Binary Modulation Question Answers
Essay by NiloOfar Gh • February 22, 2018 • Essay • 628 Words (3 Pages) • 1,384 Views
Page 1 of 3
Chapter 6
- ____________________ is the measure of the departure of a wave from its undisturbed state to its maximum height.
Answer: Amplitude
- Which answer below is a binary modulation technique in which the carrier signals frequency is changed to represent a 1 or a 0 bit?
- Amplitude shift keying
- Phase shift keying
- Frequency shift keying
- Frequency division multiplexing
Answer: C
- Which answer below is not true when comparing digital modulation signals to analog?
- More efficient use of bandwidth
- Fewer interference issues
- Error correction is more compatible with digital systems
- More power is required to transmit
Answer: D
- The ____________________ TCP flag is used to signal that a transmission should stop and restart again. Some devices use this flag to immediately respond to requests on a closed port.
- RST
- ACK
- PSH
- URG
Answer: A
- Which of the following is true when viewing an FTP session in a packet sniffer?
- The transmission will be encrypted
- All transmissions will begin with a TCP PSH flag set
- The login and password will be visible in cleartext
- The final packet of the session will be the client’s TCP ACK of the server’s TCP FIN
Answer: C
- A __________ transmission uses a single frequency or a very small range of frequencies for transmission of data, and is vulnerable to interference.
Answer: Narrowband
- Which WLAN configuration consists of multiple access points that provide connections to a single network?
- Extended Service Set (ESS)
- Basic Service Set (BSS)
- Expanded Service Set (ESS)
- Independent Basic Service Set (IBSS)
Answer: A
- Which answer below is a series of ellipsoidal shapes calculated to determine signal strength can also be used to determine potential obstacles in a signal’s path?
- Wave propagation
- Polarization
- Free space path loss
- Fresnel zone
Answer: D
Chapter 7
- A wireless device in ____________________ is able to passively scan for wireless networks, and functions somewhat like promiscuous mode for a wired NIC.
Answer: Radio Frequency (RF) monitor mode or monitor mode
- True or False: Control frames are used to help direct the flow of traffic on a wireless network.
Answer: True
- Select the answer below that explains why WEP is vulnerable to attacks:
- 128 bit key length
- Use of the Rivest Cipher v4 (RC4)
- Initialization vectors sent in cleartext
- Unencrypted management frames
Answer: C
- Standard WEP key management uses how many default keys for encryption?
- 1
- 2
- 3
- 4
Answer: A
- Which of the following is not a valid way to secure an access point?
- Change default SSID
- Set up open system authentication
- Configure MAC ACLs
- Change default admin password
Answer: B
- WPA utilizes the ____________________ , which performs a function similar to a Cyclic Redundancy Check, in that it helps to identify data integrity.
Answer: Message Integrity Check (MIC)
- True or False: A Wi-Fi Protected Setup (WPS) PIN is extremely vulnerable to brute force attacks, and is therefore insecure.
Answer: True
- When auditing a network, an auditor may do __________ , which involves the use of the same utilities that attackers might use, in order to test network security.
Answer: Penetration testing
- What encryption is used with a standard WPA2 setup?
- TKIP
- RC4
- AES
- MD5
Answer: C
...
...
Only available on Essays24.com