Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
Which of the following protocols provides for both authentication and encryption?a. HTTP b. HTTP-S c. S-HTTPd. HTTPS
Q:
Which protocol is used to exchange information over the World Wide Web?a. HTTP b. FTP c. NFSd. SMB
Q:
PPP supports network protocols, such as IPX/SPX, NetBEUI, and TCP/IP. _________________________
Q:
Remote access protocols are used to carry network packets over a WAN link. _________________________
Q:
X.25 is more commonly used in Europe and other countries than in the United States. _________________________
Q:
ISDN basic rate interface consists of two channels. _________________________
Q:
Mozilla is an open-source Web browser that is installed in Mac OS X by default. _________________________
Q:
In Internet Explorer, the restricted sites zone is used to designate specific sites that are safe to access. _________________________
Q:
The NFS software that was originally developed by Sun Microsystems uses remote procedure calls via TCP port 111. _________________________
Q:
With FTP, Port 20 is a control port for FTP commands that control how data is sent. _________________________
Q:
In SSL, the client makes a secure connection request, and the server replies with a digital certificate accompanied by a public key. _________________________
Q:
When used with S-HTTP, CMS is used to provide encryption for MIME data and to apply a digital signature to MIME data. ______________________________
Q:
A Windows 2000/2003 server can be set up as a VPN server by implementing Routing and Remote Access Services.
Q:
MS-CHAP v2 is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.
Q:
A VPN is a private network that is like a tunnel through a larger network.
Q:
CSLIP supports network connection authentication to prevent someone from intercepting a communication.
Q:
The maximum downstream transmission speed of ADSL is 6.0 Mbps.
Q:
Windows 2000 Professional and Windows XP Professional do not offer RAS services and rely on their server counterparts to provide this service.
Q:
Windows Server 2003 enables the installation of the Internet Explorer Enhanced Security Configuration component that should be installed to provide strong security options for this server operating system.
Q:
NFS is a connectionless protocol that runs within UDP.
Q:
Port 21 is a control port for FTP commands that controls how data is sent.
Q:
HTTPS is used primarily in native HTTP communications and does not encrypt data in IP-level communications.
Q:
What seven security techniques does Windows 2000 Professional use to support WNICs?
Q:
What two key lengths are used in WEP encryption?
Q:
What four general steps are used in the wireless communication authentication process?
Q:
List five of the common wireless security measures that can be taken to protect a wireless network.
Q:
What two approaches should be considered when planning for wireless communications?
Q:
What two things can an attacker do after successfully launching a man-in-the-middle attack?
Q:
What four main elements can an attacker use to locate a wireless network?
Q:
List the four transmission speeds available when using the 802.11b standard?
Q:
List five needs are wireless networks are designed and installed to accommodate? (List five.)
Q:
____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.
Q:
____________________ transmissions can be broadcast in a single direction or in all directions, using a LED to transmit and a photodiode to receive.
Q:
The 802.11b standard uses _____________________________________________, which is a method for radiating a data-carrying signal over radio waves.
Q:
802.11a uses _____________________________________________ which functions by dividing the 5-GHz frequency range into a series of 52 subcarriers or subchannels.
Q:
In CSMA/CA, a station waiting to transmit determines if the frequency is idle by checking the ___________________________________ level.
Q:
In ____________________ access, the access point also functions as a point coordinator.
Q:
Because a(n) ____________________ antenna radiates primarily in one direction, the signal goes farther from the source.
Q:
A(n) ____________________is a device that sends out (radiates or transmits) and picks up (receives) radio waves.
Q:
A limitation of ____________________ transmissions is that they are interrupted by tall land masses, such as hills and mountains.
Q:
____________________ are licensed by the FCC to transmit voice, Morse code, data, satellite, and video signals over radio waves and microwaves.
Q:
Does the 802.11a wireless transmission standard operate in the 5-GHz range?
Q:
In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?
Q:
Is priority-based access also called the distributed coordination function?
Q:
Does the signal gain in an indoor network generally need to be as high as for an outdoor network?
Q:
Does a directional antenna send radio waves in one main direction and generally amplify the radiated signal to a greater degree than an omnidirectional antenna?
Q:
Is an access point usually a router or switch?
Q:
Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?
Q:
Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?
