Question 41
The 802.11 standard specifies the use of what technique in order
to minimize the potential...
70.2K
Verified Solution
Link Copied!
Question
Electrical Engineering
Question 41
The 802.11 standard specifies the use of what technique in orderto minimize the potential for collisions?
a.
Carrier Sense Multiple Access with Collision Detection(CSMA/CD)
b.
Carrier Sense Single Access with Collision Adaptation(CSSA/CA)
c.
Carrier Sense Multiple Access with Collision Mitigation(CMSA/CM)
d.
Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)
1.25 points
Question 42
The LLC sublayer is primarily concerned with managing MACaddresses in message frames.
True
False
1.25 points
Question 43
The ST and SC fiber connectors are the most commonly foundconnectors due to their smaller sizes.
True
False
1.25 points
Question 44
The Wi-Fi Protected Setup PIN can be easily cracked through abrute force attack.
True
False
1.25 points
Question 45
The Wireless Personal Area Network (WPAN) is defined in the802.15 standard.
True
False
1.25 points
Question 46
The most secure Wi-Fi communication is made possible bycombining a RADIUS server with WPA or WPA2, known as WPA-Enterpriseor WPA2-Enterprise, respectively.
True
False
1.25 points
Question 47
The use of multiple antennas on an access point to issue asignal to one or more receivers is enabled by what 802.11innovation?
a.
channel bonding
b.
multiple input-multiple output (MIMO)
c.
spread spectrum frequency hopping
d.
frame aggregation
1.25 points
Question 48
The wireless spectrum, as defined by the FCC, spans betweenwhich two frequencies?
a.
3 kHz and 500 GHz
b.
9 kHz and 300 GHz
c.
125 kHz and 150 GHz
d.
3 MHz and 300 GHz
1.25 points
Question 49
Upon connecting to a Wi-Fi network, you're redirected to a loginscreen and a request to accept terms of service before beingconnected. What is this an example of?
a.
captive portal
b.
guest network profile
c.
WPA2-Enterprise
d.
browser hijacking
1.25 points
Question 50
Utilizing time slots that are adjusted according to priority andneed is an example of what type of multiplexing on copperlines?
a.
frequency division multiplexing
b.
time division multiplexing
c.
statistical time division multiplexing
d.
wavelength division multiplexing
1.25 points
Question 51
What 802.11 frame type is involved in association andreassociation, including probe and beacon frames?
a.
control frames
b.
extended frames
c.
management frames
d.
data frames
1.25 points
Question 52
What is the fastest Ethernet standard that can possibly be usedon twisted-pair cabling?
a.
10TBase-T
b.
10GBase-T
c.
1000Base-T
d.
100Base-T
1.25 points
Question 53
What is the industry standard angle for an Angle PolishedConnector (APC)?
a.
16 degrees
b.
14 degrees
c.
12 degrees
d.
8 degrees
1.25 points
Question 54
What is the maximum supported throughput of a CAT6 cable?
a.
100 Mbps
b.
1 Gbps
c.
100 Gbps
d.
10 Gbps
1.25 points
Question 55
What is the minimum category of UTP cable required in order tosupport Gigabit speeds?
a.
Cat 5
b.
Cat 5e
c.
Cat 3
d.
Cat 6
1.25 points
Question 56
What is the purpose of the Layer 2 LLC sublayer?
a.
It is used to manage MAC addresses in message frames.
b.
It is used to handle multiplexing, flow and error control, andreliability.
c.
It performs management of the physical layer's modulationtechniques.
d.
It is used to manage low-level encryption on a network.
1.25 points
Question 57
What kind of tool can you use to measure voltage on a cablelength?
a.
time domain reflectometer
b.
light meter
c.
multimeter
d.
continuity tester
1.25 points
Question 58
What multiplexing technology lowers cost by spacing frequencybands wider apart to allow for cheaper transceiver equipment?
a.
dense wavelength division multiplexing
b.
spaced wavelength division multiplexing
c.
coarse wavelength division multiplexing
d.
statistical time division multiplexing
1.25 points
Question 59
What optional protocol can be used in 802.11 to reserve themedium for one node's use?
a.
RTS/CTS (Request to Send/Clear to Send)
b.
HA/RA (Hold Airtime/Reserved Airtime)
c.
RAR/CTU (Reserve Airtime Request/Clear to Use)
d.
RT/FT (Request Time/Fair Time)
1.25 points
Question 60
What scenario describes an evil twin attack?
a.
A hacker is actively sending wireless probes to discoveravailable wireless networks.
b.
A malicious access point is configured with the SSID of anon-malicious public access point.
c.
An attacker is actively attempting to brute force the PIN of aWPS enabled access point.
d.
A hacker is utilizing a protocol analyzer on a public Wi-Finetwork to discover packet contents.
Answer & Explanation
Solved by verified expert
4.0 Ratings (814 Votes)
41Carrier sense multiple access with collision avoidance CSMACA try to prevent or stop collisions before it happens 42The LLC subplayer is primarily concerned with multiplexingthat means 42 is false 43 LC connectors used mostly for their smaller sizeThat means 43 is false 44Brute force attack can easily cracked wifi set up pins that means 44
See Answer
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
Unlimited Question Access with detailed Answers
Zin AI - 3 Million Words
10 Dall-E 3 Images
20 Plot Generations
Conversation with Dialogue Memory
No Ads, Ever!
Access to Our Best AI Platform: Zin AI - Your personal assistant for all your inquiries!