Sunteți pe pagina 1din 14

1. Ce caracteristica a favorizat adoptarea standardului 802.11g in favoarea standardului 802.11a?

a. 802.11a ofera o arie de acoperire mai mica decat 802.11g


b. banda de frecventa de 2.4 GHz nu este la fel de aglomerata ca cea de 5 GHz
c. 802.11a este mai susceptibil la interferenta RF din partea dispozitivelor wireless comerciale
d. 802.11a foloseste o tehnica de modulare mai scumpa decat 802.11g
e. 802.11a foloseste o tehnica de modulare mai complicata, spre deosebire de 802.11g

2. Care dintre urmatoarele afirmatii este adevarata?


a. 802.11i foloseste 3DES pentru criptare
b. Autentificarea deschisa nu foloseste verificarea clientului/Ap-ului
c. Protocolul 802.11i este identic d.p.d.v functional cu WPA
d. 802.11i nu incorporeaza un server RADIUS pentru autentificarea enterprise
e. Un client wireless se asociaza in prima faza cu un AP apoi se autentific pentru accesul la retea

3. Ce metoda de instalare va permite conectivitatea la o noua retea wireless?


a. Setarea protocolului WEP doar pe AP
b. Setarea accesului deschis atat pe AP cat si pe fiecare echipament conectat la acesta
c. Setarea criptarii totale pe AP si a accesului deschis pe fiecare echipament conectat la acesta
d. Setarea criptarii totale pe fiecare echipament din WLAN si a accesului deschis pe AP

4. Atunci cand se configureaza un AP, ce setare utilizeaza administratorul de retea pentru a


configura identificatorul unic pe care echipamentul client il foloseste pentru a distinge reteaua
wireless de alte retele wireless?
a. Network Mode
b. Network Name (SSID)
c. Radio Band
d. Wide Channel
e. Base Channel
5. Care dintre urmatoarele afirmatii sunt adevarate cu privire la securitatea wireless (alegeti
doua)?
a. Filtrarea pe baza adreselor MAC previne vizualizarea continutului frame-urilor wireless
b. Oferirea unei chei de retea clientului wireless permite ca o retea disponibila sa fie vizibila
c. Inhibarea transmiterii broadcast de catre AP a SSID-ului previne ca AP-ul sa fie descoperit
d. SSID-urile implicite ale producatorilor de AP-uri sunt in general cunoscute si permit
conexiuni wireless ndeorite
e. Adaugarea manuala a unei retele si setarea SSID-ului pe un client wireless determina
vizibilitatea retelei chiar daca SSID-ul nu este trimis broadcast

6. Ce echipamente/functionalitati incorporeaza majoritatea rutelor wirless (alegeti trei):


a. Un gateway pentru conectarea cu alte infrastructuri de retea
b. Un switch Ethernet
c. Statie de management de retea
d. Server VIP
e. AP wireless

7. Ce metoda de acces foloseste un AP wireless pentru a permite conectivitatea mai multor


utilizatori si accesul distribuit?
a. CSMA/CD
b. Token passing
c. CMSA/CA
d. Sondare
e. Acces direct

8. De ce este securitatea importanta in retelele wireless?


a. Retelele wireless sunt in general mai lente decat retelele cablate
b. Statiile de televiziune si alte echipamente pot interfera cu semnale wireless
c. Retelele wireless transmit date broadcast intr-un mediu ce permite un acces facil
d. Factori de mediu precum furtunile pot afecta retelele wireless
9. Ce standard wireless ofera o buna compatibilitate cu alte standarde wireless mai vechi, dar are
performante superioare?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.16

10. Ce caracterizeaza securitatea retelelor wireless?


a. Retelel wireless ofera aceleasi caracterisitic de securitate ca si retelele cablate
b.Folosirea criptarii previne clientii neautorizati de asocierea cu un AP
c. Un atacator are nevoie de acces fizic la cel putin un echipament de retea pentru a lansa un atac
d. Daca este dezactivat broadcast-ul SSID, un atactor trebuie intai sa „adulmece” SSID-ul
inainte de a se putea conecta

