Module 12 Pre-Assessment

Module 12 Pre-Assessment

11th Grade

25 Qs

quiz-placeholder

Similar activities

Testout Networking

Testout Networking

11th - 12th Grade

20 Qs

Remidi XI TKJ2 UH 2 Teknologi Jaringan WAN

Remidi XI TKJ2 UH 2 Teknologi Jaringan WAN

11th Grade

20 Qs

2022/2023 TJBL Menganalisis WAN

2022/2023 TJBL Menganalisis WAN

11th Grade

20 Qs

PERKEMBANGAN TEKNOLOGI BEGERAK 1B-12

PERKEMBANGAN TEKNOLOGI BEGERAK 1B-12

KG - Professional Development

20 Qs

Networking

Networking

11th - 12th Grade

20 Qs

Computer Network

Computer Network

9th - 12th Grade

20 Qs

Ulangan Harian

Ulangan Harian

11th Grade

25 Qs

REMIDI TEKNOLOGI JARINGAN BERBASIS LUAS

REMIDI TEKNOLOGI JARINGAN BERBASIS LUAS

11th Grade

25 Qs

Module 12 Pre-Assessment

Module 12 Pre-Assessment

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Alicia Pierce

Used 20+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of management frame may regularly be broadcast by an AP?

beacon

probe request

authentication

probe response

Answer explanation

Beacons are the only management frame that may regularly be broadcast by an AP. Probing, authentication, and association frames are used only during the association (or reassociation) process.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

omnidirectional

directional

Yagi

dish

Answer explanation

Omnidirectional antennas send the radio signals in a 360 degree pattern around the antenna. This provides coverage to devices situated anywhere around the access point. Dishes, directional, and Yagi antennas focus the radio signals in a single direction, making them less suitable for covering large, open areas.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an advantage of SSID cloaking?​

It provides free Internet access in public locations where knowing the SSID is of no concern.

Clients will have to manually identify the SSID to connect to the network.​

SSIDs are very difficult to discover because APs do not broadcast them.​

It is the best way to secure a wireless network.

Answer explanation

SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered. The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

sending an ARP request

delivering a broadcast frame

transmitting a probe request

initiating a three-way handshake

receiving a broadcast beacon frame

Answer explanation

Two methods can be used by a wireless device to discover and register with an access point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that contains the SSID and other wireless settings. In active mode, the wireless device must be manually configured for the SSID, and then the device broadcasts a probe request.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

ad hoc

hotspot

infrastructure

mixed mode

Answer explanation

Ad hoc mode (also known as independent basic service set or IBSS) is used in a peer-to-peer wireless network such as when Bluetooth is used. A variation of the ad hoc topology exists when a smart phone or tablet with cellular data access is enabled to create a personal wireless hotspot. Mixed mode allows older wireless NICs to attach to an access point that can use a newer wireless standard.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

enterprise

personal

shared key

WEP

Answer explanation

WPA and WPA2 come in two types: personal and enterprise. Personal is used in home and small office networks. Shared key allows three different authentication techniques: (1) WEP, (2) WPA, and (3) 802.11i/WPA2. WEP is an encryption method.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

802.11a

802.11b

802.11g

802.11ad

802.11ac

Answer explanation

The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?