Module 3 Review
Wi-Fi Alliance
IEEE
EMA
WISC
2.4-MHz band
900- MHz band
2.4-GHz band
5-GHz band
900-GHz band
802.11
802.11a
802.11b
802.11d
802.11g
802.11
802.11a
802.11b
802.11d
802.11g
It is a global standards organization that controls the compatibility of Wi-Fi products.
It operates only in the United States and ensures the compatibility ofWi-Fi products
It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LAN s.
It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations.
An access point that has an open WEP key
An access point that is broadcasting its SSID
An unsecured access point that has been placed on a WLAN
An access point that has had a hardware failure that causes it to endlessly broadcast its SSID
encryption for providing privacy and confidentiality
Authentication to ensure that legitimate clients and users access the network via trusted access points
Controls to transmit power to limit the access point access range to the property boundaries of the parent organization
Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
EAP
WEP
WPA
802.11i/WPA2
The access point with the lowest ssm
The access point with the highest ssm
The access point whose SSID is received first
The access point that is received with the strongest signal
The client is authenticated against a local database stored on the access point.
The access point forwards all network traffic to the server where it is either authenticated or blocked
The access point encapsulates any 802.1 X traffic bound for the authentication server and sends it to the server
The client encapsulates the 802.1 X authentication traffic before sending it to the access point. This causes the access point to forward it to the server.
WPA uses pre-shared keys, while WPA 2 uses PSK.
WPA uses EAP authentication, while WPA 2 uses 802.IIX.
WPA uses personal mode, while WPA 2 uses enterprise mode.
WPA uses TKIP/MIC encryption, while WPA 2 uses AES-CCMP encryption.
5 to 10 percent
10 - 15 percent
15 - 20 percent
25 - 30 percent
The ability to shift data rates ,
The ability to vary transmit levels
The ability to match the transmit level to the receive level
The ability to perform error correction as the signal level changes
SSID
Authentication
Data exchange rates
Transmit band selection
RF Channel with optional power
Only if there is an AAA server available
When you need the increased security ofWEP
When you are planning to enable 802.llx authentication
Only If the hardware equipment does not support WPA
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.