Module 8 Exam Back to Main Page 1. In wireless networks, CSMA/CD has been replaced by?Carrier Sense Wireless Access with Collision Avoidance (CSWA/CA).Carrier Sense Multiple Access with Collision Mitigation (CSMA/CM).Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)First In First Out (FIFO)Question 1 of 19 2. When considering the SSID concept, its infrastructure can be built in two modes over three different categories, based on who participates in the WLAN. The three different categories are:Wireless Service Set (WSS)Independent Basic Service Set (IBSS)Basic Service Set (BSS)Extended Service Set (ESS)Question 2 of 19 3. Before they join the network, devices go through a wireless negotiation process with an AP called ____.authenticationassociationjoiningagreementQuestion 3 of 19 4. Put the steps for an AP joining a network in order. Probe request Association accept/response Association Probe response Question 4 of 19 5. Access points can function as repeaters, accepting a weak RF signal, strengthening (amplifying) it, and resending it.TrueFalseQuestion 5 of 19 6. _____ is the most fault-tolerant wireless design, as it allows for load distribution and transparent roaming.Partial-meshHub-and-spokeMeshHybridQuestion 6 of 19 7. Wireless LAN Controllers consist of the following:Wireless LANInterfacesAntennasDistribution PortQuestion 7 of 19 8. A very important advantage of layer 3 inter-controller roaming is that users can maintain their original IP address.TrueFalseQuestion 8 of 19 9. Layer 3 LWAPP tunnels are used between access points and wireless LAN controllers to transmit control messages. It uses UDP port ______ for control and UDP port _____ for data messages.12222/1222312223/12222122/123123/122Question 9 of 19 10. A wireless _______ combines a number of distribution ports together to make a single high-bandwidth data path.AP interface group (AIG)wireless interface group (WIG)link aggregation group (LAG)interface aggregation group (IAG)Question 10 of 19 11. Wireless LAN Controllers have three major components:Wireless LANsInterfacesPortsMesh Access PointsQuestion 11 of 19 12. Wireless Virtual interfaces are used for Layer 2 security authentication, DHCP relay support, and management of mobility features.TrueFalseQuestion 12 of 19 13. The recommendation is to overlap the signal from the access points by a ratio of _____ so the users can move from one access point to another.10 to 15%20 to 25%5 to 15%40 to 50%Question 13 of 19 14. WPA uses dynamic key management, adds a stronger encryption cipher, and is built on the EAP/802.1X mechanism. It uses the ______.Wireless Security Protocol (WSP)Temporal Key Integrity Protocol (TKIP)Time Sensitive Integrity Protocol (TSIP)Round Robin Security Protocol (RRSP)Question 14 of 19 15. Some of the key differences between WPA and WPA2 include the following:Partial mesh is replaced by full meshTKIP is replaced by CCMPRC4 encryption is replaced by AES28 APs can connect instead of just 4Question 15 of 19 16. Which protocols support 802.1x or enterprise authentication?WEPWPAWPA2WPA3Question 16 of 19 17. Which protocol uses Elliptical Curve Cryptography (ECC) with 192-bit security suite.WPA3WPAWPA2WEPQuestion 17 of 19 18. Match the wireless QoS level with the correct name.Platinum best effortUnselectbackgroundUnselectvideoUnselectvoice UnselectGold best effortUnselectbackgroundUnselectvideoUnselectvoice UnselectSilver best effortUnselectbackgroundUnselectvideoUnselectvoice UnselectBronze best effortUnselectbackgroundUnselectvideoUnselectvoice UnselectQuestion 18 of 19 19. You are setting up a WLC for the first time using a web browser. How do you connect?httphttpsftpsshQuestion 19 of 19 Loading...