Pages

Monday, 7 September 2015

Wifi Objective type Questions and Answers

11. Which is Expected to be ratified sometime in 2005, this Radio Resource Management standard will provide measurement information for access points and switches to make WLANs run more efficiently.
A. 802.11a
B. 802.11b
C. 802.11e
D. 802.11g
E. 802.11i
F. 802.11k
G. 802.11n
Ans: F

12.  Which is Expected to be ratified in mid-2005, this quality-of-service specification is designed to guarantee the quality of voice and video traffic.
A. 802.11a
B. 802.11b
C. 802.11e
D. 802.11g
E. 802.11i
F. 802.11k
G. 802.11n
Ans: C

13. Which Wi-Fi security is impossible to crack?
A. WEP
B. WPA
C. MAC Filtering
D. None of the above
Ans: D

14. What should you do to keep unauthorized users from changing your home router settings?
A. Change the firewall settings on your computer
B. Change the default administrator password and SSID
C. Change the MAC address of the router
D. Nothing, only the administrator can change router settings
Ans: B

15. What are the two components necessary to have a wireless network?
A. A laptop and the internet
B. An access point and a WNIC
C. A router and an internet connection
D. A dual layer DVD reader and a LAN
Ans: B

16. What channel is the default for commercially sold routers?
A. Channel 5
B. Channel 6
C. Channel 7
D. Channel 2
Ans: B

17. Which of the following is a sign that you might be on an unsafe network?
A. The connection requires you to sign up for an account
B. There is no password needed to access the internet
C. You get free access with every fifth frappe
D. None of the above
Ans: B

18. Why is WEP security not as strong as WPA or WPA2 even though the code key is longer?
A. WPA uses tunneling protocols
B. WEP sends authentication codes with each packet
C. WEP lacks the ability to use special characters
D. WEP is not compatible with Windows 7 or Mac OS
Ans: B

19. Which wireless protocol uses TKIP?
A. WEP
B. WPA
C. WPA2
D. WPS
Ans: B

20. What is an Evil Twin Attack?
A. An attack that mimics your MAC address to enter your network
B. An attack that denies service to your router
C. An attack that creates a mock website to trick a user into divulging secure information
D. An attack that copies all of the files from your router to a secondary hard drive on a hacker computer and then harvest information continuously on your browsing activity
Ans: C

More Questions & Answers:-
Page1 Page2 Page3

No comments:

Post a Comment