Module 13 – Build a Home Network Quiz Answers

1. Which two statements characterize wireless network security? (Choose two.)

  • Wireless networks offer the same security features as wired networks offer.
  • With SSID broadcast disabled, an attacker must know the SSID to connect.
  • Using the default IP address on an access point makes hacking easier.
  • Wireless guest mode provides open access to a protected LAN.
  • An attacker needs physical access to at least one network device to launch an attack.

Explanation: The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network.

2. What happens when a device sends an acknowledgment message to a wireless AP?

  • The AP will respond with a Clear to Send message.
  • The AP creates a reservation on the channel for use by a specific conversation with the device.
  • The AP releases the channel.
  • The AP will respond with a Request to Send message.

Explanation: When a wireless device no longer needs access to the wireless channel, the device sends a message known as an Acknowledgment (ACK) to the AP. The ACK indicates to the AP that the channel can be released.

3. Which type of network technology is used for low-speed communication between peripheral devices?

  • Bluetooth
  • 802.11
  • channels
  • Ethernet

Explanation: Bluetooth is a wireless technology that uses the 2.4 GHz frequency to connect peripheral devices over a short-range, low-speed connection.

4. What two radio frequency bands are used in home wireless LANs? (Choose two.)

  • 5 MHz
  • 5 GHz
  • 900 GHz
  • 9 MHz
  • 2.4 GHz

Explanation: The wireless technologies most frequently used in home networks are in the unlicensed 2.4 GHz and 5 GHz frequency ranges.

5. A student is attempting to access an 802.11n wireless network. What method is used to manage contention-based access on this wireless network?

  • priority ordering
  • token passing

Explanation: Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless networking technology to mediate media contention. Carrier sense multiple access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control.

6. What type of device is commonly connected to the Ethernet ports on a home wireless router?

  • DSL modem
  • LAN device
  • cable modem
  • wireless antenna

Explanation: Local-area network (LAN) devices are commonly connected to the Ethernet ports of a wireless router in order to communicate on the same local wired network.

7. What purpose would a home user have for implementing Wi-Fi?​

  • to hear various radio stations
  • to connect a keyboard to a PC
  • to connect wireless headphones to a mobile device
  • to create a wireless network usable by other devices

Explanation: A Wi-FI network or wireless LAN is used to connect to a wireless router that, in turn, connects to the Internet. Wireless devices connect to the Wi-Fi network through the wireless router.

8. Which type of wireless communication is based on 802.11 standards?

  • Bluetooth
  • infrared
  • cellular WAN
  • Wi-Fi

Explanation: The IEEE 802.11 standards define Wi-Fi wireless LAN specifications.

9. During the reservation process, what does the client send to the AP to reserve a channel?

  • Request to Send
  • Clear to Send
  • Request to Connect
  • Acknowledgment

Explanation: When a device requires use of a channel in the wireless network, it sends a Request to Send (RTS) to the AP. If the channel is available, the wireless access point (AP) will respond to the device with a Clear to Send (CTS) message indicating that the device may transmit on the channel.

10. What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet?

  • guest SSID
  • encryption
  • authentication
  • MAC address filtering

Explanation: Many wireless routers support a special guest SSID that allows untrusted devices to be able to access the Internet but restricts them from accessing local network resources.

Notify of

Inline Feedbacks
View all comments