Which of the following is NOT listed as a limitation of wireless networks?
A) Susceptibility to interference from common devices
B) Limited coverage area due to building materials
C) Higher cost than fiber-optic cabling
D) Being a shared medium where many users reduce bandwidth for each other
Answer
C) Higher cost than fiber-optic cabling
What is a primary advantage of wireless media mentioned in the text?
A) Highest level of security
B) The greatest mobility options
C) Immunity to all forms of interference
D) Unlimited coverage area
B) The greatest mobility options
What type of signals do wireless media use to carry data communications?
A) Electrical pulses over copper wire
B) Pulses of light over glass fibers
C) Electromagnetic signals using radio or microwave frequencies
D) Sound waves over air
C) Electromagnetic signals using radio or microwave frequencies
What is a single unit of data in the binary numbering system called?
A) A byte
B) A nibble
C) A bit
D) A decimal
C) A bit
What are the only two values used to represent data in binary?
A) 1 and 2
B) 0 and 1
C) A and B
D) On and Off
B) 0 and 1
How many bits are in a single byte?
A) 4
B) 8
C) 16
D) 10
B) 8
In networking, what is the primary purpose of the binary system?
A) To make addresses easier for humans to remember
B) To represent IP addresses and subnet masks in a way computers can process
C) To encrypt data for secure transmission
D) To increase the speed of data transfer
B) To represent IP addresses and subnet masks in a way computers can process
What is the decimal value of the binary number 1100?
A) 10
B) 12
C) 14
D) 16
B) 12
What is the fundamental physical component that enables a tablet or smartphone to connect to a network’s physical layer?
A) Copper Cabling
B) Fiber-Optic Cabling
C) Wireless Media
D) Network Interface Card
C) Wireless Media
Explanation: The text explicitly states that connecting devices like tablets and smartphones is “only possible due to wireless media,” which it defines as the third way to connect to the physical layer.
Which of the following best describes how data is transmitted over wireless media?
A) As electrical pulses over a copper wire.
B) As pulses of light through a glass fiber.
C) As electromagnetic signals using radio frequencies.
D) As electrical signals modulated by a baseband processor.
C) As electromagnetic signals using radio frequencies.
Explanation: The text specifies that “wireless media carry electromagnetic signals that represent the binary digits… using radio or microwave frequencies.”
What is the primary advantage of wireless media mentioned in the text?
A) It offers the highest level of inherent security.
B) It is immune to environmental interference.
C) It provides the greatest mobility options.
D) It delivers the fastest possible data speeds.
C) It provides the greatest mobility options.
Explanation: The text lists “the greatest mobility options of all media” as a key benefit, which is why it has become the primary connection method for home and enterprise networks.
A network administrator notices that the Wi-Fi signal in a conference room is very weak. According to the text, what is a likely cause?
A) The access point is operating in full-duplex mode.
B) The construction materials of the building are limiting coverage.
C) There are too many authorized users connected at once.
D) The data is being transmitted in plaintext.
B) The construction materials of the building are limiting coverage.
Explanation: Under “Coverage area,” the text states that “certain construction materials used in buildings and structures… will limit the effective coverage,” making this a direct cause of a weak signal.
Why is a wireless network considered a “shared medium,” and what is a direct consequence of this?
A) It uses encryption; consequence is slower processing speeds.
B) It is susceptible to interference; consequence is complete signal loss.
C) It operates in half-duplex; consequence is reduced bandwidth per user with many connected devices.
D) It has a limited coverage area; consequence is the need for more access points.
C) It operates in half-duplex; consequence is reduced bandwidth per user with many connected devices.
Explanation: The text explains that WLANs are a “shared medium” that “operate in half-duplex,” meaning only one device can communicate at a time. Therefore, “many users accessing the WLAN simultaneously results in reduced bandwidth for each user.”
Which limitation of wireless networks explains why a nearby microwave oven can disrupt a Wi-Fi signal?
A) Coverage Area
B) Interference
C) Security
D) Shared Medium
B) Interference
Explanation: The “Interference” section explicitly names “microwave ovens” as a common device that can disrupt wireless communications.
From a security perspective, what fundamental property of wireless transmissions makes them more vulnerable than wired networks?
A) They use weaker encryption algorithms by default.
B) They require no physical access to the medium to connect.
C) They broadcast the network’s IP addressing scheme.
D) They have a slower data transfer rate, making them easier to attack.
B) They require no physical access to the medium to connect.
Explanation: The “Security” limitation states that wireless “requires no access to a physical strand of media,” which allows unauthorized users to potentially gain access to the transmission without needing to plug in a cable
Which limitation of wireless networks explains why a nearby microwave oven can disrupt a Wi-Fi signal?
A) Coverage Area
B) Interference
C) Security
D) Shared Medium
B) Interference
Explanation: The “Interference” section explicitly names “microwave ovens” as a common device that can disrupt wireless communications.
What is the primary function of a Wireless Access Point (AP) in a LAN?
A) To provide wireless communication capability to individual hosts.
B) To route traffic between different IP subnets.
C) To concentrate wireless signals from users and connect them to a wired network.
D) To protect the network from all unauthorized access.
C) To concentrate wireless signals from users and connect them to a wired network.
Explanation: The text states that APs “concentrate the wireless signals from users and connect to the existing copper-based network infrastructure, such as Ethernet.” While a wireless router integrates more functions, the core role of an AP is to bridge wireless and wired networks.
What device must a network host have to connect to a wireless LAN?
A) A Wireless Access Point
B) A Wireless NIC adapter
C) An Ethernet switch
D) A broadband modem
B) A Wireless NIC adapter
Explanation: The text explicitly lists “Wireless NIC adapters” as the components that “provide wireless communication capability to network hosts.” This is the client-side hardware required for wireless connectivity.
What is integrated into a typical home or small business wireless router?
A) The functions of a router, switch, and access point.
B) The functions of a server, a hub, and a modem.
C) The functions of a bridge, a repeater, and a NIC.
D) The functions of a switch, a server, and a load balancer.
A) The functions of a router, switch, and access point.
Explanation: The text clearly states that these all-in-one devices “integrate the functions of a router, switch, and access point into one device.”
What is one of the key benefits of wireless data communications mentioned in the text?
A) It is inherently more secure than wired networks.
B) It provides higher performance than all wired standards.
C) It offers the convenience of host mobility.
D) It eliminates the need for any network security policies.
C) It offers the convenience of host mobility.
Explanation: The text lists “the convenience of host mobility” as a key benefit, along with savings on premises wiring. It does not claim it is more secure or higher performing; in fact, it stresses the need for stringent security policies.
According to the text, what must network administrators do to protect WLANs?
A) Ensure all devices use the same brand for compatibility.
B) Rely on the integrated security of home wireless routers.
C) Develop and apply stringent security policies and processes.
D) Use only copper-based network infrastructure.
C) Develop and apply stringent security policies and processes.
Explanation: The text ends with a critical security warning: “Network administrators must develop and apply stringent security policies and processes to protect WLANs from unauthorized access and damage.” This highlights that security is not automatic and requires proactive management.
What should you ensure when purchasing wireless devices?
A) They are the most expensive option available.
B) They have the highest number of external antennas.
C) Their compatibility and interoperability.
D) They are manufactured by the same company as your router.
C) Their compatibility and interoperability.
Explanation: The text advises that because many WLAN standards have emerged, you must “ensure compatibility and interoperability” when making purchases to guarantee the devices can work together.