Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts								
							Networking
				Q: 
				Which of the following protocols provides for both authentication and encryption?a. HTTP b. HTTP-S c. S-HTTPd. HTTPS			
		
				Q: 
				Which protocol is used to exchange information over the World Wide Web?a. HTTP b. FTP c. NFSd. SMB			
		
				Q: 
				PPP supports network protocols, such as IPX/SPX, NetBEUI, and TCP/IP. _________________________			
		
				Q: 
				Remote access protocols are used to carry network packets over a WAN link. _________________________			
		
				Q: 
				X.25 is more commonly used in Europe and other countries than in the United States. _________________________			
		
				Q: 
				ISDN basic rate interface consists of two channels. _________________________			
		
				Q: 
				Mozilla is an open-source Web browser that is installed in Mac OS X by default. _________________________			
		
				Q: 
				In Internet Explorer, the restricted sites zone is used to designate specific sites that are safe to access. _________________________			
		
				Q: 
				The NFS software that was originally developed by Sun Microsystems uses remote procedure calls via TCP port 111. _________________________			
		
				Q: 
				With FTP, Port 20 is a control port for FTP commands that control how data is sent. _________________________			
		
				Q: 
				In SSL, the client makes a secure connection request, and the server replies with a digital certificate accompanied by a public key. _________________________			
		
				Q: 
				When used with S-HTTP, CMS is used to provide encryption for MIME data and to apply a digital signature to MIME data. ______________________________			
		
				Q: 
				A Windows 2000/2003 server can be set up as a VPN server by implementing Routing and Remote Access Services.			
		
				Q: 
				MS-CHAP v2 is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.			
		
				Q: 
				A VPN is a private network that is like a tunnel through a larger network.			
		
				Q: 
				CSLIP supports network connection authentication to prevent someone from intercepting a communication.			
		
				Q: 
				The maximum downstream transmission speed of ADSL is 6.0 Mbps.			
		
				Q: 
				Windows 2000 Professional and Windows XP Professional do not offer RAS services and rely on their server counterparts to provide this service.			
		
				Q: 
				Windows Server 2003 enables the installation of the Internet Explorer Enhanced Security Configuration component that should be installed to provide strong security options for this server operating system.			
		
				Q: 
				NFS is a connectionless protocol that runs within UDP.			
		
				Q: 
				Port 21 is a control port for FTP commands that controls how data is sent.			
		
				Q: 
				HTTPS is used primarily in native HTTP communications and does not encrypt data in IP-level communications.			
		
				Q: 
				What seven security techniques does Windows 2000 Professional use to support WNICs?			
		
				Q: 
				What two key lengths are used in WEP encryption?			
		
				Q: 
				What four general steps are used in the wireless communication authentication process?			
		
				Q: 
				List five of the common wireless security measures that can be taken to protect a wireless network.			
		
				Q: 
				What two approaches should be considered when planning for wireless communications?			
		
				Q: 
				What two things can an attacker do after successfully launching a man-in-the-middle attack?			
		
				Q: 
				What four main elements can an attacker use to locate a wireless network?			
		
				Q: 
				List the four transmission speeds available when using the 802.11b standard?			
		
				Q: 
				List five needs are wireless networks are designed and installed to accommodate? (List five.)			
		
				Q: 
				____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.			
		
				Q: 
				____________________ transmissions can be broadcast in a single direction or in all directions, using a LED to transmit and a photodiode to receive.			
		
				Q: 
				The 802.11b standard uses _____________________________________________, which is a method for radiating a data-carrying signal over radio waves.			
		
				Q: 
				802.11a uses _____________________________________________ which functions by dividing the 5-GHz frequency range into a series of 52 subcarriers or subchannels.			
		
				Q: 
				In CSMA/CA, a station waiting to transmit determines if the frequency is idle by checking the ___________________________________ level.			
		
				Q: 
				In ____________________ access, the access point also functions as a point coordinator.			
		
				Q: 
				Because a(n) ____________________ antenna radiates primarily in one direction, the signal goes farther from the source.			
		
				Q: 
				A(n) ____________________is a device that sends out (radiates or transmits) and picks up (receives) radio waves.			
		
				Q: 
				A limitation of ____________________ transmissions is that they are interrupted by tall land masses, such as hills and mountains.			
		
				Q: 
				____________________ are licensed by the FCC to transmit voice, Morse code, data, satellite, and video signals over radio waves and microwaves.			
		
				Q: 
				Does the 802.11a wireless transmission standard operate in the 5-GHz range?			
		
				Q: 
				In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?			
		
				Q: 
				Is priority-based access also called the distributed coordination function?			
		
				Q: 
				Does the signal gain in an indoor network generally need to be as high as for an outdoor network?			
		
				Q: 
				Does a directional antenna send radio waves in one main direction and generally amplify the radiated signal to a greater degree than an omnidirectional antenna?			
		
