Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Welcome to All Test Answers

Tutorial 7-Wireless Networking-new perspectives on the internet-9th edition-Schneider and Evans-test bank


 

Download  file with the answers

Not a member!
Create a FREE account here to get access and download this file with answers


Tutorial 7: Wireless Networking

TRUE/FALSE

1. The first wireless technology was used in 1988.

2. SMS is no longer one of the most widely used and popular forms of communication methods, having been replaced in 1994 by PCS.

3. “Wi-Fi” is short for “wireless fidelity.”

4. A device configured for the 802.11a standard will always be compatible with one configured for 802.11b.

5. City-wide wireless networks are often called municipal broadband.

6. A wireless mesh network is a series of wireless nodes that relay communication across a network.

7. Devices using infrared technology can easily beam information across a crowded room, or even around a corner.

8. All Bluetooth devices are designed to be compatible with each other.

9. A piconet can connect two to sixteen devices at a time.

ANS: F PTS: 1 REF: WEB 364

10. WWAN networking provides wireless connections to the Internet using networks created by cellular phone carriers.

ANS: T PTS: 1 REF: WEB 365

11. Wired Passphrase Encryption (WPE) is a security protocol for wireless LANs that works by encrypting data sent over the network.

ANS: F PTS: 1 REF: WEB 378

12. WEP and WPA both can use a 128-bit key to encrypt data.

ANS: T PTS: 1 REF: WEB 379

13. Every network interface card receives a unique number, called a MAC address, to identify the device.

ANS: T PTS: 1 REF: WEB 380

14. Phishing is the act of driving through a neighborhood looking for unsecured wireless networks.

ANS: F PTS: 1 REF: WEB 381

15. A wireless router or access point broadcasts its service set identifier (SSID) as a way of identifying the network’s name.

ANS: T PTS: 1 REF: WEB 381

16. An “evil twin” attack involves a hacker standing close to the user of a wireless device in an attempt to spot login information, passwords, and other sensitive data.

ANS: F PTS: 1 REF: WEB 384

17. Hackers sometimes use “sniffer programs” to illegally monitor activity on wireless networks.

ANS: T PTS: 1 REF: WEB 384

18. Three security problems of Bluetooth devices are bluejacking, bluesnarfing, and bluebugging.

ANS: T PTS: 1 REF: WEB 385-WEB 386

19. Bluejacking is the most dangerous threat to a Bluetooth device.

ANS: F PTS: 1 REF: WEB 385

20. One way to increase protection of wireless devices is to disable the device’s autoconnect feature.

ANS: T PTS: 1 REF: WEB 388

MODIFIED TRUE/FALSE

1. 3G wireless technology is expected to bring network connection speeds of up to 100 Mbps. _________________________

2. A(n) dual band access point makes it possible to connect any wireless device to the same access point. _________________________

3. A(n) MiFi device is a small, battery-operated, mobile personal hotspot for connecting Wi-Fi devices to the Internet. _________________________

4. In a wireless mesh network, the number of nodes that need to be wired to an Internet connection is one. _________________________

5. The two major types of PAN are infrared and Bluetooth. _________________________

6. The term “piconet” is used in relationship to infrared technology. _________________________

ANS: F, Bluetooth

PTS: 1 REF: WEB 364

7. Most consumer Bluetooth devices have a data transfer rate of 1 Mbps. _________________________

8. The accompanying figure shows a(n) 2G wireless device that transmits voice data only. _________________________

ANS: F
1G
First Generation

PTS: 1 REF: WEB 352

9. To access the Internet using a(n) WLAN, you need an account with the cellular carrier that owns the network. _________________________

10. Voice over Internet Protocol converts audio signals to digital packets so that you can use a broadband Internet connection to make telephone calls. _________________________

11. When WEP is enabled, it encrypts data sent over a network using a key, sometimes also called a(n) passphrase, that is entered by the user. _________________________

ANS: T PTS: 1 REF: WEB 378

12. WPA is a standard that was developed by the World Wide Web Consortium to address inherent weaknesses in WEP. _________________________

