CWNA Chapter 9

25 Questions

Settings
CWNA Quizzes & Trivia

Sybex CWNA Chapter 9 Test


Questions and Answers
  • 1. 
    This 802.11 standard is divided into two sublayers known as the LLC and MAC.
    • A. 

      Transport layer

    • B. 

      Link layer

    • C. 

      Application layer

    • D. 

      Data-link layer

  • 2. 
    When the Network layer (layer 3) sends data to the Data-Link layer, that data is handed off to the LLC and becomes known as the MAC _____.
    • A. 

      Switch Data Unit

    • B. 

      Service Data Unit

    • C. 

      Server Device Unit

    • D. 

      Second Data Unit

  • 3. 
    The 802.11 frame that contains a layer 2 header, a frame body, and a trailer. The trailer has a 32-bit CRC which is known as the.
    • A. 

      Cyclic Redundancy Checker

    • B. 

      MAC Protocol Data Unit

    • C. 

      Frame Delimiter

    • D. 

      Frame Check Sequence

  • 4. 
    TCP/IP, the most common communications protocol used on networks, typically has an IP _____ size of 1,500 bytes.
    • A. 

      Maximum Transfer Unit

    • B. 

      Maximum Threshold

    • C. 

      Maximum Receiving Unit

    • D. 

      Maximum Transfer Protocol

  • 5. 
    The three major frame types for the 802.11 standard are: management, _______, and data. Fill in the blank.
    • A. 

      Acceptance

    • B. 

      Coordination

    • C. 

      Control

    • D. 

      Service

  • 6. 
    These _____ frames are used by wireless stations to join and leave the basic service set (BSS) and are the majority of frame types in a WLAN.
    • A. 

      Control

    • B. 

      Management

    • C. 

      Data

    • D. 

      QoS

  • 7. 
    These ____ frames are used to assist with the delivery of the data frames and are transmitted at one of the basic rates and are also used to clear the channel, acquire the channel, and provide unicast frame acknowledgements.
    • A. 

      Clear to Send

    • B. 

      Acknowledgement

    • C. 

      Beacon Management

    • D. 

      Control

  • 8. 
    These ____ frames carry what is passed down from the higher-layer protocols and are normally encrypted for data privacy reasons.
    • A. 

      Beacon Management

    • B. 

      Management

    • C. 

      Data

    • D. 

      Control

  • 9. 
    This is one of the most important frame types and is essential to the heartbeat of the wireless network. Time stamps, channel information, data rates, and SSID can all be found in this frame.
    • A. 

      Beacon Management

    • B. 

      Control

    • C. 

      Data

    • D. 

      Management

  • 10. 
    In this mode a client station listens for the beacon frames that are continuously being sent by the Access Points with the SSID that's been preconfigured.
    • A. 

      Active Scanning

    • B. 

      Listening

    • C. 

      Ad Hoc Mode

    • D. 

      Passive Scanning

  • 11. 
    This provides authentication without performing any type of client verification and just an exchange of hellos between the client and Access Point.
    • A. 

      WEP

    • B. 

      WPA

    • C. 

      Open System Authentication

    • D. 

      Open Source Authentication

  • 12. 
    In this mode a client station transmits management frames known as probe requests containing a specific SSID of the WLAN that the client station is looking for.
    • A. 

      Ad Hoc Mode

    • B. 

      Active Scanning

    • C. 

      Passive Scanning

    • D. 

      Directed Probe Request

  • 13. 
    This authentication method used WEP and requires that a static key be configured on both the station and the Access Point and will not work if the keys do not match.
    • A. 

      Shared Key Authentication

    • B. 

      Open Source Authentication

    • C. 

      Private Key Infrastructure

    • D. 

      WPA

  • 14. 
    This means that the client station can send data through the Access Point and one the distribution system medium and this is a request sent to the Access Point seeking permission to join.
    • A. 

      Authentication

    • B. 

      Shared Key Authentication

    • C. 

      Open System Authentication

    • D. 

      Association

  • 15. 
    On any autonomous AP, cooperative AP, or WLAN controller, specific data rates can be configured as ____ rates.
    • A. 

      Dynamic

    • B. 

      Required

    • C. 

      Standard

    • D. 

      High Throughput

  • 16. 
    This is part of the 802.11 standard and allows for the ability of client stations to transition from one AP to another while maintaining network connectivity for the upper-layer applications.
    • A. 

      Reassociation

    • B. 

      Disassociation

    • C. 

      Roaming

    • D. 

      Authentication

  • 17. 
    When a client station decides to roam to a new AP, it will send this request frame to the new AP. This is done not for the AP but instead the SSID of the wireless network.
    • A. 

      Roaming

    • B. 

      Deauthentication

    • C. 

      Association

    • D. 

      Reassociation

  • 18. 
    This is better known as a notification and a polite way of terminating the association, such as shutting off a client through the Operating System, An AP can also do this for maintenance on the networks.
    • A. 

      Disassociation

    • B. 

      Deauthentication

    • C. 

      Roaming

    • D. 

      Reassociation

  • 19. 
    This is one of the nine control frames and one of the key components of the 802.11 CSMA/CA media access method. This frame consists of 14 octets of information and is the highest priority frame due to the half-duplex nature of the medium.
    • A. 

      Ethernet

    • B. 

      MAC

    • C. 

      ACK Frame

    • D. 

      Control

  • 20. 
    This term stands for the breaking of an 802.11 frame into smaller pieces, adds header information to each fragment, and then transmits them individually.
    • A. 

      ACK

    • B. 

      SIFS

    • C. 

      MAC

    • D. 

      Fragmentation

  • 21. 
    When using this operational mode only support for DSSS and HR-DSSS technology is solely enabled.
    • A. 

      802.11a-Only Mode

    • B. 

      Mixed Mode

    • C. 

      802.11g-Only Mode

    • D. 

      Legacy Mode

  • 22. 
    This operational mode on the AP will only communicate with client stations that are using ERP-OFDM technology and DSSS and HR-DSSS will be disabled and no longer be able to associate with the AP.
    • A. 

      Mixed Mode

    • B. 

      802.11a-Only Mode

    • C. 

      802.11g-Only Mode

    • D. 

      Legacy Mode

  • 23. 
    This is the default operational mode of most 802.11 AP's and is often called _____. Support for DSSS, HR-DSSS, and OFDM are enabled.
    • A. 

      Legacy Mode

    • B. 

      802.11g-Only Mode

    • C. 

      802.11a-Only Mode

    • D. 

      802.11b/g Mode

  • 24. 
    In order for a client station to participate in a BASS, it must be able to communicate with the AP. What is the name used for the mechanism that performs a NAV distribution and helps prevent collisions from occurring?
    • A. 

      RTS/CTS

    • B. 

      CTS-to-Self

    • C. 

      ERP AP

    • D. 

      ERP STA

  • 25. 
    This is used strictly as a protection mechanism for mixed-mode environments and is used as a protection mechanism for throughput so that it will be higher due to fewer frames being sent.
    • A. 

      Data Frames

    • B. 

      CTS-to-Self

    • C. 

      CTS/RTS

    • D. 

      ERP AP