				Q: 
				Is an access point usually a router or switch?			
		
				Q: 
				Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?			
		
				Q: 
				Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?			
		
				Q: 
				Does Red Hat Linux 9.x support Bluetooth and offer the Bluetooth Setup Assistant, the Bluetooth Serial Utility, and the Bluetooth File Exchange tools?			
		
				Q: 
				Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?			
		
				Q: 
				What type of wireless network topology is being displayed in the figure above?a. ESS b. IBSS c. 802.11Rd. SOS			
		
				Q: 
				What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional			
		
				Q: 
				What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional			
		
				Q: 
				What type of device does an attacker use to determine the location of a target wireless network?a. Antenna b. GPS c. WNICd. War-driving software			
		
				Q: 
				What is the distance that most Bluetooth devices can transmit?a. 30 feet b. 60 feet c. 100 feetd. 300 feet			
		
				Q: 
				Which wireless roaming protocol generally conforms to the 802.11 standard?a. ESS b. IAPP c. IBSSd. IWAP			
		
				Q: 
				What is the name of a wireless topology that uses two or more access points?a. Multiple-cell wireless LAN b. Multi access point LAN c. Multiple-cell wireless WANd. Multi access point WAN			
		
				Q: 
				Which wireless network topology uses access points to provide a more extensive area of service?a. BSS b. ESS c. IBSSd. SES			
		
				Q: 
				What is the maximum speed of transmission for directional 802.11R?a. 1 Mbps b. 16 Mbps c. 22 Mbpsd. 56 Mbps			
		
				Q: 
				In which frequency range does 802.11R operate?a. 1 Ghz to 2 Ghz b. 2 Ghz to 5 Ghz c. 100 Ghz to 1000 Ghzd. 100 Ghz to 1000 Thz			
		
				Q: 
				Which is the most expensive wireless standard to implement?a. 802.11b b. 802.11g c. 802.11ad. They are all about the same			
		
				Q: 
				What is the maximum operating speed of the 802.11b standard?a. 11 Mbps b. 22 Mbps c. 56 Mbpsd. 54 Mbps			
		
				Q: 
				Which wireless standard should be used when there are many individual users in a small area, such as in a computer lab?a. 802.11a b. 802.11g c. 802.11bd. Both a and ce. Both a and b			
		
				Q: 
				What is the maximum distance that 802.11a devices can transmit?a. 60 feet b. 100 feet c. 300 feetd. 300 meters			
		
				Q: 
				What is the width of each channel in the 802.11b standard?a. 2.4 Ghz b. 5 Ghz c. 22 Mhzd. 11 Mhz			
		
				Q: 
				How many channels does the 802.11b standard use in France?a. 4 b. 6 c. 11d. 13			
		
				Q: 
				How many channels does the 802.11b standard use in the United States and Canada?a. 4 b. 11 c. 13d. 15			
		
				Q: 
				Which wireless standard usesDSSS?a. 802.11a b. 802.11b c. 802.11cd. 802.11g			
		
				Q: 
				Which wireless standard uses OFDM?a. 802.11a b. 802.11g c. 802.11bd. Both a and be. Both b and c			
		
				Q: 
				At what speed must all devices that conform to the 802.11a standard be able to transmit?a. 6 Mbps b. 12Mbps c. 24Mbpsd. All of the above			
		
				Q: 
				Which of the following can interfere with wireless network communications?a. Solar flares b. Physical obstacles c. Weatherd. All of the above			
		
				Q: 
				Which access method is incorporated into the 802.11 standard?a. Priority-based b. CSMA/CA c. CSMA/CDd. Both a and be. Both a and c			
		
				Q: 
				The _____ certification means the device meets the standard for Wi-Fi.a. WICA b. WLANA c. WECAd. ISO			
		
				Q: 
				What is the name of the device that attaches to a cabled network and services wireless communications between WNICs and the cabled network?a. Access hubb. Access switch c. Access pointd. Wireless router			
		
				Q: 
				Which specification enables multiple protocols to be carried over a network, and allows the computer and the computer's operating system to interface with the WNIC?a. NDIS b. ODI c. RPCd. Both a and be. Both b and c			
		
				Q: 
				On which layers of the OSI model does 802.11 focus?a. Physical and data-linkb. Data-link and network c. Physical onlyd. Data-link only			
		
				Q: 
				What is the typical data rate of spread spectrum packet transmission?a. 1-11 Mbps b. 1-22 Mbps c. 1-100 Mbpsd. 1-54 Mbps			
		
				Q: 
				Which radio frequency band is primarily used in older, nonstandardized wireless devices?a. 902 MHz b. 2.4 GHz c. 5 GHzd. 11 GHz			
		
				Q: 
				Which organization is supported by wireless network device manufacturers and promoters, including Alvarion, Cisco Systems, ELAN, Intermec, Intersil, Raylink, and Wireless Central?a. WINLAB b. WLANA c. IEEEd. WNDMO