13. SSIDs are not case-sensitive. _________________________

14. Most experts recommend that, when you leave for vacation, you should change the passphrase to your wireless network for security. _________________________

 

15. Bluesnarfing occurs when a hacker with special software is able to detect the signal from a Bluetooth device and gain access to its data. _________________________

ANS: T PTS: 1 REF: WEB 386

MULTIPLE CHOICE

1. Text messages were first made available to cell phone users with the advent of ____ technology.
a. 1G c. 2.5G
b. 2G d. 3G

ANS: B PTS: 1 REF: WEB 352

2. 3G wireless offers data transfer rates of up to ____ Mbps.
a. 1 c. 5
b. 2 d. 20

3. In 1994, cellular phone carriers created the first commercial digital networks, with a data transfer rate of ____.
a. 14.4 Kbps c. 56 Kbps
b. 14.4 Mbps d. 11 Mbps

ANS: A PTS: 1 REF: WEB 354

4. 3.5G wireless networks are also called ____.
a. mobile broadband
b. WiMAX
c. mobile baseband
d. None of the above; there is no 3.5G wireless network

5. A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, which is connected to the Internet.
a. wired c. wireless
b. ethereal d. cellular

ANS: C PTS: 1 REF: WEB 356

6. The ____ is a not-for-profit organization that certifies interoperability of Wi-Fi products and promotes Wi-Fi as a standard for wireless LANs.
a. W3C c. Mobile Productivity Alliance
b. Wireless Initiative d. Wi-Fi Alliance

7. In Wi-Fi terms, a(n) ____ is an area of network coverage.
a. wired spot c. access zone
b. hotspot d. hot zone

8. A wireless device’s ____ refers to the physical distance between the access point and the wireless device.
a. bandwidth c. network mesh
b. travel zone d. range

9. When you see the term “Wi-Fi,” it most often refers to the 802.11 ____ standard.
a. a c. g
b. b d. n

10. A ____ access point makes it possible to connect any wireless device to the same access point.
a. flex band c. multiple band
b. hi-fi band d. channel band

ANS: C PTS: 1 REF: WEB 357

11. Any Wi-Fi certified device will always be able to connect to ____ access point.
a. only an 802.11g c. any 802.11
b. only an 802.11a d. none of the above

ANS: C PTS: 1 REF: WEB 358

12. City-wide wireless networks are often called ____.
a. municipal broadband c. Muni-Fi
b. Muni Wi-Fi d. all of the above

13. The MiFi device is produced by the company ____.
a. Nokia c. Samsung
b. AT&T d. Novatel

14. The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi device to the Internet.
a. 5 c. 20
b. 10 d. 30

15. The advantage of a wireless mesh network is that ____.
a. it’s less expensive than creating Wi-Fi hotspots
b. each node on the network is wired directly to the Internet
c. each new node added automatically configures itself to work without the use of cables
d. none of the above

16. Using ____ technology, you can wirelessly beam information at up to 4 Mbps from one device to another compatible device using infrared light waves.
a. xray c. infrared
b. gamma spectrum d. air-compress

ANS: C PTS: 1 REF: WEB 362

17. The connection of your smartphone to your wireless headset is an example of a(n) ____.
a. personal area network c. WWAN
b. local area network d. access point network

ANS: A PTS: 1 REF: WEB 362

18. IrDA stands for ____.
a. Infrared Data Association c. Information Deliverance Association
b. Internet Domain Administration d. Integrated Data Access

19. Because infrared uses ____ waves to carry data, it doesn’t interfere with technologies that use radio waves.
a. morse c. fiber-optic
b. light d. cross-spectral

20. Unlike WLAN technology, Bluetooth requires ____ access point(s) for communication.
a. 0 c. 2
b. 1 d. up to 8

ANS: A PTS: 1 REF: WEB 362

21. Though promoted by many companies, Bluetooth technology is officially owned by ____.
a. Ericsson c. nobody
b. Intel d. Lexus

ANS: C PTS: 1 REF: WEB 362

22. A Bluetooth cell phone will also be compatible with a Bluetooth ____.
a. notebook computer c. both a. and b.
b. printer d. neither a. nor b.

