Preview

07 - Ethernet, WI-FI and FTP

 1. An …………………….is one of the most common forms of network cable used on wired networks. An ………………………….. connects devices within a LAN

  WI-FI cable

  Ethernet cable

  None of the above

  FTP cable

 2. thernet cables resembles a phone cable but is tiny (much much smaller) and features far fewer wires
ethernetcablevsphonecable.png

  TRUE

  FALSE

  

  

 3. Ethernet is a family of protocols responsible for sending and receiving data along a network cable

  FALSE

  TRUE

 4. The reason that it is a family of protocols as opposed to just one is because….

  None of the above

  Competing companies have created different protocols which are not compatible with each other

  IBM devised Ethernet and their philosophy is 'more is better'

  Ethernet works over a range of data speeds

 5. Ethernet is the most common protocol used for…

  putting together a local area network (LAN)

  setting up a SMTP server to send messages

  setting up a MODEM to connect to the internet

  creating cables that are primiarly made of stainless steel

 6. The Ethernet protocol is in several parts: Specifying HARDWARE, describing DATA FORMAT and …

  how to deal with waves of data that do not arrive at the correct IP

  how to deal with data collisions

  None of the above

  how to deal with sending email messages

 7. FTP is a 'file transfer protocol' used to upload and download files between a client and server on a network. An example of FTP software is:

  Gmail (Email messaging)

  Filezilla

  Microsoft Word

  Facebook Messenger

 8. FTP may run in active or passive mode. Passive mode is used …
Useful note
============
FTP login uses normal username and password scheme for granting access.
The username is sent to the server using the USER command, and the password 
is sent using the PASS command. This sequence is unencrypted "on the wire", 
so may be vulnerable to a network sniffing attack. If the information 
provided by the client is accepted by the server, the server will send a 
greeting to the client and the session will commence. If the server 
supports it, users may log in without providing
login credentials, but the same server may authorize only 
limited access for such sessions

  in situations where the client is behind a firewall and unable to accept incoming TCP connections

  in situations where the client is incredibly lazy

  in situations where the client machine is far too active and overheating

  in situations where the client is a security risk to the entire network and most likely a hacker

 9. Read the following excerpt on Wi-Fi and fill in the blanks.
Wireless Fidelity, more known by its short form Wi-Fi, is a digital communications protocol, 
through which gadgets can communicate with each other in a unicast or a 
broadcasting manner ......................................................

  while using only the slimmest of wires

  using only fibre optic cables that cannot be seen

  without using computers or any type of signal whatsoever

  without using wires

 10. Bluetooth and Wi-Fi both stand as wireless communication protocols but one difference is that Bluetooth has a greater operating range than Wi-Fi

  TRUE

  FALSE

 11. Fill in the blanks
Wi-Fi operational range depends on factors such as the ______________, radio 
power output, receiver sensitivity, antenna gain and antenna type as 
well as the modulation technique. In addition, propagation characteristics 
of the signals can have a big impact.

  frequency band

  None of the above

  ethernet cable colour

  cloud storage capacity

 12. Fill in the blanks for the three types of standard hardware devices necessary for Wi-Fi.
Since early 2000's manufacturers are building wireless network adapters into most laptops. 
The price of chipsets for Wi-Fi continues to drop, making it an economical networking option 
included in even more devices.

Standard Hardware devices (for Wi-fi)
=======================================
A 1...................... connects a group of wireless devices to 
an adjacent wired LAN. 
An access point resembles a network hub, relaying data between connected 
wireless devices in addition to a (usually) single connected wired device, 
most often an Ethernet hub or switch, allowing wireless devices to communicate 
with other wired devices.

2.......................... allow devices to connect to a wireless network. 
These adapters connect to devices using various external or internal 
interconnects such as PCI, miniPCI, USB, ExpressCard, Cardbus and PC Card. 
As of 2010, most newer laptop computers come equipped with built in internal adapters.

3........................ integrate a Wireless Access Point, Ethernet switch, and
 internal router firmware application that provides IP routing, NAT, and 
DNS forwarding through an integrated WAN-interface

  1. wireless hubs 2. wireless cables 3. wireless monitors

  1. wireless access point (WAP), 2. wireless adapaters 3. wireless routers

  1. wireless adapters 2. wireless access point 3. wireless routers

  1. wireless phones 2. wireless cords 3. wireless mounts

 13. Wireless network bridges connect a wired network to a wireless network

  TRUE

  FALSE

 14. Wireless range-extenders or wireless repeaters can extend the range of an existing wireless network

  TRUE

  FALSE

 15. Wi-Fi has not replaced wired networks because of certain limitations that include:

  All of the above

  They are only a limited amount of channels that can be used at one time within a Wi-fi network

  They are around only half the speed of a wired network (at best)

  They are not as fast

 16. Wi-Fi includes built in methods of making a network secure for example ….

  Using encryption methods that make it impossible for anyone to connect

  turning on WPA or WEP to allow only authorised users to connect

  None of the above

  Using hotspots that are available to all

 17. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)

  FALSE

  TRUE

 18. Wireless access technologies are commonly divided into categories, based on speed and distance

  FALSE

  TRUE

 19. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels

  bands

  protocols

  apples

  channels

 20. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………

  wireless phone attachment

  wireless hotspot PIN

  wireless PIN

  wireless network interface controller.