Part 1
Question 1. _____ generates the highest level of reflection.
Marble
Bulletproof glass
Paper
Metal
Question 2. When an RF signal moves from one medium to another of a different density, the signal actually bends instead of traveling in a straight line. This is known as _____.
reflection
absorption
refraction
scattering
Question 3. Which is the lowest frequency commonly used for unlicensed radio frequency connections?
700 GHz
800 Hz
800 GHz
700 MHz
Question 4. Which is the only part the user of a radio can typically change?
The amplifier
The mixer
The switch
The antenna
Question 5. Which is a problem with standards-based solutions?
Standards require all parts come from the same manufacturer.
Standards are slow to be produced.
Standards are required by Part 15 of Title 47 of the CFR.
Standards are proprietary.
Question 6. In an infrastructure network, the beacon interval is normally set to _____ ms, although it can be modified.
1
10
100
1,000
Question 7. Which is the shape of a Fresnel zone?
Circular
Rectangular
Ellipsoidal
Elliptical
Question 8. Most industry experts recommend one access point for no more than _____ users if they are performing basic e-mail, light web surfing, and occasionally transferring medium-sized files.
10
30
50
100
Question 9. A _____ VPN is a user-to-LAN connection used by remote users.
remote-access
site-to-site
peer-to-peer
remote-to-LAN
Question 10. MAC address filtering is vulnerable because there are programs available that allow users to _____ a MAC address.
spoof
break
modify
disable
Part 2
Question 1. Which is a disadvantage of thin access points?
It has complicated network management.
Hand-off time is increased.
It is very expensive.
All thin access points and switches are proprietary.
Question 2. Which is an application of RFID technology?
Cards with embedded RFID chips are widely used as electronic cash in casinos.
Major retailers are requiring that cases and pallets of merchandise shipped to their warehouses from large vendors have an RFID tag affixed.
Beginning in 2005, U.S. passports will have an RFID tag embedded in the document.
All of the above
Question 3. With _____ broadband, also known as WiMax, the signal is transmitted between the antennas of the buildings at speeds up to 75 Mbps and at distances up to 53 kilometers (35 miles).
fixed
bridges
point-to-multipoint
mesh
Question 4. Access points are typically mounted on a(n) _____ to reduce interference from surrounding objects.
ceiling
ROI
bandwidth
hotspots
Question 5. In a _____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key and then using each newly generated key to decrypt a message.
brute force
temporal key integrity protocol (TKIP)
social
probe request
Question 6. _____ involves dividing the data to be transmitted from one large frame into several smaller ones.
Fragmentation
Agent
Spectrum analyzer
None of the above
Question 7. A _____ transmission means that a frame is sent from one sender to multiple receivers with a single transmit operation.
decibels
noise level
multicast
None of the above
Question 8. Following authentication, if the access point accepts the wireless device, it reserves memory space in the AP and establishes a(n) _____ ID for it.
association
device
member
authentication
Question 9. When an AP accepts or rejects a wireless device, it sends a(n) _____ frame.
association request
association response
disassociation
reassociation
Question 10. How does OFDM work?
Signals are broken up and the parts are sent in parallel.
The same signal is sent on multiple channels.
One signal is sent twice on the same channel.
A signal is sent over a wired network at the same time as the wireless network.
Part 3
Question 1. There are several advantages of digital modulation over analog modulation. What are they?
Question 2. Explain the advantages and the disadvantages of 2.4 GHz versus 5 GHz.
Question 3. What is an RF amplifier?
Question 4. Lst at least three advantages of standards for wireless technology.
Question 5. CSMA/CA reduces collisions by using explicit frame acknowledgment. Describe how frame acknowledgment works.
Part 4
Question 1. Describe a geosynchronous earth orbit.
Question 2. When should an 802.11a network be installed instead of an 802.11g network?
Question 3. What is a dictionary attack?
Question 4. What is the difference between radio frequency identification (RFID) and a barcode?
Question 5. What is a spectrum analyzer?