Which security standard is considered the best form of security because it is the most secure and does not limit network data rates?

Notes
Single input, single output (SISO) - Most systems have one radio and one antenna, and some systems have one radio and two antennas.
Multiple input, multiple output (MIMO) - These systems use multiple radio chains in a single wireless chipset.
Multi-user MIMO (MU-MIMO) - These systems use each radio chain on an access point to transmit to a unique client.Correct answer:
Wired Equivalent Protection (WEP) - This type of security setup should never be used for a wireless network as it can be quickly be broken.
WPA/WPa2 -Personal - This type of security uses an 8-63 character passphrase that all network users share.
WPA/WPA2-Enterprise - In this type of security setup, everyone has a unique username and password, which allows IT departments to track individual users and reset unique user passwords without having to change the passphrase for the entire network.
Wi-Fi Protected Setup (WPS) - This type of security setup allows new devices to be added to a network with a button press or an 8-digit PIN number.

test one
Question #1: Multiple Choice - choose 1 answer
Which modulation scheme works by varying the height, or loudness, of a wave to convey information?

B) Amplitude modulation (AM).

Question #2: Multiple Choice - choose 1 answer
Which modulation scheme works by adjusting the length of a wave to convey information?

B) Frequency modulation (FM).

Question #3: Multiple Choice - choose 1 answer
Which IEEE standard specifies media access and Physical Layer specifications for wireless connectivity between fixed, portable, and moving stations within a local area?

C) 802.11.

Question #4: Multiple Choice - choose 1 answer
Which IEEE 802.11 amendment is a 5 GHz-only standard that can theoretically reach 7 Gbps?
A) 802.11ac.

Question #5: Multiple Choice - choose 1 answer
Which of the following is an example of a wide area network (WAN)?

B) The Internet.

Question #6: Multiple Choice - choose 1 answer
Which of the following handles the long distance wide area network (WAN) communication link with the Internet service provider or managed services operator?

C) Modem.

Question #7: Multiple Choice - choose 1 answer
What connects wireless client devices, such as laptops, phones, tablets, and media players to the wired network?

C) Access point.

Question #8: Multiple Choice - choose 1 answer
Which type of directional antenna is usually called a "high-density" directional antenna?

B) Semi-directional antenna.

Question #9: Multiple Choice - choose 1 answer
What type of system uses one radio chain to transmit and receive data?
A) Single input, single output (SISO).

Question #10: Multiple Choice - choose 1 answer
Which security setup allows new devices to be added to a network with a button press or an 8-digit PIN?

D) Wi-Fi Protected Setup (WPS).

9-15-1 Understanding Wi-Fi
Question #1: Multiple Choice - choose 1 answer
Which security standard is considered the best form of security because it is the most secure and does not limit network data rates?

D) Wi-Fi Protected Access 2/Advanced Encryption Standard (WPA2/AES)

Question #2: Multiple Choice - choose 1 answer
How many channels are available in the 5 GHz band?
D) 25

Question #3: Multiple Choice - choose 1 answer
What is the maximum amount of characters allowed in a Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) passphrase?

D) 63

Question #4: Multiple Choice - choose 1 answer
Which three channels in the 2.4 GHz band do not overlap each other?

C) 1,6,11

Question #5: Multiple Choice - choose 1 answer
Which of the following happens when two networks are on channels that partially overlap?

B) Adjacent-channel interference

Question #6: Multiple Choice - choose 1 answer
Using the 3-decibel (dB) rule, what happens when our signal strength goes from -33 dBm to -36 dBm?

B) The signal is cut in half

Question #7: Multiple Choice - choose 1 answer
What is the minimum signal strength for reliable packet delivery?

D) -70 decibel-milliwatts (dBm)

Question #8: Multiple Choice - choose 1 answer
Which of the following hops from frequency to frequency in the 2.4 GHz band causing very little channel utilization interference?

C) Bluetooth

Question #9: Multiple Choice - choose 1 answer
What is the width of each of the 11 channels in the 2.4 GHz band?

C) 20 MHz

Question #10: Multiple Choice - choose 1 answer
How many channels is the 5 GHz band is comprised of?

