Beruflich Dokumente
Kultur Dokumente
• 1.3 GHz
• 2.4 GHz
• 5.7 GHz
• 10 GHz
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 1
Why do wireless NICs not detect collisions?
If wireless devices are on opposite sides of the access point and are too far
apart to sense each other, the hidden node problem occurs. What is this
problem?
Which device does a Cisco wireless access point most resemble in its
behaviour?
• An Ethernet hub
• An Ethernet layer 2 switch
• An Ethernet layer 3 switch
• A router
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 2
• Devices take turns to transmit, and can do so when they hold the
token.
Which device typically combines the roles of wireless access point, Ethernet
switch, and router?
• Modem
• Layer 3 switch
• Wireless router
• Wireless NIC
A single access point and the devices connected to it are known as:
• A BSS
• An ESS
• An ESA
• An ad hoc topology
• It causes interference.
• It causes collisions.
• It limits the area covered by an access point.
• It limits the number of access points in an ESS.
What name is commonly given to people who look for unsecured wireless
networks and use them to gain Internet access?
• Hackers
• Crackers
• Surfers
• War drivers
• Channel 1.
• Channel 2 or higher number.
• Channel 4 or higher number.
• Channel 6 or higher number.
• At least 10 cm
• At least 20 cm
• At least 50 cm
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 3
• At least 1 m
• At least 1 foot
• At least 2 feet
• At least 3 feet
• At least 4 feet
• Horizontally
• Vertically
• At an angle of 45 degrees
• At the same height as the wireless devices
What is CSMA/CA?
Which is true of an extended service set, where several access points with
overlapping coverage areas are deployed on a network?
• The overlap in coverage must not be more than 5% otherwise there will
be interference and poor performance.
• The access points should use the same SSID so that mobile devices
can roam from one area to another.
• The access points should use different SSIDs for security purposes.
• The access points must use different RF wave bands.
• None.
• One: open authentication.
• Two: open authentication and shared key.
• Three: open authentication, shared key and TKIP.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 4
• Four: open authentication, shared key, TKIP and AES.
Where possible, wireless networks should use security that follows the
802.11i standard. This is equivalent to:
• TKIP
• WEP
• WPA
• WPA2
What are the effects of modifying a wireless NIC so that it accepts all traffic
and not just traffic destined for its own MAC address? (Choose 2)
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 5
How could an attacker who has modified his laptop’s wireless NIC mount a
denial of service attack? (Choose 2)
Why do some people choose to leave SSID broadcasts enabled rather than
disabling them?
In which order does a wireless device carry out procedures for connecting to a
wireless network?
How should you set the channel on your access point for best performance?
(Choose 2)
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 6
Which statements are true of a RADIUS server? (Choose 2)
• Probing
• Associating
• Beaconing
• Advertising
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch6874/48941313.doc 7