23. A collection of devices connected via Bluetooth technology is called a(n) ____.
a. wireless mesh c. IrDA-net
b. bundle d. piconet

24. In the accompanying figure, Box “A.” represents the column heading “____”.
a. Infrared c. 802.11n
b. 802.11h d. WiMAX

ANS: C PTS: 1 REF: WEB 364

25. In the accompanying figure, Box “B.” would correctly show a range of up to ____ feet.
a. 100 c. 300
b. 200 d. 900

26. In the accompanying figure, Box “C.” would correctly list ____ devices per access point.
a. 8 c. 128
b. 64 d. unlimited

ANS: B PTS: 1 REF: WEB 364

27. In the accompanying figure, Box “D.” would show a radio spectrum of ____ GHz.
a. 1.2 c. 9
b. 5 d. 2.4

ANS: D PTS: 1 REF: WEB 364

28. In the accompanying figure, Box “E.” should show a data transfer rate of up to ____ Mbps.
a. 1 c. 11
b. 3 d. 54

29. Many devices have been capable of making wireless Internet connections since ____.
a. 1991 c. 1999
b. 1995 d. 2003

30. Currently, WWANs provide wireless connections to the Internet using ____ networks created by cellular phone carriers.
a. 1G, 2G, and 3G
b. 3G only
c. 3G and 4G
d. none of the above; WWAN doesn’t work with cellular technology

ANS: C PTS: 1 REF: WEB 365

31. To access the Internet using a WWAN, you need a WWAN PC card and ____.
a. a MiFi device
b. an account with the appropriate cellular carrier
c. a credit card
d. access to a hotspot

32. The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.
a. always be greater than c. always be the same as
b. always be less than d. sometimes differ from

ANS: D PTS: 1 REF: WEB 366

33. WiMAX stands for ____.
a. Worldwide Internet Media Access
b. Worldwide Interoperability for Microwave Access
c. Wi-Fi to the Maximum
d. Web Interactivity for Maximum Access

34. WiMAX ____ Wi-Fi.
a. transmits at the same radio spectrum as c. uses infrared for communication, unlike
b. provides less range than d. none of the above

ANS: D PTS: 1 REF: WEB 367

35. WiMAX can transmit at speeds up to ____ Mbps.
a. 70 c. 120
b. 100 d. unlimited

ANS: A PTS: 1 REF: WEB 367

36. A WiMAX coverage area between the base station and devices varies based on the geography of the area, but most of these hotspots are approximately ____ square miles.
a. 5 c. 20
b. 10 d. 30

WiMAX network in a metropolitan area

37. In the accompanying figure, box “A.” is connected to the WiMAX tower through a cabled network connection from a(n) ____.
a. ASP c. PSI
b. ISP d. IEEE

ANS: B PTS: 1 REF: WEB 367

38. According to the text, ____ is a company that provides subscription-based Wi-Fi service for visitors at many U.S. airports.
a. Boingo c. Boink!
b. BoGo d. BuyandGo

ANS: A PTS: 1 REF: WEB 374

39. The following is an example of hacking: ____.
a. Unauthorized access to information being sent over a wireless network
b. Malware
c. Viruses
d. Spoofed apps

ANS: A PTS: 1 REF: WEB 377

40. By default, most wireless networks are ____.
a. secured by WEP c. unsecured
b. password-locked d. secured by WPA or WPA2

ANS: C PTS: 1 REF: WEB 378

41. A ____ is a user-entered key that encrypts data sent over a network.
a. codeword c. tumbler
b. padlock d. passphrase

42. Encryption keys are generally ____ or ____ bits long.
a. 16, 64 c. 128, 256
b. 64, 128 d. 64, 256

43. With WEP encryption, the key being used to encrypt the data is sent over the network ____ the actual data is encrypted.
a. before c. after
b. at the same time as d. any of the above are possible

ANS: A PTS: 1 REF: WEB 379

44. ____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.
a. WEPX c. WAP
b. WEP2 d. WPA

45. If you have both WPA and WEP available to you, your system will be most secure if you use ____.
a. WPA only c. both a and b
b. WEP only d. neither a nor b