D) 25
Question #1: Multiple Choice - choose 1 answer
Besides channel and channel width, what other important detail does a networks graph display?
A) Signal strength

Question #2: Multiple Choice - choose 1 answer
What is a group of access points that share the same service set identifier (SSID) called?

C) Extended service set identifier

Question #3: Multiple Choice - choose 1 answer
What is it called when multiple service set identifiers (SSID) share the same radio?

C) Virtual SSID

Question #4: Multiple Choice - choose 1 answer
Which spectrum analysis screen shows a readout of raw radio frequency (RF) activity in the spectrum?

D) Density view

Question #5: Multiple Choice - choose 1 answer
What does a tall signature in the spectrum analysis density view indicate?

C) A loud transmitter

Question #6: Multiple Choice - choose 1 answer
What is the percentage of utilization when a device displays a utilization color of yellow?

B) 30-50%

Question #7: Multiple Choice - choose 1 answer
Which spectrum analysis screen shows radio frequency (RF) activity over time?
A) Waterfall view

Question #8: Multiple Choice - choose 1 answer
Which non-Wi-Fi interference signature appears like a row of spikes?
A) Bluetooth

Question #9: Multiple Choice - choose 1 answer
Which of the following is created by importing a floor plan, usually in the form of an image (.jpg or .png file), and manually drawing in walls and adding access points?

D) Virtual network plan

Question #10: Multiple Choice - choose 1 answer
Which of the following is represented as a dotted line within the signal strength graph?

D) Signal strength threshold

Question #1: Multiple Choice - choose 1 answer
What is the minimum required signal strength to support the data rates needed for streaming video?
A) -67 dBm

Question #2: Multiple Choice - choose 1 answer
Which object can attenuate Wi-Fi signal strength by 12 dB?

C) Concrete wall

Question #3: Multiple Choice - choose 1 answer
Which object can attenuate Wi-Fi signal strength by 5 dB?

Cinderblock wall

Question #4: Multiple Choice - choose 1 answer
Which device hosts a simple, very small configuration webpage on a local network?
A) Router

Question #5: Multiple Choice - choose 1 answer
Which of the following generates non-Wi-Fi interference in the 5 GHz band?

D) Wireless subwoofers

Question #6: Multiple Choice - choose 1 answer
What type of interferer stays put on a specific channel, while continually transmitting on that frequency, potentially jamming any Wi-Fi device within its range?

C) Narrowband interferer

Question #7: Multiple Choice - choose 1 answer
What type of interference occurs when two Wi-Fi networks partially overlap?

B) Adjacent-channel interference

Question #8: Multiple Choice - choose 1 answer
What makes a good passphrase?

B) A good passphrase is long and memorable

Question #9: Multiple Choice - choose 1 answer
What advice should you give a customer for keeping their Wi-Fi-enabled devices up-to-date?
A) Always run security updates as often as they are released

Question #10: Multiple Choice - choose 1 answer
How should two routers be interconnected when using two wireless routers in a network?
A) Main router local area network (LAN) to secondary router LAN
Question #1: Multiple Choice - choose 1 answer
Why is it important that a channel plan ensures no two adjacent access points are on the same channel?
B) To avoid co-channel interference
Question #2: Multiple Choice - choose 1 answer
What special band, in the 5 GHz band, is located on Channel 165?
A) Industrial, Scientific, and Medical (ISM) band

Question #3: Multiple Choice - choose 1 answer
Which two bands, in the 5GHz band, are home to the dynamic frequency selection (DFS) channels?
B) Unlicensed National Information Infrastructure (UNII)-2 and UNII-2e bands
Question #4: Multiple Choice - choose 1 answer
Which Wi-Fi transmitting device has the highest likelihood to support dynamic frequency selection (DFS) channels?
D) Enterprise-grade access points (AP)
Question #5: Multiple Choice - choose 1 answer
How many non-overlapping, dynamic frequency selection (DFS) supporting, 20 MHz wide channels reside in the 5 GHz band?
B) 24

