Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 40 4 pts Which core diameter is used in multimode fiber. 8 microns 8 mm 50 mm 50 microns Flag this Question Question 41

Question 40 4 pts

Which core diameter is used in multimode fiber.

8 microns
8 mm
50 mm
50 microns

Flag this Question

Question 41 4 pts

Wi-Fi is a term used by the ________.

Wi-Fi Alliance
neither A nor B
IEEE
both A and B

Flag this Question

Question 42 4 pts

Compared to wired transmission, propagation problems in radio transmissions are ________.

about as bad
better
worse

Flag this Question

Question 43 4 pts

Wireless radio transmission speed is usually measured in terms of ________.

amplitude
wavelength
frequency
dollars

Flag this Question

Question 44 4 pts

Wi-Fi normally uses a(n) ________.

dish antenna
omnidirectional antenna
neither A nor B
both A and B

Flag this Question

Question 45 4 pts

What propagation problem is especially bad in moist air?

electromagnetic interference
inverse square law attenuation
absorptive attenuation
multipath interference

Flag this Question

Question 46 4 pts

The most serious problem with wireless transmission in WLANs is ________.

multipath interference
absorptive attenuation
inverse square law attenuation
shadow zones

Flag this Question

Question 47 4 pts

To handle multiple conversations in 802.11 transmission, you normally use multiple ________.

channels
service bands
frequencies
wires

Flag this Question

Question 48 4 pts

To transmit very rapidly in radio, you need ________.

wide bandwidth
narrow bandwidth
single-mode transmission
single-frequency transmission

Flag this Question

Question 49 4 pts

Channels with wide bandwidths are called ________ channels

full-duplex
broadband
parallel
multimode

Flag this Question

Question 50 4 pts

Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band.

less absorptive attenuation
both A and B
neither A nor B
more bandwidth

Flag this Question

Question 51 4 pts

If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________.

still protected by a firewall
still protected by encryption
neither A nor B
both A and B

Flag this Question

Question 52 4 pts

In 802.11i, protection is provided between the client and the ________.

router
server
switch
access point

Flag this Question

Question 53 4 pts

The Wi-Fi Alliance calls 802.11i ________.

WEP
WPA
none of the above
WPA2

Flag this Question

Question 54 4 pts

What is the strongest security protocol for 802.11 today?

802.11i
802.11s
WPA
802.11X

Flag this Question

Question 55 4 pts

802.11i 802.1X initial authentication mode was created for ________.

corporations with less than eight access points
residences with a single access point
corporations with multiple access points
residences with less than eight access points

Flag this Question

Question 56 4 pts

In what initial authentication mode of 802.11i is a central authentication server used?

PSK
both A and B
802.1X
neither A nor B

Flag this Question

Question 57 4 pts

A rogue access point is usually created by ________.

an evil twin
the IT security department
an employee
an external attacker

Flag this Question

Question 58 4 pts

If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).

two
one
four
none of the above

Flag this Question

Question 59 4 pts

Which of the following is usually set up by a hacker outside the building?

both A and B
a rogue access point
an evil twin access point
neither A nor B

Flag this Question

Question 60 4 pts

You should use a VPN ________.

always
if you know that an evil twin access point is in use.
if you know that your device has been compromised by an evil twin attack.
never

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

mple 10. Determine d dx S 0 t dt.

Answered: 1 week ago