46. Each manufacturer of network interface cards adds a(n) ____ to identify the device.
a. Media Access Control address c. wireless mesh
b. Ethernet port d. WiMAX account

ANS: A PTS: 1 REF: WEB 380

47. A MAC address contains ____.
a. only digits c. only symbols
b. only letters d. a combination of a. and b.

48. A wireless router broadcasts its SSID as a means of identifying the network’s ____.
a. signal strength c. level of activity
b. name d. security clearance

49. If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word “____” as an SSID.
a. default c. secured
b. home d. unsecured

50. An SSID may contain up to ____ alphanumeric characters.
a. 8 c. 32
b. 16 d. 64

51. Disabling the SSID broadcast of a network makes that network ____ to roaming devices.
a. not able to connect c. WPA-enabled
b. invisible d. attractive

52. ____ is the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks.
a. Wardriving c. Phishing
b. Hacking d. Snarfing

53. ____ is a term for finding and using somebody else’s wireless network, usually illicitly.
a. Wiresniffing c. Bandhopping
b. Sidesurfing d. Piggybacking

54. One of the most serious mistakes that home users make when installing a wireless network is ____.
a. failing to register the device with the manufacturer
b. failing to change the default login for the device
c. using both letters and numbers in their SSID name
d. sharing their SSID name with friends and family

55. The following is NOT on the security checklist for installing a wireless router: ____.
a. If you must use WEP, change the passphrase occasionally
b. Enable MAC address filtering on the wireless router or access point
c. When not using the wireless network for an extended period of time power it off
d. Because SSIDs are not case sensitive, change the SSID frequently

56. The safest wireless network is one that is ____.
a. installed by a licensed professional c. only meant to be used at home
b. encrypted with WPA using a 128-bit key d. turned off

57. Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
a. over-the-shoulder attack c. phishing expedition
b. wardrive d. Nigerian bank scam

58. Security experts warn against ____ in public places.
a. online banking c. online shopping
b. checking e-mail d. all of the above

59. A “cafe latte” attack is another name for a(n) ____ attack.
a. Bluejacking c. evil twin
b. phishing d. denial-of-service

60. In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.
a. evil twin c. over-the-shoulder
b. denial-of-service d. Bluebugging

61. The Bluetooth security concern posing the lowest threat is that of ____.
a. over-the-shoulder attacks c. bluebugging
b. bluejacking d. cafe-latte attacks

62. A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.
a. football-interception c. man-in-the-middle
b. gotcha d. man-on-the-moon

63. Hackers use ____ programs to monitor activity on a wireless network in order to obtain personal information that unsuspecting users might transmit.
a. bloodhound c. Web bug
b. sniffer d. pharming

64. One reason many people enjoy having a smartphone is that it has an operating system that can run programs, also called ____.
a. applications c. either a. or b.
b. apps d. neither a. nor b.

ANS: C PTS: 1 REF: WEB 386

65. A security problem associated with Bluetooth devices is ____.
a. bluejacking c. bluebugging
b. bluesnarfing d. all of the above

ANS: D PTS: 1 REF: WEB 385-WEB 386

66. Bluetooth devices can be made invisible to other people, a feature called ____ mode.
a. undiscoverable c. Safe-Roam
b. Enhanced Security d. silent

67. The predominant operating systems for smartphones are Apple iOS, Windows Mobile, BlackBerry OS, and ____ Android.
a. Yahoo! c. Microsoft
b. Google d. Motorola

68. A ____ attack involves a hacker gaining access to a Bluetooth user’s data, but not their device’s functions. It ranks second of the three major Bluetooth security problems listed in the book.
a. bluesnarfing c. bluedogging
b. bluebugging d. bluejacking

69. The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and its functions without the owner’s consent.
a. bluesnarfing c. bluebugging
b. bluejacking d. none of the above

70. A smartphone app is installed as a program ____ that when activated might display current weather conditions, open a contacts list, or start a calculator.
a. avatar c. icon
b. badge d. symbol

Case-Based Critical Thinking Questions

Case 7-1
Like most people of her generation, Martha has used cell phones for years. But she never gave much thought to the details of the technology. Now that she has graduated from college and is about to join the workforce, she’s trying to determine what kind of cellular technology will be most useful to her.

