Casey is installing group of antennas for wireless network

Assignment Help Computer Network Security
Reference no: EM133397631

Questions

1. Casey is installing a group of antennas for a wireless network. All of the antennas need to be tilted away from each other to introduce a measure of delay between the individual antenna radio signals. What type of antenna is he installing?

A. Semi-directional antenna

B. MIMO antenna

C. Highly directional antenna

D. Omnidirectional antenna

2. Lin is a wireless network engineer. She is performing a spectrum and protocol analysis on a branch office prior to implementing a wireless LAN (WLAN) solution. She is currently concerned with microwave ovens, cordless phones, fluorescent bulbs, and Bluetooth radios. Which of the following is she addressing?

A. Access point placement

B. Self-organizing WLANs

C. Sources of noise and interference

D. Coverage analysis

3. Which standard will enable devices to perform close to mobile carrier 5G millimeter speeds but will require buying new Wi-Fi routers and devices?

A. Wi-Fi 6E

B. Wi-Fi 3 (802.11g)

C. Wi-Fi 6 (802.11ax)

D. Wi-Fi 5 (802.11ac)

4. You are a network administrator. Your company recently approved of employees working from home one day a week and the use of employee-owned mobile devices at work. You want to ensure that employees follow wireless security best practices. What is your most important first step?

A. Ensure that WPA2 or WPA3 encryption is enabled and enforced on all personal wireless devices.

B. Ask users to lower the radio power on their home wireless access points.

C. Ask users for the Media Access Control (MAC) addresses of their home wireless access points.

D. Establish a Bring Your Own Device (BYOD) policy.

5. Which service set for Wi-Fi devices is the cornerstone of wireless networks, defines a common topology, is typically connected to a distribution network such as an Ethernet LAN, and moves all communication through the access point?

A. Mesh basic service set (MBSS)

B. Basic service set (BSS)

C. Extended service set (ESS)

D. Independent basic service set (IBSS)

6. Which of the following is not true of how a wireless access point (WAP) works?

A. The assigned frequencies are the unlicensed bands at 2.4 GHz and 5 GHz.

B. It uses RF signals as a carrier band frequency.

C. There are only three possible selections for multichannel WAPs: channel 1, channel 6, and channel 11.

D. It transmits beacons once per minute on the selected radio-frequency (RF) band and channel to advertise its presence and configuration.

7. Which standard is an amendment to 802.11n and streams up to 1.3 Gbps of throughput on the 5 GHz band?

A. Wi-Fi 6 (802.11ax)

B. Wi-Fi 6E

C. Wi-Fi 3 (802.11g)

D. Wi-Fi 5 (802.11ac)

8. Which of the following can be used to connect wireless access points (WAPs) to form a wireless backbone? To be successfully, the WAP needs to have two separate transmitter/receiver channels.

A. Wireless distribution system (WDS)

B. Thin access point

C. Autonomous access point

D. Distribution system service (DSS)

9. A wireless-capable laptop and an access point are both referred to as what?

A. Service set identifier (SSID)

B. Extended service set (ESS)

C. Basic service set (BSS)

D. Station (STA)

Reference no: EM133397631

Questions Cloud

Characteristics of the communication process : What does it mean by "Creating Meaning' which is one of the five characteristics of the communication process?
Discuss how you demonstrated responding positively : Describe and discuss how you demonstrated responding positively, respectfully and encouraged the child to engage and share with you.
Number of distinct branches in variety of nations : The company operates a number of distinct branches in a variety of nations. What are the potential consequences of choosing not to use netcraft for that branch?
Crime scene and lab investigators handling digital evidence : Describe what different agencies state are best practices for crime scene and lab investigators handling digital evidence.
Casey is installing group of antennas for wireless network : Casey is installing a group of antennas for a wireless network. Which of the following is not true of how a wireless access point (WAP) works?
Benefits of membership of suchconferences : Generally the benefits of the membership of suchconferences is more understanding the topic of the organizations are about.
Which could rise to the level of legal dispute : Which could rise to the level of a legal dispute.
Find the policy on corporate travel : Portia is using her company's intranet to find the policy on corporate travel.
Governance controls to large company with legacy systems : Which cloud model provides retention of governance controls to a large company with legacy systems?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Major supreme court cases on cyber exploitation

What are the major Supreme Court cases on cyber exploitation? DES is reasonably efficient in software and very fast and small in hardware.

  Public-private partnership for election system cybersecurity

Public-Private Partnerships for Election Systems Cybersecurity - Research the concepts and structures for public-private partnerships as a means of furthering

  Can you provide some examples of beneficial whitelists

Can you provide some examples of Beneficial Whitelists? What do you feel are the most important elements of successfully monitoring security zones?

  Determine the owner or user of the computer

CIS 484 Project What identifying information did you find on the hard drive to help determine the owner or user of the computer? Does the computer appear

  Minimum contacts test

Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business

  What is cyber terrorism

What is Cyber Terrorism? Name and explain two major damages that can cause due to a Cyber attack and Within the IP packet header, what is the value

  Why is network security critical to financial institutions

Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - Integrating the Enterprise, IS Function & IS Technologies).

  Access and find the flag

The assignment network will contain several host machines and on the machines there will be flags that you will need to identify

  Discuss packet captures of malicious traffic

Find three sites that provide packet captures of malicious traffic, malware samples, or memory dumps of infected systems.

  Write a two pages paper on basic web security

Write a 2 pages paper on basic web security including how to properly configure Microsoft's Baseline Security and how to secure Window's Web Server.

  What are the five http response code categories

What is the structure of a POST request? What headers have to be present in HTTP/1.0 and HTTP /1.1? What are the five HTTP response code categories? What data are contained in HTTP headers?

  Describe the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd