CCNA3 Chapter 7 Practice Test Answers Which statements are true of the Bluetooth 802.15.3 standard? (Choose 2) It is used for peer-to-peer devices that are close to each other. It is used for medium sized LANs. It is used for mobile devices that communicate with a satellite. It operates with a speed of less than 1 Mbps. It operates with a speed of 1 - 10 Mbps. It operates with a sped of 10 - 100 Mbps. Which statements are true of the 802.11 standard? (Choose 2) It is used for peer-to-peer devices that are close to each other. It is used for medium sized LANs. It is used for mobile devices that communicate with a satellite. It operates with a speed of less than 1 Mbps. It operates with a speed of 1 - 10 Mbps. It operates with a speed of 10 - 100 Mbps. In which wave band does 802.11g operate? 1.3 GHz 2.4 GHz 5.7 GHz 10 GHz What was an advantage of 802.11b over 802.11a? 802.11b was faster than 802.11a. 802.11b was less prone to interference than 802.11a. 802.11b was cheaper than 802.11a. 802.11b operated over a longer distance than 802.11a. Which statements are true of 802.11g? (Choose all that apply.) SW It operates in the same wave band as 802.11a. It operates in the same wave band as 802.11b. Operating speed is faster than 802.11b. Operating speed is slower than 802.11b. It is compatible with 802.11a but not 802.11b. It is compatible with 802.11b but not 802.11a. 23/10/2007 D:\533573953.doc 1 Why do wireless NICs not detect collisions? Collisions do not occur with wireless communication because there is no shared medium. Access points behave like switches and provide dedicated bandwidth to each device. Communication between wireless NICs and access points is full duplex. It would be too expensive to make wireless NICs that are capable of detecting collisions. Why is access to the wireless medium regarded as distributed? It is the responsibility of all devices to detect RF signals and wait until the medium is free before transmitting. The access point receives signals from devices that are distributed around it. Signals are distributed over the wave band. The access point controls the allocation of the shared medium to the wireless devices. If wireless devices are on opposite sides of the access point and are too far apart to sense each other, the hidden node problem occurs. What is this problem? The devices will not receive acknowledgement of their transmissions and will therefore assume that the message was lost and send it again. The two devices will be unable to communicate with each other. One device may transmit while the other is transmitting, resulting in a collision. Structural features of the building are likely to interfere with signals. Which device does a Cisco wireless access point most resemble in its behaviour? An Ethernet hub An Ethernet layer 2 switch An Ethernet layer 3 switch A router How does RTS/CTS resolve the hidden node problem? SW It strengthens the signals so that devices on opposite sides of the access point are able to sense each other. The access point allocates the medium to one device, on request, for as long as it needs to transmit. It allows transmissions to be repeated when there is a collision. Devices take turns to transmit, and can do so when they hold the token. 23/10/2007 D:\533573953.doc 2 Which device typically combines the roles of wireless access point, Ethernet switch, and router? Modem Layer 3 switch Wireless router Wireless NIC A single access point and the devices connected to it are known as: A BSS An ESS An ESA An ad hoc topology What is the effect of RF signal attenuation? It causes interference. It causes collisions. It limits the area covered by an access point. It limits the number of access points in an ESS. What name is commonly given to people who look for unsecured wireless networks and use them to gain Internet access? Hackers Crackers Surfers War drivers An access point is using channel 1. Another access point must be added on the same network to extend the area covered. What channel should this additional access point use in order to avoid performance problems? Channel 1. Channel 2 or higher number. Channel 4 or higher number. Channel 6 or higher number. How far should an access point be from the nearest person? SW At least 10 cm At least 20 cm At least 50 cm At least 1 m 23/10/2007 D:\533573953.doc 3 How far should an access point be from metal objects? At least 1 foot At least 2 feet At least 3 feet At least 4 feet How should an access point be mounted? Horizontally Vertically At an angle of 45 degrees At the same height as the wireless devices What is CSMA/CA? A method used to detect collisions on wireless networks and allow devices to resend messages that have been lost after waiting for a random length of time. A system for avoiding collisions by making devices wait until they hold a token before they are allowed to transmit. A system for avoiding collisions by making devices