11. Ce caracteristica a securitatii wireless permite unui administrator de retea sa configureze un


AP cu adresele MAC ale placilor de retea astfel incat doar acele placi sa se conecteze la reteaua
wireless?
a. Autentificarea
b. SSID broadcasting
c. Filtrarea pe baza adreselor MAC
d. EAP (Extensible Authentification Protocol)
e. Radius (Remote Authentification Dial-In User Service)

12. Ce transmite un client wireless pentru a descoperi retelele WLAN disponibile?


a. Un beacon
b. O parola
c Un probe request
d. Un association request
e. Un SSID
13. Intr-o retea WLAN, de ce este nevoie ca implementarea AP-urilor sa se faca astfel incat
fiecare AP sa foloseasca un canal diferit de comunicatie?
a. Pentru a mentine utilizatorii in sub-retelele separate
b. Pentru a controla latimea de banda utilizata
c. Pentru a preveni interferenta semnalelor
d. Pentru a asigura securitatea traficului

14. Ce rol are autentificarea intr-o retea WLAN?


a. Converteste datele in text clar inaintea transmisiei
b. Indica ce canal de comunicatie va fi folosit pentru date
c. Determina ce client utilizeaza reteaua
d. Permite clientului sa-si aleaga canalul de comunicatie folosit

15. Ce functie de baza este oferita de catre un AP wireless?


a. Converteste datele din 802.11 in incapsularea frame-urilor 802.3
b. Ofera servicii DHCP locale
c. Atribuie dinamic o adresa IP unui client
d. Ofera un gateway pentru conectarea cu alte retele
e. Ofera un firewall pentru protectia retelei WLAN

16. Ce problema rezolva protocolul CSMA/CA in cazul retelelor wireless?


a. Saturearea latimii de banda
b. Accesul la mediu
c. Aspecte legate de securitate
d. Interoperabilitatea echipamentelor
e. Transmisia broadcast

17. Ce foloseste un AP pentru a permite clientilor WLAN sa vada retelele disponibile intr-o
anumita zona de acoperire?
a. Un association response
b. Un beacon
c. O cheie
d. Un probe request

18. Cum se numste zona de acoperire a unei retele wireless?


a. Distribution System
b. Beacon
c. Basic Service Set
d. Extended Service Set

19. Care dintre urmatoarele afirmatii sunt adevarate cu privire la termenul WI-FI?
a. O abreviere de la „wireless widelity”
b. Conceput de IEEE si este o abreviere de la „wireless fidelity”
c. Conceput de ANSI
d. Conceput de Wi-Fi Alliance
e. Conceput de ETSI

20. Ce componenta a procesului de proiectare a retelei identifica amplasamentul AP-urilor?


a. Site survey
b. Testarea riscurilor
c. Proiectarea scalabilitatii
d. Analiza protocoalelor de retea
e. Analiza WLAN

1. Which of the following statements are not correct with regards to the transmission of
electromagnetic waves? (Choose 2)

a. Similar to IEEE 802.15-1, the IEEE 802.15-4 standard define transmission of data over long
distances.
b. Wireless technology refers to the transmission of electromagnetic waves.
c. PAN is built for lower power transmission and lower data rate.
d. The IEEE 802.16 defines the WiMax technology.
e. Global System for Mobile communication is one of the standard for wired communications
available in the world.
2. Which statement is not correct?
a. Frequency is measured in Hertz(Hz) or in seconds(s).
b. Frequency is the number of occurrence of repeating event per unit time.
c. The higher the frequency, the higher is the reflection rate of the signal.
d. The higher the frequency, the higher is the absorption rate in the Earth's atmosphere.

3. Which of the following answers describes a frequency that is seen 1 million times per second?
a. 1MHz
b. 1Hz
c. 1.000.000s
d. 10^(-6)Hz
e. 1KHz

4. Which of the following conditions are significant problems experienced with wireless
networks? (Choose 2)
a. Signal refraction
b. Signal easy to control
c. Less interference
d. Low data transmission rate
e. Signal reflection

5. Which 802.11 standard uses the 5GHz range? (Choose 3)


a. 802.11a
b. 802.11n
c. 802.11b
d. 802.11g
e. 802.11ac

6. Which of the following statements are correct? (Choose 3)


a. It is free to transmit in ISM (Industrial Scientific Medical) Band.
b. Wireless is always half duplex because of communication environment.
c. The advantage of 2.4 and 5GHz bands is that they are not very occupied.
d. High modulation technique is required for high bandwidth.
e. Wireless is always full duplex because of communication environment.

