launch an attack |
If someone you don’t know gains access o your wireless network,they can use your internet connection |
False |
The purpose of war challing is o attack a wireless nework and deny access o the internet to the wireless network owner |
A wireless attacker needs pyisical access to your network in order to launch an attack |
9.what statement is true about authentication using pre shared keys when EAP is enabled?
· Uses a key to encrypt a random string of bytes sent by the AP
· Requires a backend authentication server such as RADIUS
· Performs one way authentication only
· Allows client to associate based on MAC addres
10.when is client considered to be authenticated when only mac addres filtering is enabled on the access point?
· When the client gives the access points the correct
· When the client sends the mac address to the access point
· When the access points verifies that the mac address is in the mac table and sends a confirmation message to the client
· When the access point sends the mac address to the server and receives notification that the mac address is a valid one
11.drag the statement on the left to the category on the right
true |
A mac address of a pc can be used by another pc controlled by another one |
The mac address filtering feature requires manual entry of approved mac addresses |
false |
The mac address filtering feaure requires EAP to be enabled |
A wireless access point with mac filtering configuredbdisables non authorized wireless NICs |
12.drag the term on the left to the category on the right.note that all terms will be used
authentification |
Open |
Pre-shared keys |
EAP |
encription |
WPA |
WEP |
Tidak ada komentar:
Posting Komentar