Binary Modulation Question Answers
Essay Preview: Binary Modulation Question Answers
Report this essay
Chapter 6____________________  is the measure of the departure of a wave from its undisturbed state to its maximum height.Answer: AmplitudeWhich answer below is a binary modulation technique in which the carrier signals frequency is changed to represent a 1 or a 0 bit?Amplitude shift keyingPhase shift keyingFrequency shift keyingFrequency division multiplexingAnswer: CWhich answer below is not true when comparing digital modulation signals to analog?More efficient use of bandwidthFewer interference issuesError correction is more compatible with digital systemsMore power is required to transmitAnswer: DThe ____________________ TCP flag is used to signal that a transmission should stop and restart again. Some devices use this flag to immediately respond to requests on a closed port.RSTACKPSHURGAnswer: AWhich of the following is true when viewing an FTP session in a packet sniffer?The transmission will be encryptedAll transmissions will begin with a TCP PSH flag setThe login and password will be visible in cleartextThe final packet of the session will be the client’s TCP ACK of the server’s TCP FIN Answer: CA __________ transmission uses a single frequency or a very small range of frequencies for transmission of data, and is vulnerable to interference.Answer: NarrowbandWhich WLAN configuration consists of multiple access points that provide connections to a single network?Extended Service Set (ESS)Basic Service Set (BSS)Expanded Service Set (ESS)Independent Basic Service Set (IBSS)Answer: AWhich answer below is a series of ellipsoidal shapes calculated to determine signal strength can also be used to determine potential obstacles in a signal’s path?Wave propagationPolarizationFree space path lossFresnel zoneAnswer: DChapter 7A wireless device in ____________________  is able to passively scan for wireless networks, and functions somewhat like promiscuous mode for a wired NIC.Answer: Radio Frequency (RF) monitor mode or monitor modeTrue or False: Control frames are used to help direct the flow of traffic on a wireless network.Answer: TrueSelect the answer below that explains why WEP is vulnerable to attacks:128 bit key lengthUse of the Rivest Cipher v4 (RC4)Initialization vectors sent in cleartextUnencrypted management framesAnswer: CStandard WEP key management uses how many default keys for encryption?1234Answer: AWhich of the following is not a valid way to secure an access point?Change default SSIDSet up open system authenticationConfigure MAC ACLsChange default admin passwordAnswer: BWPA utilizes the ____________________ , which performs a function similar to a Cyclic Redundancy Check, in that it helps to identify data integrity.Answer: Message Integrity Check (MIC)True or False: A Wi-Fi Protected Setup (WPS) PIN is extremely vulnerable to brute force attacks, and is therefore insecure.Answer: TrueWhen auditing a network, an auditor may do __________ , which involves the use of the same utilities that attackers might use, in order to test network security.Answer: Penetration testingWhat encryption is used with a standard WPA2 setup?TKIPRC4AESMD5Answer: C

Get Your Essay

Cite this page

Carrier Signals Frequency And Single Network. (July 3, 2021). Retrieved from https://www.freeessays.education/carrier-signals-frequency-and-single-network-essay/