Chapter 8 And 9

25 Questions | Total Attempts: 87

SettingsSettingsSettings
Please wait...
Chapter 8 And 9

WIRELESS NETWORKS 2 CHAPT 8 TCP/IP INTERNETWORKING CHAPT 9


Questions and Answers
  • 1. 
    802.11i is attractive compared with WPA because?
    • A. 

      Many older devices can be upgraded to 802.11i

    • B. 

      802.11i offers stronger security

    • C. 

      802.11i was standardized by the Wi-Fi Alliance

    • D. 

      802.11i offers quality of service

    • E. 

      All of the above

  • 2. 
    What is the strongest security protocol for 802.11 today?
    • A. 

      802.11s

    • B. 

      802.11i

    • C. 

      WPA

    • D. 

      802.11X

    • E. 

      WEP

  • 3. 
    What damage can an evil twin access point do?
    • A. 

      Eavesdrop on communication

    • B. 

      Steal important keys or other information transmitted by the client.

    • C. 

      Launch attacks against corporate servers.

    • D. 

      All of the above

    • E. 

      Only A and B

  • 4. 
    Which of the folowing secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
    • A. 

      IPsec.

    • B. 

      VPNs

    • C. 

      VLANs

    • D. 

      PEAP

    • E. 

      SSL/TLS

  • 5. 
    What security protocol originally came with 802.11 equipment?
    • A. 

      802.11i

    • B. 

      802.11e

    • C. 

      WEP

    • D. 

      WPA

  • 6. 
    The Network part of an IP address is ____________ bits long?
    • A. 

      8

    • B. 

      32

    • C. 

      16

    • D. 

      24

    • E. 

      The size of the network part varies.

  • 7. 
    A mask has __________ bits?
    • A. 

      8

    • B. 

      24

    • C. 

      16

    • D. 

      32

    • E. 

      The number of bits varies.

  • 8. 
    In a network mask, the 1's correspond to the ____________?
    • A. 

      Subnet part

    • B. 

      Network part

    • C. 

      Host part

    • D. 

      None of the above

  • 9. 
    In the subnet mask the 1's correspond to the ____________?
    • A. 

      Subnet part

    • B. 

      Network part

    • C. 

      Host part

    • D. 

      None of the above.

  • 10. 
    If /14 is the network mask, how many bits are there in the subnet part?
    • A. 

      18

    • B. 

      16

    • C. 

      14

    • D. 

      8

    • E. 

      We cannot say.

  • 11. 
    If /14 is the network mask, how many bits are there in the host part?
    • A. 

      18

    • B. 

      8

    • C. 

      14

    • D. 

      16

    • E. 

      We cannot say.

  • 12. 
    If /14 is a subnet mask, how many bits are there in the host part?
    • A. 

      14

    • B. 

      16

    • C. 

      18

    • D. 

      8

    • E. 

      We cannot say.

  • 13. 
    The default row ___________?
    • A. 

      Always has the mask /16

    • B. 

      Will always match the IP address of an incoming packet

    • C. 

      Both A and B

    • D. 

      Neither A nor B

  • 14. 
    Row 2707 has the mask /16 and the reliability metric 20.  Row 4400 has the mask /14 and the cost metric 10.  Which row will the router choose if both are matches?
    • A. 

      2707

    • B. 

      4400

    • C. 

      Either A or B

    • D. 

      The router will choose the default row.

  • 15. 
    Row 2707 has the mask /16 and the speed metric 20.  Row 4400 has the mask /16 and the speed metric 10.  Which row with the router choose if both are matches?
    • A. 

      2707

    • B. 

      4400

    • C. 

      Either A or B

    • D. 

      The router will choose the default row.

  • 16. 
    Routers send packets out ________?
    • A. 

      Plugs

    • B. 

      Connections

    • C. 

      Ports

    • D. 

      Interfaces

  • 17. 
    To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's __________?
    • A. 

      IP address

    • B. 

      Data link layer address

    • C. 

      Both A and B

    • D. 

      Neither A and B

  • 18. 
    Fragmentation is __________?
    • A. 

      Suspicious because it is often used by hackers

    • B. 

      Very common

    • C. 

      Both A and B

    • D. 

      Neither A nor B

  • 19. 
    A (n)_________specifies a particular application on a particular host.
    • A. 

      Socket

    • B. 

      IP address

    • C. 

      Port number

    • D. 

      None of the above

  • 20. 
    Which TCP/IP interior dynamic routing protocol is simple to manage?
    • A. 

      OSPF

    • B. 

      RIP

    • C. 

      BGP

    • D. 

      Both B and C

  • 21. 
    Which interior dynamic routing protocol is good for large internets?
    • A. 

      RIP

    • B. 

      OSPF

    • C. 

      BGP

    • D. 

      Both B and C

  • 22. 
    ___________is used for supervisory messages at the internet layer.
    • A. 

      DNS

    • B. 

      TCP

    • C. 

      DHCP

    • D. 

      ICMP

  • 23. 
    In MPLS, the interface to send the packet back out will be decided ___________?
    • A. 

      On the basis of the previous packet going to the packet's IP address.

    • B. 

      Before the packet arrives

    • C. 

      During the router's routing process

    • D. 

      None of the above

  • 24. 
    Label-switching router base their decisions on a packet's__________?
    • A. 

      Label number

    • B. 

      IP address

    • C. 

      Both A and B

    • D. 

      Neither A nor b

  • 25. 
    In MPLS, the __________adds the label to the packet.
    • A. 

      Source host

    • B. 

      First label-switching router

    • C. 

      Both A an B

    • D. 

      Neither A nor B

Back to Top Back to top