CCNA 1 Chapter 7

21 Questions | Total Attempts: 254

SettingsSettingsSettings
CCNA Quizzes & Trivia

Select the correct choice for each of the following questions and score a perfect!


Questions and Answers
  • 1. 
    Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
    • A. 

      Transmits at much lower frequencies

    • B. 

      Has higher power output

    • C. 

      Transmits at much higher frequencies

    • D. 

      Uses better encryption methods

  • 2. 
    What are three advantages of wireless over wired technology? (Choose three.)
    • A. 

      More secure

    • B. 

      Longer range

    • C. 

      Anytime, anywhere connectivity

    • D. 

      Easy and inexpensive to install

    • E. 

      Ease of using licensed air space

    • F. 

      Ease of adding additional devices

  • 3. 
    What are two benefits of wireless networking over wired networking? (Choose two.)
    • A. 

      Speed

    • B. 

      Security

    • C. 

      Mobility

    • D. 

      Reduced installation time

    • E. 

      Allows users to share more resources

    • F. 

      Not susceptible to interference from other devices

  • 4. 
    A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
    • A. 

      The size of the building

    • B. 

      The number of solid interior walls in the building

    • C. 

      The presence of microwave ovens in several offices

    • D. 

      The encryption method used on the wireless network

    • E. 

      The use of both Windows and Appletalk operating systems

    • F. 

      The use of shortwave or infrared on the AP

  • 5. 
    Why is security so important in wireless networks?
    • A. 

      Wireless networks are typically slower than wired networks

    • B. 

      Televisions and other devices can interfere with wireless signals

    • C. 

      Wireless networks broadcast data over a medium that allows easy access

    • D. 

      Environmental factors such as thunderstorms can affect wireless networks

  • 6. 
    What does the Wi-Fi logo indicate about a wireless device?
    • A. 

      IEEE has approved the device

    • B. 

      The device is interoperable with all other wireless standards

    • C. 

      The device is interoperable with other devices of the same standard that also display the Wi-Fi logo

    • D. 

      The device is backwards compatible with all previous wireless standards

  • 7. 
    Which statement is true concerning wireless bridges?
    • A. 

      Connects two networks with a wireless link

    • B. 

      Stationary device that connects to a wireless LAN

    • C. 

      Allows wireless clients to connect to a wired network

    • D. 

      Increases the strength of a wireless signal

  • 8. 
    Which WLAN component is commonly referred to as an STA?
    • A. 

      Cell

    • B. 

      Antenna

    • C. 

      Access point

    • D. 

      Wireless bridge

    • E. 

      Wireless client

  • 9. 
    Which statement is true concerning an ad-hoc wireless network?
    • A. 

      Created by connecting wireless clients in a peer-to-peer network

    • B. 

      Created by connecting wireless clients to a single, centralized AP

    • C. 

      Created by connecting multiple wireless basic service sets through a distribution system

    • D. 

      Created by connecting wireless clients to a wired network using an ISR

  • 10. 
    Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
    • A. 

      The router supports encryption and authentication

    • B. 

      The router supports both wired and wireless connections

    • C. 

      The router supports 802.11b, 802.11g, and 802.11n devices

    • D. 

      The router supports connectivity through infrared and radio frequencies

  • 11. 
    Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
    • A. 

      Network Mode

    • B. 

      Network Name (SSID)

    • C. 

      Radio Band

    • D. 

      Wide Channel

    • E. 

      Standard Channel

    • F. 

      SSID Broadcast

  • 12. 
    Which two statements about a service set identifier (SSID) are true? (Choose two.)
    • A. 

      Tells a wireless device to which WLAN it belongs

    • B. 

      Consists of a 32-character string and is not case sensitive

    • C. 

      Responsible for determining the signal strength

    • D. 

      All wireless devices on the same WLAN must have the same SSID

    • E. 

      Used to encrypt data sent across the wireless network

  • 13. 
    Which two statements characterize wireless network security? (Choose two.)
    • A. 

      Wireless networks offer the same security features as wired networks

    • B. 

      Wardriving enhances security of wireless networks

    • C. 

      With SSID broadcast disabled, an attacker must know the SSID to connect.

    • D. 

      Using the default IP address on an access point makes hacking easier

    • E. 

      An attacker needs physical access to at least one network device to launch an attack

  • 14. 
    What type of authentication does an access point use by default?
    • A. 

      Open

    • B. 

      PSK

    • C. 

      WEP

    • D. 

      EAP

  • 15. 
    Which statement is true about open authentication when it is enabled on an access point?
    • A. 

      Requires no authentication

    • B. 

      Uses a 64-bit encryption algorithm

    • C. 

      Requires the use of an authentication server

    • D. 

      Requires a mutually agreed upon password

  • 16. 
    What are two authentication methods that an access point could use? (Choose two.)
    • A. 

      WEP

    • B. 

      WPA

    • C. 

      EAP

    • D. 

      ASCII

    • E. 

      Pre-shared keys

  • 17. 
    What is the difference between using open authentication and pre-shared keys?
    • A. 

      Open authentication requires a password. Pre-shared keys do not require a password.

    • B. 

      Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.

    • C. 

      Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word

    • D. 

      Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.

  • 18. 
    What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
    • A. 

      Address filtering

    • B. 

      Authentication

    • C. 

      Broadcasting

    • D. 

      Encryption

    • E. 

      Passphrase encoding

  • 19. 
    What access-point feature allows a network administrator to define what type of data can enter the wireless network?
    • A. 

      Encryption

    • B. 

      Hacking block

    • C. 

      Traffic filtering

    • D. 

      MAC address filtering

    • E. 

      Authentication

  • 20. 
    What are the two WEP key lengths? (Choose two.)
    • A. 

      8 bit

    • B. 

      16 bit

    • C. 

      32 bit

    • D. 

      64 bit

    • E. 

      128 bit

  • 21. 
    Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
    • A. 

      Encrypt; authenticate users on

    • B. 

      Filter traffic; select the operating frequency for

    • C. 

      Identify the wireless network; compress data on

    • D. 

      Create the smallest wireless network; limit the number of users on