check if the medium if free before transmitting, then using acknowledgements to confirm that the message was received. A method used so that wireless devices can connect to a wired Ethernet network without causing collisions on the wired network. Which is true of an extended service set, where several access points with overlapping coverage areas are deployed on a network? The overlap in coverage must not be more than 5% otherwise there will be interference and poor performance. The access points should use the same SSID so that mobile devices can roam from one area to another. The access points should use different SSIDs for security purposes. The access points must use different RF wave bands. How many methods of authentication are specified in the 802.11 standard? SW None. One: open authentication. Two: open authentication and shared key. Three: open authentication, shared key and TKIP. Four: open authentication, shared key, TKIP and AES. 23/10/2007 D:\533573953.doc 4 Where possible, wireless networks should use security that follows the 802.11i standard. This is equivalent to: TKIP WEP WPA WPA2 When is it sensible to set up open access on the access point? When SSID broadcasts are turned off. On a home network. When security is based on checking MAC addresses. While a new wireless network is being set up. Which statements are true of the SSID? (Choose 2) It identifies a particular wireless network. It identifies a specific access point. For security reasons, the default value should not be used. Turning off SSID broadcasts will ensure network security. A rogue access point can compromise network security. Which is an example of a rogue access point? An employee connects his own access point in order to use his wireless laptop in his office. A technician installs an access point with a channel that overlaps with an existing access point. An access point is installed on an outside wall so that its range extends well outside the building. An access point is configured to broadcast SSIDs, whereas the other access points on the network do not. What are the effects of modifying a wireless NIC so that it accepts all traffic and not just traffic destined for its own MAC address? (Choose 2) SW The NIC will behave like an access point. The NIC can be used to carry out a “man in the middle” security attack. The NIC will transmit simultaneously with the original access point and cause collisions. The NIC will be overloaded and disassociate itself. 23/10/2007 D:\533573953.doc 5 How could an attacker who has modified his laptop’s wireless NIC mount a denial of service attack? (Choose 2) Send repeated CTS (clear to send) messages, so that devices transmit simultaneously and cause collisions. Send transmissions on a different channel so that other devices do not detect them. Send repeated disassociate commands so that devices disassociate and then generate traffic as they try to reassociate. Change the password for authentication so that devices are locked out of the network. Why do some people choose to leave SSID broadcasts enabled rather than disabling them? It allows mobile devices to move from one access point to another within the network, otherwise they would need to be reconfigured. Hackers can detect SSIDs relatively easily, so disabling SSID broadcasts is not regarded as an effective security measure. New devices cannot detect an access point if SSID broadcasts are disabled. Disabling SSID broadcasts prevents a network from having several access points operating simultaneously. In which order does a wireless device carry out procedures for connecting to a wireless network? Associate, Probe, Authenticate Authenticate, probe, Associate Probe, Authenticate, Associate Probe, Associate, Authenticate How should you set the channel on your access point for best performance? (Choose 2) SW Wide channel (40MHz) if you have Wireless-G, Wireless-B and Wireless-N devices. Wide channel (40MHz) if the mode is Wireless-N only. Standard channel if the mode is Wireless-G only. Auto if the mode setting is Disabled. 23/10/2007 D:\533573953.doc 6 Which statements are true of a RADIUS server? (Choose 2) 802.11i includes the optional use of a RADIUS server for authentication. 802.11i specifies that a RADIUS server must be used for security. The RADIUS option that is available for a Linksys wireless router allows you to use a RADIUS server in combination with WEP. Each access point contains its own RADIUS server software, a central AAA server is not needed. The process of broadcasting a network’s SSID is called: Probing Associating Beaconing Advertising Which statements are true of TKIP? (Choose 2) SW TKIP uses a different encryption key for each packet. TKIP uses the same encryption algorithm as WEP. TKIP failed to address the weaknesses of WEP security. TKIP complies with broader IT industry standards and particularly IEEE 802.11i. 23/10/2007 D:\533573953.doc 7