Home
6.
Which sublayer of the OSI model ’ s Data - Link layer is used for communication between 802.11 radios?
  • A.
    LLC
  • B.
    WPA
  • C.
    MAC
  • D.
    FSK
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The IEEE 802.11-2012 standard defines communication mechanisms at only the Physical layer and MAC sublayer of the Data-Link layer of the OSI model. The Logical Link Control (LLC) sublayer of the Data-Link layer is not defined by the 802.11-2012 standard. WPA is a security certification. FSK is a modulation method.
Report
Name Email  
7.
What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)
  • A.
    3DES
  • B.
    WPA-2
  • C.
    SSL
  • D.
    TKIP
  • E.
    CCMP
  • F.
    WEP
  • Answer & Explanation
  • Report
Answer : [D, E, F]
Explanation :
WPA-2 is a Wi-Fi Alliance certification and not an encryption method. The WPA-2 certification does mandate the use of CCMP encryption and TKIP is optional. The IEEE 802.11-2012 standard defines the use of both CCMP and TKIP dynamic encryption methods. Also defined by the IEEE is the use of static WEP encryption.
Report
Name Email  
8.
Which organization is responsible for the creation of documents known as Requests for Comments?
  • A.
    IEEE
  • B.
    ISO
  • C.
    IETF
  • D.
    Wi-Fi Alliance
  • E.
    RFC Consortium
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Requests for Comments are known as RFCs and are created by the Internet Engineering Task Force (IETF), which is guided and directed by the Internet Engineering Steering Group (IESG).
Report
Name Email  
9.
Which of the following is not a standard or amendment created by the IEEE? (Choose all that apply.)
  • A.
    802.11X
  • B.
    802.1x
  • C.
    802.3af
  • D.
    802.11N
  • E.
    802.11g
  • Answer & Explanation
  • Report
Answer : [A, B, D]
Explanation :
There is no 802.11X amendment. The x in 802.1x should be capitalized (802.1X), and the N in 802.11N should not be capitalized (802.11n). These are not trivial errors. Standards and amendments should be written and used with the proper capitalization.
Report
Name Email  
10.
TKIP can be used with which of the following? (Choose all that apply.)
  • A.
    WEP
  • B.
    WPA-Personal
  • C.
    WPA-Enterprise
  • D.
    WPA-2 Personal
  • E.
    WPA-2 Enterprise
  • F.
    802.11-2012 (RSN)
  • Answer & Explanation
  • Report
Answer : [B,C,D,E,F]
Explanation :
By default, WPA-Personal and WPA-Enterprise use TKIP for encryption. WPA-2 Personal, WPA-2 Enterprise, and 802.11-2012 (RSN) mandate the use of CCMP, but TKIP is optional. TKIP is essentially being phased out because the IEEE and Wi-Fi Alliance mandate the use of only CCMP encryption for 802.11n and 802.11ac data rates.
Report
Name Email