Question: Question 40 4 pts Which core diameter is used in multimode fiber. 8 microns 8 mm 50 mm 50 microns Flag this Question Question 41
Question 40 4 pts
Which core diameter is used in multimode fiber.
| 8 microns |
| 8 mm |
| 50 mm |
| 50 microns |
Flag this Question
Question 41 4 pts
Wi-Fi is a term used by the ________.
| Wi-Fi Alliance |
| neither A nor B |
| IEEE |
| both A and B |
Flag this Question
Question 42 4 pts
Compared to wired transmission, propagation problems in radio transmissions are ________.
| about as bad |
| better |
| worse |
Flag this Question
Question 43 4 pts
Wireless radio transmission speed is usually measured in terms of ________.
| amplitude |
| wavelength |
| frequency |
| dollars |
Flag this Question
Question 44 4 pts
Wi-Fi normally uses a(n) ________.
| dish antenna |
| omnidirectional antenna |
| neither A nor B |
| both A and B |
Flag this Question
Question 45 4 pts
What propagation problem is especially bad in moist air?
| electromagnetic interference |
| inverse square law attenuation |
| absorptive attenuation |
| multipath interference |
Flag this Question
Question 46 4 pts
The most serious problem with wireless transmission in WLANs is ________.
| multipath interference |
| absorptive attenuation |
| inverse square law attenuation |
| shadow zones |
Flag this Question
Question 47 4 pts
To handle multiple conversations in 802.11 transmission, you normally use multiple ________.
| channels |
| service bands |
| frequencies |
| wires |
Flag this Question
Question 48 4 pts
To transmit very rapidly in radio, you need ________.
| wide bandwidth |
| narrow bandwidth |
| single-mode transmission |
| single-frequency transmission |
Flag this Question
Question 49 4 pts
Channels with wide bandwidths are called ________ channels
| full-duplex |
| broadband |
| parallel |
| multimode |
Flag this Question
Question 50 4 pts
Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band.
| less absorptive attenuation |
| both A and B |
| neither A nor B |
| more bandwidth |
Flag this Question
Question 51 4 pts
If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________.
| still protected by a firewall |
| still protected by encryption |
| neither A nor B |
| both A and B |
Flag this Question
Question 52 4 pts
In 802.11i, protection is provided between the client and the ________.
| router |
| server |
| switch |
| access point |
Flag this Question
Question 53 4 pts
The Wi-Fi Alliance calls 802.11i ________.
| WEP |
| WPA |
| none of the above |
| WPA2 |
Flag this Question
Question 54 4 pts
What is the strongest security protocol for 802.11 today?
| 802.11i |
| 802.11s |
| WPA |
| 802.11X |
Flag this Question
Question 55 4 pts
802.11i 802.1X initial authentication mode was created for ________.
| corporations with less than eight access points |
| residences with a single access point |
| corporations with multiple access points |
| residences with less than eight access points |
Flag this Question
Question 56 4 pts
In what initial authentication mode of 802.11i is a central authentication server used?
| PSK |
| both A and B |
| 802.1X |
| neither A nor B |
Flag this Question
Question 57 4 pts
A rogue access point is usually created by ________.
| an evil twin |
| the IT security department |
| an employee |
| an external attacker |
Flag this Question
Question 58 4 pts
If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
| two |
| one |
| four |
| none of the above |
Flag this Question
Question 59 4 pts
Which of the following is usually set up by a hacker outside the building?
| both A and B |
| a rogue access point |
| an evil twin access point |
| neither A nor B |
Flag this Question
Question 60 4 pts
You should use a VPN ________.
| always |
| if you know that an evil twin access point is in use. |
| if you know that your device has been compromised by an evil twin attack. |
| never |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