7. Which is a characteristic of 2.4GHz?


a. Each channel has 22 MHz band.
b. The space between two consecutive, non-overlapping channels is 5 MHz.
c. The space between two consecutive channels is 3 MHz.
d. Each channel has 5 MHz band.
e. There are 12 channels in the 2.4GHz band.

8. Which modulation techniques are use in Wireless LANs? (Choose 3)


a. OFDM
b. DSSS
c. MIMO
d. AM
e. FM

9. Which of the following is true with regards to CSMA/CA? (Choose 3)


a. To avoid collisions on a wireless network, CSMA/CA is used.
b. The advantage of wireless network is that they can detect a collision.
c. Collision Avoidance implies that when a device wishes to send, it must listen first.
d. The RTS/CTS mechanism is used to avoid collision in wireless networks.
e. The ACK mechanism use for access control is bandwidth consuming.

10. What advantages does Multi-User MIMO offer to wireless networks? (Choose 3)
a. Support full-duplex communications over wireless networks.
b. Eliminate collisions
c. Uses the less crowded 5GHz band.
d. Support data speed beyond 1 Gbps.
11. What is the capability in a 802.11n wireless NIC that takes all the electro-mangetic waves
and composes them to one high-quality wave, resulting in a throughput increase?
MRC (Maximum Ratio Combining)

12. Whenever Joe brings his tablet into the kitchen that has a microwave oven, cordless phone
and other home appliances, his internet connection is affected. Which Wireless LAN standard
might his tablet be set to? (choose 3)
a. 802.11b
b. 802.11a
c. 802.11g
d. 802.11n

13. Which security mode is the least secure choice when a home wireless router is configured?
a. WEP
b. WPA2
c. WPA2-Personal
d. WPA

14. During which stage of establishing connectivity between a WLAN client and an AP does the
client learn the MAC address of the AP?
a. authentication
b. encryption
c. association
d. probing
e. discovery
15. For which discovery mode will an AP generate the most traffic on a WLAN?
a. passive mode
b. open mode
c. active mode
d. mixed mode
16. Which two roles are typically performed by a wireless router that is used in a home or small
business? (Choose two.)
a. WLAN controller
b. Ethernet switch
c. RADIUS authentication server
d. access point
e. repeater

17. If three 802.11b access points need to be deployed in close proximity, which three frequency
channels should be used? (Choose three.)
a. 1
b. 3
c. 5
d. 6
e. 8
f. 11

18. Which type of management frame may regularly be broadcast by an AP?


a. probe request
b. probe response
c. beacon
d. authentication

19. What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN
environment?
a. It is used to send data over a half-duplex connection.
b. It is used in a full-duplex environment to detect collisions.
c. It allows a client to detect whether or not a channel is clear prior to transmission.
d. It allows the client to change transmission channels.
20. What type of wireless antenna is best suited for providing coverage in large open spaces,
such as hallways or large conference rooms?
a. dish
b. directional
c. omnidirectional
d. Yagi

21. What is a difference between Cisco APs that operate in a home environment and Cisco APs
that operate in a corporate environment?
a. Cisco corporate APs do not support PoE.
b. Autonomous APs are used only in the home environment, and they incorporate the functions
of a router, switch, and AP into one device.
c. Controller-based APs are used in the corporate environment, and they are server-dependent
devices d. that require an initial configuration to operate.
e. Some corporate AP models can operate in either autonomous mode or controller-based mode.

22. Open the PT Activity. Perform the tasks in the activity instructions and then answer the
question. What is the SSID of the connected network and which message is displayed in the
browser window?
a. SSID: Home-Network
Message: Good job!
b. SSID: Home-Net
Message:Congratulations! You were able to connect it!
c. SSID: Home-Network
Message: Well done!
d. SSID: Home-Net
Message:Congratulations! You did it!

