Question 41 The 802.11 standard specifies the use of what technique in order to minimize the potential...

70.2K

Verified Solution

Question

Electrical Engineering

Question 41

  1. The 802.11 standard specifies the use of what technique in orderto minimize the potential for collisions?

    a.

    Carrier Sense Multiple Access with Collision Detection(CSMA/CD)

    b.

    Carrier Sense Single Access with Collision Adaptation(CSSA/CA)

    c.

    Carrier Sense Multiple Access with Collision Mitigation(CMSA/CM)

    d.

    Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)

1.25 points

Question 42

  1. The LLC sublayer is primarily concerned with managing MACaddresses in message frames.

    True

    False

1.25 points

Question 43

  1. The ST and SC fiber connectors are the most commonly foundconnectors due to their smaller sizes.

    True

    False

1.25 points

Question 44

  1. The Wi-Fi Protected Setup PIN can be easily cracked through abrute force attack.

    True

    False

1.25 points

Question 45

  1. The Wireless Personal Area Network (WPAN) is defined in the802.15 standard.

    True

    False

1.25 points

Question 46

  1. The most secure Wi-Fi communication is made possible bycombining a RADIUS server with WPA or WPA2, known as WPA-Enterpriseor WPA2-Enterprise, respectively.

    True

    False

1.25 points

Question 47

  1. The use of multiple antennas on an access point to issue asignal to one or more receivers is enabled by what 802.11innovation?

    a.

    channel bonding

    b.

    multiple input-multiple output (MIMO)

    c.

    spread spectrum frequency hopping

    d.

    frame aggregation

1.25 points

Question 48

  1. The wireless spectrum, as defined by the FCC, spans betweenwhich two frequencies?

    a.

    3 kHz and 500 GHz

    b.

    9 kHz and 300 GHz

    c.

    125 kHz and 150 GHz

    d.

    3 MHz and 300 GHz

1.25 points

Question 49

  1. Upon connecting to a Wi-Fi network, you're redirected to a loginscreen and a request to accept terms of service before beingconnected. What is this an example of?

    a.

    captive portal

    b.

    guest network profile

    c.

    WPA2-Enterprise

    d.

    browser hijacking

1.25 points

Question 50

  1. Utilizing time slots that are adjusted according to priority andneed is an example of what type of multiplexing on copperlines?

    a.

    frequency division multiplexing

    b.

    time division multiplexing

    c.

    statistical time division multiplexing

    d.

    wavelength division multiplexing

1.25 points

Question 51

  1. What 802.11 frame type is involved in association andreassociation, including probe and beacon frames?

    a.

    control frames

    b.

    extended frames

    c.

    management frames

    d.

    data frames

1.25 points

Question 52

  1. What is the fastest Ethernet standard that can possibly be usedon twisted-pair cabling?

    a.

    10TBase-T

    b.

    10GBase-T

    c.

    1000Base-T

    d.

    100Base-T

1.25 points

Question 53

  1. What is the industry standard angle for an Angle PolishedConnector (APC)?

    a.

    16 degrees

    b.

    14 degrees

    c.

    12 degrees

    d.

    8 degrees

1.25 points

Question 54

  1. What is the maximum supported throughput of a CAT6 cable?

    a.

    100 Mbps

    b.

    1 Gbps

    c.

    100 Gbps

    d.

    10 Gbps

1.25 points

Question 55

  1. What is the minimum category of UTP cable required in order tosupport Gigabit speeds?

    a.

    Cat 5

    b.

    Cat 5e

    c.

    Cat 3

    d.

    Cat 6

1.25 points

Question 56

  1. What is the purpose of the Layer 2 LLC sublayer?

    a.

    It is used to manage MAC addresses in message frames.

    b.

    It is used to handle multiplexing, flow and error control, andreliability.

    c.

    It performs management of the physical layer's modulationtechniques.

    d.

    It is used to manage low-level encryption on a network.

1.25 points

Question 57

  1. What kind of tool can you use to measure voltage on a cablelength?

    a.

    time domain reflectometer

    b.

    light meter

    c.

    multimeter

    d.

    continuity tester

1.25 points

Question 58

  1. What multiplexing technology lowers cost by spacing frequencybands wider apart to allow for cheaper transceiver equipment?

    a.

    dense wavelength division multiplexing

    b.

    spaced wavelength division multiplexing

    c.

    coarse wavelength division multiplexing

    d.

    statistical time division multiplexing

1.25 points

Question 59

  1. What optional protocol can be used in 802.11 to reserve themedium for one node's use?

    a.

    RTS/CTS (Request to Send/Clear to Send)

    b.

    HA/RA (Hold Airtime/Reserved Airtime)

    c.

    RAR/CTU (Reserve Airtime Request/Clear to Use)

    d.

    RT/FT (Request Time/Fair Time)

1.25 points

Question 60

  1. What scenario describes an evil twin attack?

    a.

    A hacker is actively sending wireless probes to discoveravailable wireless networks.

    b.

    A malicious access point is configured with the SSID of anon-malicious public access point.

    c.

    An attacker is actively attempting to brute force the PIN of aWPS enabled access point.

    d.

    A hacker is utilizing a protocol analyzer on a public Wi-Finetwork to discover packet contents.

Answer & Explanation Solved by verified expert
4.0 Ratings (814 Votes)
41Carrier sense multiple access with collision avoidance CSMACA try to prevent or stop collisions before it happens 42The LLC subplayer is primarily concerned with multiplexingthat means 42 is false 43 LC connectors used mostly for their smaller sizeThat means 43 is false 44Brute force attack can easily cracked wifi set up pins that means 44    See Answer
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students