Question #6: Multiple Choice - choose 1 answer
What can be done when access points (AP) share the same channel and are contending for airtime, thus slowing down the network?
B) Enable more radios on the AP Wrong answer....**** it
Question #7: Multiple Choice - choose 1 answer
What consideration could one make if a deployed network has good 2.4 GHz coverage with lackluster 5 GHz coverage?
D) Reduce transmit power in 2.4 GHz
Question #8: Multiple Choice - choose 1 answer
What is a result of 5 GHz wavelengths being shorter than 2.4 GHz wavelengths?
C) 5 GHz waves have a lower indoor range then 2.4 GHz waves.
Question #9: Multiple Choice - choose 1 answer
What credential server do Wired Protected Access (WPA) or WPA2 encrypted access points (AP) use to compare credentials prior to allowing a user to authenticate to a network?
A) Remote Authentication Dial-In Service (RADIUS) server
Question #10: Multiple Choice - choose 1 answer
What is a good practice to use when installing an access point (AP) in a hospital room or dormitory where people sleep?
A) Disable the light-emitting diodes (LED) on the AP and only temporarily enable them when troubleshooting

Question #1: Multiple Choice - choose 1 answer
What should a technician do if Wi-Fi signal strength appears to be too low for what the customer is trying to use the network for?

D) Set expectations with the customer by explaining the signal strength issue

Question #2: Multiple Choice - choose 1 answer
What could be done if Co-channel interference is found to be the reason for slower data rate
D) Switch the network to another channel that is less congested

Question #3: Multiple Choice - choose 1 answer
Which of the following channels represents a well performing network?
A) A channel that is utilized less than 50% of the time

Question #4: Multiple Choice - choose 1 answer
What could you do if there are no good channel options in the 2.4 GHz band for your customer's 802.11n device?

B) If available, connect devices with Ethernet.

Question #5: Multiple Choice - choose 1 answer
Which 802.11 standard takes more time to send and receive data, thus causing congestion on the 2.4 GHz band?

B) 802.11b

Question #6: Multiple Choice - choose 1 answer
A narrow slice of spectrum appears on the 2.4 GHz band that may or may not cause congestion when this button is pressed on a 2.4 GHz cordless phone?

D) Talk

Question #7: Multiple Choice - choose 1 answer
What non-Wi-Fi device utilizes 20 MHz of spectrum, which is nearly the same as a Wi-Fi network and, due to its heavy utilization, can cause a Wi-Fi network to stop working entirely?

C) Analog wireless security camera

Question #8: Multiple Choice - choose 1 answer
What is the maximum signaling rate for a 3SS device (premium laptop)?

B) 195 megabits per second (Mbps)

Question #9: Multiple Choice - choose 1 answer
What other device factors determine what speeds a device will achieve over a Wi-Fi network?
A) Processor and storage read/write space

Question #10: Multiple Choice - choose 1 answer
What should you do if a client device keeps defaulting to the 2.4 GHz network over the 5 GHz network?
A) Use different service set identifiers (SSID) for each network

Is WPA2 the most secure?

WPA2 is the second generation of the Wi-Fi Protected Access security standard and so is more secure than its predecessor, WPA. Your Wi-Fi router likely includes both WPA and WPA2 security protocol options. When turning on Wi-Fi encryption on your router, choose WPA2 for the most secure Wi-Fi protection.

What is WEP vs WPA?

WEP stands for Wired Equivalent Privacy, and WPA stands for Wireless Protected Access. WPA2 is the second version of the WPA standard. Using some encryption is always better than using none, but WEP is the least secure of these standards, and you should not use it if you can avoid it.

Is WPA WPA2 secure?

WPA2 is more secure than its predecessor, WPA (Wi-Fi Protected Access), and should be used whenever possible. Wireless routers support multiple security protocols to secure wireless networks, including WEP, WPA and WPA2. Of the three, WPA2 is the most secure, as this comparison explains.

How does WPA and WPA2 work?

WPA improves on WEP in that it provides the TKIP encryption scheme to scramble the encryption key and verify that it hasn't been altered during the data transfer. The major difference between WPA2 and WPA is that WPA2 improves the security of a network because it requires using a stronger encryption method called AES.