Shared Flashcard Set

Details

CCT4 Mod 3.2.3 Wireless Networks
CCT4 Mod 3.2.3 Wireless Network
61
Communication
Professional
03/25/2011

Additional Communication Flashcards

 


 

Cards

Term

Wireless Network, data is transmitted via?

 

A.WIFI

B.Microwave

C.Smoke signals

D.Radio Waves

Definition
D.Radio Waves
Term

Wireless Connection Speeds are?


A.10&48Mbps

B.11&54Mbps

C.10&64Mbps

D.11&64Mbps

Definition
B.11&54Mbps
Term

If Two APs reply to the probe, the laptop will use whichever has the___ Signal.

 

A. Stronger

B. Weaker

C. More Secure

D. None of the above

Definition

A. Stronger

Term

A wireless network begins with an?

 

a. network point

b. wireless starting point

c. access point

d. both a. and b.

Definition

c. access point

Term

Which one is a wireless networks?

 

a. IEEE 802.10 b/a/g/n

b. IEEE 802.11 b/a/g/n

c. IAEE 802.11 a/b/c/g

d. IEEE 803.11 a/b/c/g

Definition

b. IEEE 802.11 b/a/g/n

Term

true / false

An AP includes a radio transmitter and receiver and long range satellite transmitter and receiver.

Definition

False

An AP includes only radio transmitter and receiver

Term

The other wireless nodes in a network are called?

 

a. customer/wireless AP

b. clients/stations

c. access point/clients

d. can be both a. and b.

Definition
b. clients/stations
Term

When a PC or laptop connects to a network, it broadcasts a probe request identifying itself and asking if an other wireless devices are within range  That wireless range covers a ________ radius.

 

a. 25ft to 125ft radius

b. 25ft to 160ft radius

c. 25ft to 54ft radius

d. 25ft to 100ft radius

Definition

a. 25ft to 125ft radius

Term

true / false

On a wireless network the range is a factor of frequencies transmitter signal strenghts only.

Definition

false

 

It also includes the Sensitivity of the receivers.

Term

true / false

 If a AP within range picks up the probe request, the AP broadcests and acknowledgement and the two go through whatever security or payment arrangements the network has set up.

Definition
true
Term

A wireless network can be extend beyond the range of a routers, provided there are occasional _______ that pick up fading ccommunications to and from access points and rebroadcast the signals with renewed strength.

 

a. flash points

b. hot points

c. rebroadcast points

d. extension points

Definition
d. extension points
Term

This is a term uses for areas where wireless networks are open the public

 

a. MAN
b. Hotspots
c. WAN
d. WPA

Definition

b. Hotspots

Term

This device contains a transmitter and receiver and operates in either 2.4GHz or 5GHz radio band

 

a. AP
b. switch
c. hub
d. gateway

Definition

a. AP

Term

What is the maximum transfer speed of a wired network?

 

a. 150 Mbps
b. 100 Mbps
c. 54 Mbps
d. 11 Mbps

Definition
b. 100 Mbps
Term

Refers to how quickly computers on a network can communicate and share information

 

a. Powerboost
b. Operating System
c. Network range
d. Network speed

Definition
d. Network speed
Term

If you have cust. that's having a problem with their wireless network speeds, what would be the one place you would recommend not putting the router in their house.

 

a. family room

b. office

c. ensure that the wireless card and router anttenna are pointing toward each other

d. next to a outside wall

 

Definition

d. next to a outside wall

Term

What wireless technology is backwards compatible to b/a/g, operates in 2.4GHz and 5GHz radio frequency and has a data speed of 160-300+Mbps and distance rating of 160-300+ft?

 

a. 802.11n
b. 802.1x
c. 802.11f
d. 802.12n

Definition
a. 802.11n
Term

What wireless standard operates in 2.4GHz radio frequency, with data rates of up to 54Mbps, and a distance range of 100-150ft range and is compatible with 802.11b?

 

a. 802.11a
b. 802.1x
c. 802.11g
d. 802.11n

Definition
c. 802.11g
Term

What wireless standard uses 5GHz radio band, with data speeds of up to 54Mbps, distance range from 25-75 ft, and is commonly used in offices?

 

a. 802.11n
b. 802.11a
c. 802.12a
d. 802.11b

Definition
b. 802.11a
Term

What wireless standard uses 2.4GHz radio band, with a distance range from 100-150 ft, and data rates of up to 11Mbps?