71. Martha discovers that when mobile devices combine the functionality of a cell phone with an operating system that performs these and other functions, they are usually called ____.
a. pocketphones c. Wi-Fi phones
b. smartphones d. hotphones

72. Martha is a big fan of text-messaging. While usually she’s used it for personal messages, she can see many advantages for text messaging in the workplace. She learns that it became available when SMS was introduced in ____ wireless networks.
a. 1G c. 2.5G
b. 2G d. 3G

73. Martha has seen the advantages of 3G technology, with its increased speed and Internet support. She is curious about the cost of building such a network, and discovers that the estimated cost of building a 3G network in Europe was ____. She can only imagine the cost in the United States!
a. $95 billion c. $95 million
b. $125 million d. $125 billion

ANS: D PTS: 1 REF: WEB 355 TOP: Critical Thinking

74. Martha has begun learning about “mobile broadband,” and likes the data transfer speed it offers. Her hope is to work with an organization that has ties to Asia, so she can travel frequently there. If she buys a cell phone with mobile broadband technology, she will be able to use its features in ____.
a. Hong Kong c. South Korea
b. Singapore d. all of the above

75. Martha is about to buy her cell phone, and plans to use as many of its features as possible. She discovers that 4G wireless networks can process many tasks at the same time, a feature sometimes called ____ support.
a. broadband c. simultaneous
b. harmonious d. synchronized

ANS: C PTS: 1 REF: WEB 355 TOP: Critical Thinking

Case-Based Critical Thinking Questions

Case 7-2
Pavel is trying to understand the differences between the major Wi-Fi standards. He asks you to quiz him.

76. You ask Pavel what standard is usually referred to by the term “Wi-Fi.” Pavel tells you that it’s the ____ standard.
a. 802.11b c. 802.11n
b. 802.11a d. 802.16

ANS: A PTS: 1 REF: WEB 357 TOP: Critical Thinking

77. You tell Pavel that he needs to set up a Wi-Fi network whose range will need to be about 350 feet. Pavel tells you that you need to use ____ devices.
a. 802.11g or 802.11n
b. 802.11n only
c. 802.11b
d. none of the above; no Wi-Fi standard will reach 350 feet

ANS: B PTS: 1 REF: WEB 364 TOP: Critical Thinking

78. You ask Pavel which Wi-Fi standard would be typically found in a home setting. Pavel tells you the answer is ____.
a. 802.11g c. 802.11n
b. 802.11b d. any of the above

79. You ask Pavel to name one benefit of an 802.11b system over an 802.11n system. Pavel replies that 802.11b ____.
a. has a longer range c. can support more connections
b. has a faster data transfer rate d. none of the above

ANS: D PTS: 1 REF: WEB 364 TOP: Critical Thinking

80. You tell Pavel that the location where he wants to install a wireless system has a lot of noise on the 2.4 GHz radio spectrum. You ask which wireless standard would avoid the noise. He tells you he could use ____.
a. 802.11a c. either 802.11a or 802.11n
b. 802.11n d. neither 802.11a nor 802.11n

COMPLETION

1. A personal ____________________ assistant is a handheld computer that can send and receive wireless telephone and fax calls, act as a personal organizer, perform calculations, and store notes.

ANS: digital

PTS: 1 REF: WEB 354

2. The wireless network that followed 3G wireless, which is called a 3.5G wireless network or mobile ____________________, provides very fast network connections.

3. Because the 2.4 Ghz radio spectrum is ____________________, it is free.

4. A(n) ____________________ is a hardware device with one or more antennae that permit communication between wired and wireless networks so wireless clients can send and receive data.

ANS: access point

PTS: 1 REF: WEB 357

5. In most cases, WLAN network connections are possible within 200 to ____________________ feet of the access point, depending on any obstacles to radio waves.

