NAME

Question types


Start with


Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. data link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).
  2. transmission of frames to a subset of the machines on the broadcast network.
  3. - associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.
  4. - developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz
  5. - needs to establish an end to end path before transmission.
    - analogue networks.
    - ISDN
    - PPP
  6. - based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES

6 True/False questions

  1. Blue tooth- available in a range of mobile devices.
    - operates in both ad-hoc mode and infrastructure mode.
    - by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
    - only authenticates devices, not users.
    - vulnerable to buffer over flow.

          

  2. 802.11a- developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz

          

  3. Point to point protocol (PPP)- needs to establish an end to end path before transmission.
    - analogue networks.
    - ISDN
    - PPP

          

  4. SSID- straight out of the box, no security configured at all.
    - WAPs are usually configured to broadcast their presence.
    - each wireless network node and access point needs the same SSID.
    - could choose not to broadcast SSID.
    - Also could implement MAC filtering.

          

  5. Main task of the data link layer- used for router-to-router traffic, and home user to ISP traffic.
    - handle error detection.
    - allows IP addresses to be negotiated.
    - so used in dial up it will set-up the connection with ISP and negotiate an IP address.
    - replaced SLIP in many uses.

          

  6. Packet-switching- chatty.
    - no dedicated path required.

          

Create Set