Essays24.com - Term Papers and Free Essays
Search

Binary Modulation Question Answers

Essay by   •  February 22, 2018  •  Essay  •  628 Words (3 Pages)  •  1,282 Views

Essay Preview: Binary Modulation Question Answers

Report this essay
Page 1 of 3

Chapter 6

  1. ____________________  is the measure of the departure of a wave from its undisturbed state to its maximum height.

Answer: Amplitude

  1. Which answer below is a binary modulation technique in which the carrier signals frequency is changed to represent a 1 or a 0 bit?
  1. Amplitude shift keying
  2. Phase shift keying
  3. Frequency shift keying
  4. Frequency division multiplexing

Answer: C

  1. Which answer below is not true when comparing digital modulation signals to analog?
  1. More efficient use of bandwidth
  2. Fewer interference issues
  3. Error correction is more compatible with digital systems
  4. More power is required to transmit

Answer: D

  1. The ____________________ TCP flag is used to signal that a transmission should stop and restart again. Some devices use this flag to immediately respond to requests on a closed port.
  1. RST
  2. ACK
  3. PSH
  4. URG

Answer: A

  1. Which of the following is true when viewing an FTP session in a packet sniffer?
  1. The transmission will be encrypted
  2. All transmissions will begin with a TCP PSH flag set
  3. The login and password will be visible in cleartext
  4. The final packet of the session will be the client’s TCP ACK of the server’s TCP FIN

Answer: C

  1. A __________ transmission uses a single frequency or a very small range of frequencies for transmission of data, and is vulnerable to interference.

Answer: Narrowband

  1. Which WLAN configuration consists of multiple access points that provide connections to a single network?
  1. Extended Service Set (ESS)
  2. Basic Service Set (BSS)
  3. Expanded Service Set (ESS)
  4. Independent Basic Service Set (IBSS)

Answer: A

  1. Which answer below is a series of ellipsoidal shapes calculated to determine signal strength can also be used to determine potential obstacles in a signal’s path?
  1. Wave propagation
  2. Polarization
  3. Free space path loss
  4. Fresnel zone

Answer: D

Chapter 7

  1. A wireless device in ____________________  is able to passively scan for wireless networks, and functions somewhat like promiscuous mode for a wired NIC.

Answer: Radio Frequency (RF) monitor mode or monitor mode

  1. True or False: Control frames are used to help direct the flow of traffic on a wireless network.

Answer: True

  1. Select the answer below that explains why WEP is vulnerable to attacks:
  1. 128 bit key length
  2. Use of the Rivest Cipher v4 (RC4)
  3. Initialization vectors sent in cleartext
  4. Unencrypted management frames

Answer: C

  1. Standard WEP key management uses how many default keys for encryption?
  1. 1
  2. 2
  3. 3
  4. 4

Answer: A

  1. Which of the following is not a valid way to secure an access point?
  1. Change default SSID
  2. Set up open system authentication
  3. Configure MAC ACLs
  4. Change default admin password

Answer: B

  1. WPA utilizes the ____________________ , which performs a function similar to a Cyclic Redundancy Check, in that it helps to identify data integrity.

Answer: Message Integrity Check (MIC)

  1. True or False: A Wi-Fi Protected Setup (WPS) PIN is extremely vulnerable to brute force attacks, and is therefore insecure.

Answer: True

  1. When auditing a network, an auditor may do __________ , which involves the use of the same utilities that attackers might use, in order to test network security.

Answer: Penetration testing

  1. What encryption is used with a standard WPA2 setup?
  1. TKIP
  2. RC4
  3. AES
  4. MD5

Answer: C

...

...

Download as:   txt (3.6 Kb)   pdf (75.9 Kb)   docx (13.7 Kb)  
Continue for 2 more pages »
Only available on Essays24.com