6. The hotspot created by MiFi can be used to connect up to ____________________ Wi-Fi devices at once.

7. A wireless ____________________ network is commonly used to extend the reach of Wi-Fi hotspots to an enterprise.

8. Infrared technology uses ____________________ to carry data.

9. WiMAX transmitters, which can be located up to 10 to ____________________ miles from the towers, send the signal to homes, businesses, and mobile devices that have WiMAX receivers.

WiMAX network in a metropolitan area

10. In the accompanying figure, “A.” represents a(n) ____________________.

11. In the accompanying figure, “B.” represents a WiMAX ____________________.

12. In the accompanying figure, “C.” represents WiMAX ____________________.

13. When WEP is enabled, it ____________________ the data sent over the network.

14. A 128-bit key contains ____________________ hexadecimal characters.

15. WPA uses a(n) ____________________ key to encrypt data so that your key isn’t broadcast before your data is encrypted.

16. The “MAC” in the term “MAC address” is short for “Media ____________________”

17. To protect a Bluetooth device from “bluejacking,” you can set it to ____________________ mode.

18. Some people unlock the operating systems on their devices in order to disable the device so it can run apps from other providers. This practice is called ____________________ when done on an Apple device.

19. Some people unlock the operating systems on their devices in order to disable the device so it can run apps from other providers. This practice is called ____________________ when done on an Android device.

20. The action of issuing a command to delete everything stored on a wireless device is sometimes called a(n) ____________________ wipe.

MATCHING

a. piconet g. infrared
b. bluejacking h. WWAN
c. over-the-shoulder i. VoIP
d. PDA j. passphrase
e. hotspot k. WPA
f. MiFi l. MAC address

1. a handheld computer that can act as a personal organizer and store notes

2. a key typed in by a user to encrypt data

3. an area of Wi-Fi network coverage

4. a relatively harmless attack that merely sends an anonymous message

5. a standard developed by the Wi-Fi Alliance to address inherent weaknesses in WEP

6. converts audio signals to digital packets for making phone calls via the Internet

7. a collection of devices connected via Bluetooth technology

8. technology that can send data via light waves

9. a unique number that identifies a network interface card

10. a security attack using physical proximity to gain someone’s personal information

11. a small wireless device that provides a mobile hotspot

12. a wireless network that provides network coverage to a large geographical area

ESSAY

1. Name the four current Wi-Fi standards, the range of each, and the data transfer rate of each.

ANS:
802.11a, range 100 ft, data transfer up to 54 Mbps.
802.11b, range 200 ft, data transfer up to 11 Mbps.
802.11g, range 200 ft, data transfer up to 54 Mbps.
802.11n, range 900 ft, data transfer up to 200 Mbps.

PTS: 1 REF: WEB 364 TOP: Critical Thinking

2. Name at least 5 of the 8 things noted in the security checklist for installing a wireless router or access point.

ANS:
– Change the default login and password for the wireless router or access point.

– Change the default SSID. Be sure to type the name in the desired case, as the SSID is case sensitive.

– Obtain the MAC addresses of the wireless devices that will connect to the wireless network, and then enter their MAC addresses using the configuration for the wireless router or device.

– Enable MAC address filtering on the wireless router or access point.

– Enable the highest level of security that your wireless devices and wireless router or access point can manage. Be sure to use the most secure key the wireless router or access point offers. If you must use WEP, change the passphrase occasionally.

– Make sure that all of your wireless devices can connect to the wireless network with the settings you’ve implemented.

– Disable the SSID for your wireless router or access point.

– When not using the wireless network for an extended period of time, such as when leaving on vacation, power it off.

3. Name and briefly describe the three major kinds of security problems common to Bluetooth.

ANS:
Bluejacking: When a perpetrator sends an anonymous message to somebody’s Bluetooth device. Bluejacking is usually harmless because the victim’s device is not breached.

Bluesnarfing: When a hacker with special software is able to detect the signal from a Bluetooth device and gain access to its data without the owner’s knowledge.

Bluebugging: When a hacker gains access to a device and its functions without the owner’s consent. The hacker can then make phone calls, access data, and use the Internet.

PTS: 1 REF: WEB 385-WEB 386 TOP: Critical Thinking

About

Leave a reply

Captcha Click on image to update the captcha .

error: Content is protected !!