23. Which statement defines the control frame operation between two stations?
a. A station responds to an RTS frame with an ACK frame, thus providing permission for the
requesting station to send a data frame.
b. If the sending station does not receive an ACK frame within a predetermined period of time,
the sending station will drop the connection.
c. After receiving a data frame, the receiving station will send an ACK frame to the sending
station if no errors are found.
d. A station sends an RTS frame as the first step in a three-way handshake that is required before
sending data frames.

24. What is a characteristic of a Yagi antenna that is used by Cisco Aironet Access Points?
a. It provides 360-degree coverage.
b. It can be used for long-distance Wi-Fi networking.
c. It is also referred to as a "rubber duck" design.
d. It has the same characteristics as an omnidirectional Wi-Fi antenna.

25. What Wi-Fi management frame is regularly broadcast by APs to announce their presence?
a. probe
b. beacon
c. association
d. authentication

26. Fill in the blank.


Known as "WiGig", the IEEE 802.11 __ad___ standard provides average speeds of up to 7 Gb/s,
but will switch to a lower GHz band when roaming is employed.

27. Which statement describes an ESS?


a. An ESS consists of two or more BSSs that are interconnected wirelessly by a DS.
b. Bluetooth is an example of ESS infrastructure mode.
c. It involves several BSSs that are joined through a common distribution system.
d. An ESS is a connection of a BSS to an ad hoc wireless network.
28. Which wireless RF band do IEEE 802.11b/g devices use?
a. 900 MHz
b. 2.4 GHz
c. 5 GHz
d. 60 GHz

26. If an administrator is troubleshooting a WLAN using a bottom up approach, which action


would be taken first?
a. Update the firmware on the AP.
b. Make sure all devices are powered on.
c. Ping the AP.
d. Verify that the GUI interface is accessible from a client.

27. Which two recommendations should an administrator follow when planning the location of
multiple APs? (Choose two.)
a. Position APs horizontally near the ceiling in the center of each coverage area, if possible.
b. Position APs in locations where users are expected to be.
c. An ESS should have 20 to 25 percent overlap between BSAs in an ESS.
d. Overlap channels to provide roaming capability.
e. Always consult the specifications for the AP when planning for coverage areas.

28. A network administrator discovers a rogue AP in the network. The rogue AP is capturing
traffic and then forwarding it on to the legitimate AP. This type of attack is known as a man in
the middle__ attack.

29. Which combination of WLAN authentication and encryption is recommended as a best


practice for home users?
a. WEP and TKIP
b. WPA2 and AES
c. EAP and AES
d. WPA and PSK
e. WEP and RC4

30. An IEEE 802.11n network has been configured for mixed mode and has clients that are using
802.11n and 802.11g radios on the network. The 802.11n clients are complaining of slower than
normal speeds. What is the problem?
a. This is the normal behavior of a mixed-mode network.
b. The access point is failing.
c. The authentication is not allowing roaming.
d. Roaming between access points is disabled.

31. What type of frames are used for advertising, authenticating, and associating with a wireless
AP?
a. data
b. control
c. management
d. acknowledgment

32. The company handbook states that employees cannot have microwave ovens in their offices.
Instead, all employees must use the microwave ovens located in the employee cafeteria. What
wireless security risk is the company trying to avoid?
a. accidental interference
b. improperly configured devices
c. interception of data
d. rogue access points

33. Match the wireless technologies to the correct descriptions. (Not all options are used.)
a. provides network access within a home with connectivity distances of up to 300 meters
b. Bluetooth
c. Wi-Fi
d. WiMAX

34. Match the wireless technologies to the correct descriptions. (Not all options are used.)
a. uses device pairing to communicate over distances of up to 100 meters
b. Bluetooth
c. Wi-Fi
d. WiMAX

35. Match the wireless technologies to the correct descriptions. (Not all options are used.)
a. useful in remote areas, but requires a clear line of sight
b. Bluetooth
c. Wi-Fi
d. WiMAX

S-ar putea să vă placă și