Ccna1 Chapter 7

21 Questions | Attempts: 623
Share
Please wait...
Question 1 / 21
0 %
0/100
Score 0/100
1. Why is security so important in wireless networks?
Submit
Please wait...
About This Quiz
Ccna1 Chapter 7 - Quiz

These quiz is prepared to take for whom want to measure the knowledge and ability only. This is not the only way to cheat other but it can improve your knowledge base on what you have learn.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
Submit
3. Which statement is true about open authentication when it is enabled on an access point?
Submit
4. Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
Submit
5. Which statement is true concerning an ad-hoc wireless network?
Submit
6. What is the difference between using open authentication and pre-shared keys?
Submit
7. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
Submit
8. What does the Wi-Fi logo indicate about a wireless device?
Submit
9. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
Submit
10. Which statement is true concerning wireless bridges?
Submit
11. What type of authentication does an access point use by default?
Submit
12. What access-point feature allows a network administrator to define what type of data can enter the wireless network?
Submit
13. Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
Submit
14. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
Submit
15. Which WLAN component is commonly referred to as an STA?
Submit
16. Which two statements characterize wireless network security? (Choose two.)
Submit
17. Which two statements about a service set identifier (SSID) are true? (Choose two.)
Submit
18. What are the two WEP key lengths? (Choose two.)
Submit
19. What are two authentication methods that an access point could use? (Choose two.)
Submit
20. What are two benefits of wireless networking over wired networking? (Choose two.)
Submit
21. What are three advantages of wireless over wired technology? (Choose three.)
Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 20, 2010
    Quiz Created by
    Lytayquize
Cancel
  • All
    All (21)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Why is security so important in wireless networks?
Refer to the graphic. In the Wireless menu option of a Linksys...
Which statement is true about open authentication when it is enabled...
Complete the following sentence: WEP is used to ______ , and EAP is...
Which statement is true concerning an ad-hoc wireless network?
What is the difference between using open authentication and...
What term describes the encoding of wireless data to prevent...
What does the Wi-Fi logo indicate about a wireless device?
Why is IEEE 802.11 wireless technology able to transmit further...
Which statement is true concerning wireless bridges?
What type of authentication does an access point use by default?
What access-point feature allows a network administrator to define...
Refer to the graphic. In the Wireless menu of a Linksys integrated...
A technician has been asked to provide wireless connectivity to the...
Which WLAN component is commonly referred to as an STA?
Which two statements characterize wireless network security? (Choose...
Which two statements about a service set identifier (SSID) are true?...
What are the two WEP key lengths? (Choose two.)
What are two authentication methods that an access point could use?...
What are two benefits of wireless networking over wired networking?...
What are three advantages of wireless over wired technology? (Choose...
Alert!

Advertisement