Q:
Does Red Hat Linux 9.x support Bluetooth and offer the Bluetooth Setup Assistant, the Bluetooth Serial Utility, and the Bluetooth File Exchange tools?
Q:
Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?
Q:
What type of wireless network topology is being displayed in the figure above?a. ESS b. IBSS c. 802.11Rd. SOS
Q:
What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional
Q:
What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional
Q:
What type of device does an attacker use to determine the location of a target wireless network?a. Antenna b. GPS c. WNICd. War-driving software
Q:
What is the distance that most Bluetooth devices can transmit?a. 30 feet b. 60 feet c. 100 feetd. 300 feet
Q:
Which wireless roaming protocol generally conforms to the 802.11 standard?a. ESS b. IAPP c. IBSSd. IWAP
Q:
What is the name of a wireless topology that uses two or more access points?a. Multiple-cell wireless LAN b. Multi access point LAN c. Multiple-cell wireless WANd. Multi access point WAN
Q:
Which wireless network topology uses access points to provide a more extensive area of service?a. BSS b. ESS c. IBSSd. SES
Q:
What is the maximum speed of transmission for directional 802.11R?a. 1 Mbps b. 16 Mbps c. 22 Mbpsd. 56 Mbps
Q:
In which frequency range does 802.11R operate?a. 1 Ghz to 2 Ghz b. 2 Ghz to 5 Ghz c. 100 Ghz to 1000 Ghzd. 100 Ghz to 1000 Thz
Q:
Which is the most expensive wireless standard to implement?a. 802.11b b. 802.11g c. 802.11ad. They are all about the same
Q:
What is the maximum operating speed of the 802.11b standard?a. 11 Mbps b. 22 Mbps c. 56 Mbpsd. 54 Mbps
Q:
Which wireless standard should be used when there are many individual users in a small area, such as in a computer lab?a. 802.11a b. 802.11g c. 802.11bd. Both a and ce. Both a and b
Q:
What is the maximum distance that 802.11a devices can transmit?a. 60 feet b. 100 feet c. 300 feetd. 300 meters
Q:
What is the width of each channel in the 802.11b standard?a. 2.4 Ghz b. 5 Ghz c. 22 Mhzd. 11 Mhz
Q:
How many channels does the 802.11b standard use in France?a. 4 b. 6 c. 11d. 13
Q:
How many channels does the 802.11b standard use in the United States and Canada?a. 4 b. 11 c. 13d. 15
Q:
Which wireless standard usesDSSS?a. 802.11a b. 802.11b c. 802.11cd. 802.11g
Q:
Which wireless standard uses OFDM?a. 802.11a b. 802.11g c. 802.11bd. Both a and be. Both b and c
Q:
At what speed must all devices that conform to the 802.11a standard be able to transmit?a. 6 Mbps b. 12Mbps c. 24Mbpsd. All of the above
Q:
Which of the following can interfere with wireless network communications?a. Solar flares b. Physical obstacles c. Weatherd. All of the above
Q:
Which access method is incorporated into the 802.11 standard?a. Priority-based b. CSMA/CA c. CSMA/CDd. Both a and be. Both a and c
Q:
The _____ certification means the device meets the standard for Wi-Fi.a. WICA b. WLANA c. WECAd. ISO
Q:
What is the name of the device that attaches to a cabled network and services wireless communications between WNICs and the cabled network?a. Access hubb. Access switch c. Access pointd. Wireless router
Q:
Which specification enables multiple protocols to be carried over a network, and allows the computer and the computer's operating system to interface with the WNIC?a. NDIS b. ODI c. RPCd. Both a and be. Both b and c
Q:
On which layers of the OSI model does 802.11 focus?a. Physical and data-linkb. Data-link and network c. Physical onlyd. Data-link only
Q:
What is the typical data rate of spread spectrum packet transmission?a. 1-11 Mbps b. 1-22 Mbps c. 1-100 Mbpsd. 1-54 Mbps
Q:
Which radio frequency band is primarily used in older, nonstandardized wireless devices?a. 902 MHz b. 2.4 GHz c. 5 GHzd. 11 GHz
Q:
Which organization is supported by wireless network device manufacturers and promoters, including Alvarion, Cisco Systems, ELAN, Intermec, Intersil, Raylink, and Wireless Central?a. WINLAB b. WLANA c. IEEEd. WNDMO