You are watching: Which statement is true concerning an ad-hoc wireless network?
DHomesb thing 7 – CCNA Discovery: Networking for house and little Businesses (Version 4.0)
1. What space two authentication methods that an accessibility point can use? (Choose two.)
WEP
WPA
EAP
ASCII
pre-shared secrets
2. What term defines the encoding the wireless data to prevent intercepted data from being review by a hacker? resolve filtering
authentication
broadcasting
encryption
passphrase encoding
3. A technician has been request to carry out wireless connectivity to the wired Ethernet network the a building. Which three factors influence the variety of access points needed? (Choose three.) the size of the building
the number of solid internal walls in the building
the existence of microwave ovens in several workplaces
the encryption method used on the wireless network
the usage of both Windows and Appletalk operating solution
the use of shortwave or infrared top top the AP
4. Why is defense so essential in wireless networks? Wireless networks are commonly slower than wired networks.
Televisions and also other devices can interfere with wireless signals.
Wireless networks transfer data over a tool that permits easy access.
Environmental determinants such together thunderstorms can influence wireless networks.
5. I beg your pardon WLAN ingredient is generally referred to together an STA? cell
antenna
access point
wireless bridge
wireless client
6. What form of authentication go an access point use by default? open
PSK
WEP
EAP
7. What is the difference in between using open authentication and also pre-shared keys? open up authentication requires a password. Pre-shared secrets do not require a password.
Open authentication is supplied with wireless networks. Pre-shared tricks are used with wired networks.
Pre-shared tricks require one encrypted secret word. Open authentication does not call for a mystery word.
Pre-shared tricks require a MAC resolve programmed right into the access point. Open authentication walk not require this programming.
8. What are three advantages of wireless over wired technology? (Choose three.) an ext secure
longer selection
anytime, everywhere connectivity
easy and inexpensive to install
ease of utilizing licensed air an are
ease of including additional gadgets
9. Which statement is true worrying wireless bridges? connects two networks with a wireless link
stationary device that connects to a wireless LAN
allows wireless client to connect to a wired network
increases the strength of a wireless signal
10. I beg your pardon statement is true concerning an ad-hoc wireless network? created by connecting wireless clients in a peer-to-peer network
created by connecting wireless client to a single, centralized AP
created by connecting many wireless straightforward service sets v a distribution system
created through connecting wireless clients to a wired network utilizing an ISR
11. Which two statements around a service collection identifier (SSID) are true? (Choose two.) speak a wireless an equipment to i beg your pardon WLAN the belongs
consists the a 32-character string and also is not instance sensitive
responsible for determining the signal strength
all wireless tools on the same WLAN must have the same SSID
used to encrypt data sent across the wireless network
12. What access-point feature allows a network administrator to specify what form of data can go into the wireless network? encryption
hacking block
traffic filtering
MAC deal with filtering
authentication
13. What space the 2 WEP crucial lengths? (Choose two.) 8 bit
16 little
32 little bit
64 little bit
128 bit
14. Finish the adhering to sentence: WEP is used to ______ , and also EAP is offered to _____ wireless networks. Encrypt; authenticate users on
filter traffic; select the operating frequency because that
identify the wireless network; compress data top top
create the smallest wireless network; limit the number of users on
15. Why is IEEE 802.11 wireless an innovation able come transmit further ranges than Bluetooth technology? transmits in ~ much reduced frequencies
has greater power output
transmits in ~ much greater frequencies
uses better encryption techniques
16. What space two benefits of wireless networking end wired networking? (Choose two.) rate
security
mobility
reduced surroundings time
allows users to share an ext resources
not susceptible to interference native other tools
17. What go the Wi-Fi logo indicate about a wireless device? IEEE has actually approved the device.
The an equipment is interoperable v all various other wireless standards.
The maker is interoperable v other gadgets of the exact same standard that likewise display the Wi-Fi logo.
The an equipment is backwards compatible through all vault wireless standards.
18.

Refer to the graphic. In the Wireless menu option the a Linksys integrated router, what walk the Network setting option mixed mean?
The router supports encryption and authentication.
The router support both wired and also wireless connections.
The router support 802.11b, 802.11g, and also 802.11n devices.
The router supports connectivity v infrared and also radio frequencies
19.

Refer come the graphic. In the Wireless food selection of a Linksys integrated router, what configuration option allows the visibility of the accessibility point come be recognized to surrounding clients?
Network mode
Network name (SSID)
Radio tape
Wide Channel
Standard Channel
SSID transfer
20. Which 2 statements characterize wireless network security? (Choose two.) Wireless networks offer the exact same security attributes as wired networks.
Wardriving boosts security the wireless networks.
With SSID broadcast disabled, one attacker must recognize the SSID to connect.
Using the default IP attend to on an access point provides hacking easier.
See more: How Much Does A 1979 Quarter Worth ? (Price Chart) How Much Is A Silver Quarter Worth
An attacker demands physical accessibility to at the very least one network maker to launch an attack
21. Which statement is true around open authentication as soon as it is enabled on an accessibility point? needs no authentication