Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (86)
A temporary peer-to-peer mode network.
Infrastructure wireless network
An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network.
Service set identifier (SSID)
The network name.
Multiple-input multiple-output (MIMO)
An enhancement that allows multiple antennas to use the same radio frequency.
Combining channels into one to increase bandwidth.
Multi-user multiple-input multiple-output (MU-MIMO)
An enhancement to MIMO that allows a set of devices with individual antennas, rather than just one device with an antenna, to communicate with each other.
Dual-band access point
A network device that connects Wi-Fi devices to form a Wi-Fi network.
A token-based authentication standard that requires a MAC address to use.
Shared key authentication
A wireless network access protocol that uses WEP.
An authentication standard that uses username/passwords, certificates, or devices such as smart cards to authenticate clients.
Wired Equivalent Privacy (WEP)
An optional component of the 802.11 specifications.
Wi-Fi Protected Access (WPA)
A wireless security based on 802.11i specifications.
Wi-Fi Protected Access II (WPA2)
A wireless security that adheres to 802.11i specifications.
Multiple-Input, Multiple-Output (MIMO)
MIMO uses multiple antennas for transmission and reception. These antennas do not interfere with one another, thanks to MIMO's use of spatial multiplexing, which encodes data based on the antenna from which the data will be transmitted. Both reliability and throughput can be increased with MIMO's simultaneous use of multiple antennas.
Two channels that do not overlap are used together in an effort to double the physical data rate.
Open authentication requires that clients provide a MAC address in order to connect to the wireless network.
With shared key authentication, clients and APs are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients. Originally designed for Ethernet networks, the 802.1x standards have been adapted for use in wireless networks to provide secure authentication. 802.1x authentication requires the following components:
Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz?
Which of the following wireless networking standards uses a frequency of 5 GHz and supports transmission speeds up to 1.3 Gbps?
The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies? (Select TWO).
1. Channel bonding to combine more channels in the 5ghz band to allow for up to 160 mhz wide channels2. Mu-MIMO to allow multiple users to use the same channel.
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select TWO.)
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
Which of the following are characteristics of the 802.11g wireless standard? (Select THREE.)
1. Operates in the 2.4 Ghz range
2. Maximum bandwidth of 54 Mbps
3. Backwards compatibles with 802.11b devices
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?
Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?
One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. This customer needs to share files between computers, print to a centrally located printer, and have access to the internet.
Which of the following print solutions would BEST meet this client's needs?
Configure a Wi-Fi infrastructure network.
A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased.
Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?
While configuring a wireless access point device, a technician is presented with several security mode options.
Which of the following options will provide the most secure access?
WPA2 and AES
Communication technology that uses invisible light waves.
Communication technology that uses radio waves in the 2.4 ghz range.
Near-field communication (NFC)
Communication technology that enables communication between two devices in close proximity.
A user pays for a retail purchase by placing a smart phone next to the merchant's reader.
Which of the following mobile device connections is being used?
You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?
What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices?
Which of the following are characteristics of Bluetooth? (Select TWO.)
1. 2.4 GHz radio wireless
2. Ad hoc connections
Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices?
You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information.
Which of the following would be the BEST choice?
Up to 100 meters for Class 1 devices.
Up to 30 meters in areas without interference.
Up to 10 meters for Class 2 devices.
A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside, it works sporadically.
Which of the following would BEST resolve this issue? (Select TWO).
1. Block direct and reflected sunlight from the pathway between the PC and the printer
2. Move the printer closer to the computer
A user has purchased an external speaker to play music from a mobile device over a wireless connection.
Which of the following actions is MOST likely needed for speaker connectivity.
Which of the following wireless communication technologies can be described as follows?
Has a very limited transmission range of less than two inches
Used with credit cards and passports
Slower than other wireless technologies
Constantly emits a signal
Which of the following is not an example of wireless networking communications?
Small home/home office network (SOHO)
A small office/home office network.
Network Address Translation (NAT)
A method for remapping one IP address space into another by modifying network address information in packets' IP headers while they are in transit.
Wi-Fi protected setup (WPS)
A network security standard for wireless home networks/
A profile designed for networks in which you know and trust every device.
A profile designed to be used in a SOHO.
A profile designed for use on unknown networks.
You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
Install a WorkGroup to allow each device to control what is shared and with whom.
A technician is installing a new SOHO wireless router.
Which of the following is the FIRST thing the technician should do to secure the router?
Change the router's default password
A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate while browsing the web.
Which of the following actions would help accomplish this goal?
Enable content filtering
A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification.
Which of the following actions should the technician take NEXT?
Check for and apply firmware updates.
A technician is installing a network-enabled smart home control system in a SOHO.
To access the system from the internet, which of the following configurations is MOST likely required on the SOHO router?
A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet.
Which of the following configuration changes on the SOHO router is MOST likely to improve VoIP performance?
Change QoS settings to give VoIP traffic more priority.
A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet.
Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?
Configure the SOHO router for NAT.
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.
Which of the following features lets you allow or reject client connections by hardware address?
MAC address filtering
A technician is tasked with preparing a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.
Which of the following network devices would be the BEST choice for this connectivity?
A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect.
Which of the following router settings should the technician change?
Enable MAC filtering
Which of the following is used on a wireless network to identify the network name?
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select TWO.)
Near backup generators
Near cordless phones
Which of the following is true when the DHCP setting is disabled in a wireless network?
Wireless clients must use a static IP address within the correct IP address range to connect to the network.
The internet of things.
A smart speaker that controls your smart appliances and performs other actions through voice commands.
An IoT standard based protocol.
IoT standard based protocol. Simpler and less expensive than Zigbee.
What are the two protocols used most often with IoT devices? (Select TWO.)
Which frequencies does Zigbee operate on?
2.4 GHz, 900 MHz, and 868 MHz
What is the maximum number of nodes Z-Wave allows on its mesh network?
Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjust itself depending on ambient conditions?
Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals?
Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off?
Easy solution for making small appliances, such as lamps, coffee makers, and toasters, smart?
Uses an RF transmitter.. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage?
Uses a wireless protocol and cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device?
Uses voice recognition software and activities through a Wake Word of Hot Word?
What are two major concerns regarding IoT devices? (Select TWO.)
Portable devices have a software-controlled switch that disables all wireless functionality.
What is the name of this software-controlled switch?
Which of the following are antenna types that are commonly used in wireless networks? (Select TWO).
- omni directional antenna
- directional antenna
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable runs 75 feet from the wall outlet and then passes through the ceiling and over several florescent light fixtures before reaching the client system.
Which of the following is the MOST likely cause of the connectivity problem?
A user on your network has been moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection.
Which of the following is MOST likely the cause of the problem?
The client system has moved too far away from the access point.`
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works.
Which of the following is the MOST likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point on her floor.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator.
Which of the following is the MOST likely cause of her connectivity problem?
Interference is affecting the wireless signal.
Students also viewed
Periodic Table #1
CLCP 2233 Lesson 8
Week 6: Constantine
Other sets by this creator
Module 14, Module 15, Module 13, Module 12, Module…