 

a. 802.11a
b. 802.11g
c. 802.12b
d. 802.11b

Definition
d. 802.11b
Term
What are the eight common network security threats?
Definition
1.Virus
2.Spyware
3.Adware
4.SPAM
5.Hackers
6.Hijacking
7.Phishing
8.Cookies
Term

What are the four main types of viruses?

 

a. executable, email, worms, trojan horse
b. Spam, email, worms, trojan horse
c. Executable, Pop ups, worms, trojan horse
d. Replication, event watching, camouflage, delivery
d. executable, email, worms, pop-up

Definition
a. executable, email, worms, trojan horse
Term

What are the four actions of a virus?

 

a. spyware, popups, spam, trojan horse
b. replication, event watching, camouflage, delivery
c. executable, email, worms, trojan horse
d. none of the above

Definition
b. replication, event watching, camouflage, delivery
Term

When a virus inserts itself into other programs and files, this action is known as________?

 

a. event watching
b. delivery
c. replication
d. camouflage

Definition
c. replication
Term

When a virus checks for conditions, usually a specific date. Whenever the triggering condition exists, the

virus delivers its destructive payload, this action is known as______?

 

a. event watching
b. camouflage
c. replication
d. delivery

Definition
a. event watching
Term

What is the action called when a virus disguises itself to avoid detection?

 

a. replication
b. delivery
c. event watching
d. camouflage

Definition
d. camouflage
Term

What is the action called when a triggering condition is met , the virus unleashes its payload?

 

a. replication
b. delivery
c. camouflage
d. event watching

Definition
b. delivery
Term

What is the device that filters out intrusions by shutting down non-essential ports?

 

a. switch
b. gateway
c. anti-spyware software
d. firewall

Definition
d. firewall
Term

What are the three types of firewall rules?

 

a. packet filetring, proxy, stateful inspection
b. port triggering, port forwarding, port blocking
c. packet filtering, port triggering, port blocking
d. packet filtering, port forwarding, port triggering

Definition
a. packet filetring, proxy, stateful inspection
Term

Looks for sections of the code triggered by(1) time or date events routines to search for (2)files formatted in .exe, .vbs, .bat. as well as, (3)disk writes that bypass the operation system.

 

 

a. spam
b. virus
c. heuristic detectors
d. hackers

Definition

c. heuristic detectors

Term

What is a program that sends information about the user and sends the data to marketers and advertisers?

 

a. virus
b. spyware
c. spam
d. pop ups

Definition
b. Spyware
Term

What are the some ways in preventing spyware?

 

a. spyware scanner, pop up blocker, and disable Active-X
b. spyware scanner, hire a hacker, pop up blocker
c. be suspicious of installing new software, and use the "X" to close out new software
d. both a. and c.

Definition

d. both a. and c.

 

a. spyware scanner, pop up blocker, and disable Active-X

 


c. be suspicious of installing new software, and use the "X" to close out new software


Term

This type of virus piggybacks on real programs

 

  • a. worms
  • b. trojan horse
  • c. executable
  • d. spyware
Definition
c. Executable
Term

This type of virus replicates itself then automatically mails itself to the victim's global address lists

 

a. spyware
b. pop ups
c. trojan horse
d. email virus

Definition
d. email virus
Term

This type of virus uses computer networks and security holes to replicate itself

 

a. spam
b. worms
c. pop ups
d. spyware

Definition

b. worms

Term

This type of virus claims to be one thing and unleashes its payload when ran

 

a. trojan horse
b. email virus
c. pop ups
d. worms

Definition

a. trojan horse

Term

This individuals exploit weaknesses in a network or computer then gains unauthorized access for malicious intent

 

a. IT guy
b. person seating next to you
c. hackers
d. crackers

Definition
c. hackers
Term

How do you end a continuous ping?

 

  • a. type stop
  • b. -t
  • c. control+c
  • d. control+s
Definition
c. control+c
Term

A _______ __ Uses an antenna-equipped expansion card or a USB antenna attachment.


A. LAPTOP PC

B. GATEWAY

C. DESKTOP PC

D. ROUTER

Definition
C. DESKTOP PC
Term

What is one of the reasons why 2.4 GHz is a commonly used frequency?

 

A. It is unregulated

B. IT'S Regulated by FCC

C. it's the most unused Feq. band

D. because only wireless phone uses it


Definition

A. It is unregulated

Term

What is the frequency used by 802.11a to transfer data, and what is the Range?

