quiz6
pdf
keyboard_arrow_up
School
South Texas College *
*We aren’t endorsed by this school
Course
2435
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
4
Uploaded by DoctorMetal770
View Assessment
1/4
Quiz 6
0
OF 10 QUESTIONS REMAINING
20 minutes remaining
Quiz Content
Question 1
10 Points
Which protocol replaced TKIP for WPA2?
CCMP
WEP
RADIUS
RC4
Question 2
10 Points
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CD
EAPoL
CSMA/CA
SSID
Question 3
10 Points
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 4
Layer 3
View Assessment
2/4
Layer 2
Layer 1
Question 4
10 Points
As you’re troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?
RSSI
Channel
EIRP
Band
Question 5
10 Points
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11g
802.11ac
802.11b
802.11ax
Question 6
10 Points
Which one of the following wireless transmission types requires a clear LOS to function?
Bluetooth
NFC
IR
Wi-Fi
View Assessment
3/4
Question 7
10 Points
Which of the following wireless technologies does not use the 2.4 GHz band?
Z-Wave
Bluetooth
ZigBee
Wi-Fi
Question 8
10 Points
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you’re about to sign in, you realize that you clicked on an SSID called “Free Coffee and Internet.†What kind of security trap did you almost fall for?
Guest network
Captive portal
Evil twin
Brute force attack
Question 9
10 Points
You’ve just completed a survey of the wireless signals traversing the airspace in your company’s vicinity, and you’ve found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?
Rogue AP
War driving
Evil twin
Hidden node
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
View Assessment
4/4
Question 10
10 Points
Which function of WPA/WPA2 security ensures data cannot be read in transit?
Message integrity
Authentication
Encryption
Key distribution