post in CCNA discovery 1 - Networking for residence and tiny Businesses (V4.0) ~ above Wednesday, July 25, 2012


You are watching: Which statement is true concerning an ad-hoc wireless network?

DHomesb thing 7 – CCNA Discovery: Networking for house and little Businesses (Version 4.0)

1. What space two authentication methods that an accessibility point can use? (Choose two.)

WEP

WPA

EAP

ASCII

pre-shared secrets

 

2. What term defines the encoding the wireless data to prevent intercepted data from being review by a hacker? resolve filtering

authentication

broadcasting

encryption

passphrase encoding 

 

3. A technician has been request to carry out wireless connectivity to the wired Ethernet network the a building. Which three factors influence the variety of access points needed? (Choose three.) the size of the building

the number of solid internal walls in the building

the existence of microwave ovens in several workplaces

the encryption method used on the wireless network

the usage of both Windows and Appletalk operating solution

the use of shortwave or infrared top top the AP

 

4. Why is defense so essential in wireless networks? Wireless networks are commonly slower than wired networks.

Televisions and also other devices can interfere with wireless signals.

Wireless networks transfer data over a tool that permits easy access.

Environmental determinants such together thunderstorms can influence wireless networks.

 

5. I beg your pardon WLAN ingredient is generally referred to together an STA? cell

antenna

access point

wireless bridge

wireless client

 

6. What form of authentication go an access point use by default? open

PSK

WEP

EAP

 

7. What is the difference in between using open authentication and also pre-shared keys? open up authentication requires a password. Pre-shared secrets do not require a password.

Open authentication is supplied with wireless networks. Pre-shared tricks are used with wired networks.

Pre-shared tricks require one encrypted secret word. Open authentication does not call for a mystery word.

Pre-shared tricks require a MAC resolve programmed right into the access point. Open authentication walk not require this programming.

 

8. What are three advantages of wireless over wired technology? (Choose three.) an ext secure

longer selection

anytime, everywhere connectivity

easy and inexpensive to install

ease of utilizing licensed air an are

ease of including additional gadgets

 

9. Which statement is true worrying wireless bridges? connects two networks with a wireless link

stationary device that connects to a wireless LAN

allows wireless client to connect to a wired network

increases the strength of a wireless signal

 

10. I beg your pardon statement is true concerning an ad-hoc wireless network? created by connecting wireless clients in a peer-to-peer network

created by connecting wireless client to a single, centralized AP

created by connecting many wireless straightforward service sets v a distribution system

created through connecting wireless clients to a wired network utilizing an ISR

 

11. Which two statements around a service collection identifier (SSID) are true? (Choose two.) speak a wireless an equipment to i beg your pardon WLAN the belongs

consists the a 32-character string and also is not instance sensitive

responsible for determining the signal strength

all wireless tools on the same WLAN must have the same SSID

used to encrypt data sent across the wireless network

 

12. What access-point feature allows a network administrator to specify what form of data can go into the wireless network? encryption

hacking block

traffic filtering

MAC deal with filtering

authentication

 

13. What space the 2 WEP crucial lengths? (Choose two.) 8 bit

16 little

32 little bit

64 little bit

128 bit

 

14. Finish the adhering to sentence: WEP is used to ______ , and also EAP is offered to _____ wireless networks. Encrypt; authenticate users on

filter traffic; select the operating frequency because that

identify the wireless network; compress data top top

create the smallest wireless network; limit the number of users on

 

15. Why is IEEE 802.11 wireless an innovation able come transmit further ranges than Bluetooth technology? transmits in ~ much reduced frequencies

has greater power output

transmits in ~ much greater frequencies

uses better encryption techniques

 

16. What space two benefits of wireless networking end wired networking? (Choose two.) rate

security

mobility

reduced surroundings time

allows users to share an ext resources

not susceptible to interference native other tools

 

17. What go the Wi-Fi logo indicate about a wireless device? IEEE has actually approved the device.

The an equipment is interoperable v all various other wireless standards.

The maker is interoperable v other gadgets of the exact same standard that likewise display the Wi-Fi logo.

The an equipment is backwards compatible through all vault wireless standards.

 

18.

*

Refer to the graphic. In the Wireless menu option the a Linksys integrated router, what walk the Network setting option mixed mean?

The router supports encryption and authentication.

The router support both wired and also wireless connections.

The router support 802.11b, 802.11g, and also 802.11n devices.

The router supports connectivity v infrared and also radio frequencies

 

19.

*

Refer come the graphic. In the Wireless food selection of a Linksys integrated router, what configuration option allows the visibility of the accessibility point come be recognized to surrounding clients?

Network mode

Network name (SSID)

Radio tape

Wide Channel

Standard Channel

SSID transfer

 

20. Which 2 statements characterize wireless network security? (Choose two.) Wireless networks offer the exact same security attributes as wired networks.

Wardriving boosts security the wireless networks.

With SSID broadcast disabled, one attacker must recognize the SSID to connect.

Using the default IP attend to on an access point provides hacking easier.

See more: How Much Does A 1979 Quarter Worth ? (Price Chart) How Much Is A Silver Quarter Worth

An attacker demands physical accessibility to at the very least one network maker to launch an attack

 

21. Which statement is true around open authentication as soon as it is enabled on an accessibility point? needs no authentication