 

a. 2.4GHz 25-75feet

b. 2.6GHz 100-150feet

c. 5GHz 25-75feet

d. 5GHz up to 160feet

Definition
c. 5GHz 25-75feet
Term

The range of 802.11b and g?

 

a. 25-75 feet

b. up to 160 feet

c. 100-150 feet

d. 360 - 390 feet

Definition
c. 100-150 feet
Term

True or False

 

Antivirus software and Firewalls

help block spyware installed with a download you ask for

Definition
False
Term

true / false

Wireless 802.11g is compatible with wireless standards on A, B, and G.

Definition

false

only B and G not A

Term

true or false

In wireless bandwidth 802.11, 2.4GHz is already crowded with cell phone freq.

Definition

false

2.4GHz is croweded with cordless phones freq.

Term

Speeds for wireless networks are?

 

a. 802.11a/b/g is 54Mbps, 802.11n is 100Mbps

b. 802.11a/b is 11Mbps, 802.11g 54Mbps, 802.11n is 100Mps

c. 801.11a/g is 54Mbps, 801.11b is 11Mbps, 801.11n is 100Mbps

d. 802.11a/g is 54Mbps, 802.11b is 11Mbps, 802.11n is 100Mbps

Definition
d. 802.11a/g is 54Mbps, 802.11b is 11Mbps, 802.11n is 100Mbps
Term

A virus detector that look of sections of code triggered by a time or date events, file extensions, or disk writes that bypass the operating system.

 

a. Spyware

b. heuristic detectors

c. adware

d. firewall

Definition

b. heuristic detectors

Term

What are the three main types of firewall rules?

 

a. Packet filtering, Packet blocking, hacker blocking

b. MAC filtering, MAC blocking, Packet filtering

c. packet filtering, Proxy, Stateful inspection

d. Packet blocking, MAC blocking, Proxy

 

Definition
c. packet filtering, Proxy, Stateful inspection
Term

The firewall compares key parts of each packet to database of known safe data. This called what?

 

a. stateful inspection

b. packet filtering

c.restful inspection

d. proxy

 

Definition
a. stateful inspection
Term

The frewall examines each packet and if the origination address of the data is on a list a of banded Internet locations, and the firewall blocks it.

 

a. Proxy

b. restful inspection

c. packet filtering

d. IT Proxy

Definition
  • c. packet filtering
Term

The server examines all data based on the filtering rules and only forwards packets that obey the rules. If a dangerous transmission manages to sneak past the filters.

 

a. stateful inspection

b. Proxy

c. IT Proxy

d. Packet filtering

Definition

b. Proxy

Term

RAM stand for what.

 

a. Random Access Memory

b. Ram Access Memory

c. Read-only Access Memory

d. Random Acounting Memory

Definition

a. Random Access Memory

Term

ROM stand for what?

 

a. Random Only Memory

b. Random On Memory

c. Read Only Memory

d. Random Only Memory

Definition
c. Read Only Memory
Term

A Cust. get a blue screen errors that display the words ____ ____ along with a cryptic set of hexadecimal addresses. What just happen to the Cust. Opearating System.

 

a. Stop errors

b. IRQ errors

c. Memory Dump

d. Memory Errors

Definition
c. Memory Dump
Term

A Cust. Computer with the XP version of Windows is getting errors on startup and can have numerous causes, which indicate problems with a device or driver. These errors are called what.

 

a. Stop errors

b. IRQ errors

c. Memory Dump

d. Memory Errors

 

Definition

a. Stop errors

Term

UDP stands for what

 

a. Upper Data Protocol

b. Upper datagram Plant

c. User Datagram Protocol

d. Upper Dated Protocol

Definition
User Datagram Protocol
Term

The CHSI minimum requirement for memory

 

a. 512 MB

b. 1000 MB

c. 256 MB

d. 1 GB

Definition

c. 256 MB

Term

What does USB stand for?

 

a. Universal Serial Bus

b. User Serial Bus

c. User Server Bus

d. User Side Bar

Definition
Universal Serial Bus
Term

true / false

PCMCIA stand for Personal Computer Memory Card International Association

Definition
true
Term

 

If a cust. gets the following after send an e-mail "SMTP 550" what does it mean?

 

a. email sent over a non-secure network

b. email doesn't have a addressee

c. addressees not found

d. email sent no problem found

Definition

c. addressees not found

 

A bad email address that bounces back to the sender

 

aka: a bounce message

Supporting users have an ad free experience!