Deck 6: Wireless Networking

ملء الشاشة (f)
exit full mode
سؤال
 Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
 Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

A) management frames
B) control frames
C) data frames
D) extended frames
سؤال
 In Linux, what command can be used for viewing and setting wireless interface parameters?

A) ifconfig
B) iwconfig
C) wlanconf
D) wifid
سؤال
 What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

A) broadcast frame
B) beacon frame
C) announcement packet
D) alert message
سؤال
 Infrared technology utilizes an LED that emits light with shorter wavelengths than red light.
سؤال
 NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.
سؤال
 Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.
سؤال
 The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.
سؤال
 The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
سؤال
 At what layer of the OSI model do the 802.11 standards vary?

A) Physical layer
B) Network layer
C) Data link layer
D) Transport layer
سؤال
 The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

A) multiple input-multiple output (MIMO)
B) channel bonding
C) frame aggregation
D) spread spectrum frequency hopping
سؤال
 How does the 802.11 data frame indicate how a large packet should be fragmented?

A) It uses the preamble header to estimate the ideal packet size.
B) The frame check sequence dictates the calculated packet size.
C) The sequence control field indicates how packets will be subdivided.
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided.
سؤال
 How does refraction affect the propagation of a wireless transmission?

A) It distorts the signal as it travels into and through a different transmission medium.
B) It splits the signal into secondary waves that continue in the direction in which they split.
C) It causes the signal to be returned back towards the source of the origin.
D) It causes the signal to be absorbed by the refracting material.
سؤال
 All wireless signals are carried through the air by electromagnetic waves.
سؤال
 In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?

A) extended service set
B) basic service set
C) modified service set
D) generic service set
سؤال
 The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
سؤال
 The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
سؤال
 Diffraction has what affect on a wireless signal's propagation?

A) The signal is redirected into multiple directions.
B) The signal is split into secondary waves that continue in the direction in which they split.
C) The signal is returned back towards the source of the original signal.
D) The signal is completely absorbed by the diffracting material.
سؤال
 What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

A) management frames
B) control frames
C) data frames
D) extended frames
سؤال
 An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.
سؤال
 Which of the following statements regarding the 802.11ac standard is NOT accurate?

A) The standard was officially approved in early 2014.
B) 802.11ac access points function more like a hub than a switch.
C) 802.11ac access points can handle multiple transmissions at one time over the same frequency.
D) 802.11ac operates on the 5-GHz band.
سؤال
 A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?

A) beacon frame
B) association request
C) probe frame
D) ping frame
سؤال
 Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

A) Class 1
B) Class 2
C) Class A
D) Class X
سؤال
 You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?

A) The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.
B) The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g.
C) The client is using a network adapter with outdated firmware.
D) The client is only able to get line of sight with an omnidirectional antenna.
سؤال
 Healing messages are a feature of what smart home protocol?

A) ZigBee
B) Bluetooth
C) Z-Wave
D) ANT+
سؤال
 What optional protocol can be used in 802.11 to reserve the medium for one node's use?

A) RTS/CTS (Request to Send/Clear to Send)
B) RAR/CTU (Reserve Airtime Request/Clear to Use)
C) HA/RA (Hold Airtime/Reserved Airtime)
D) RT/FT (Request Time/Fair Time)
سؤال
 In an 802.11 data frame, what is the size of the frame check sequence field?

A) 2 bytes
B) 4 bytes
C) 6 bytes
D) 8 bytes
سؤال
 Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

A) guest network profile
B) captive portal
C) WPA2-Enterprise
D) browser hijacking
سؤال
 How many data streams are used in 802.11ac Wave 2 devices?

A) 2 data streams
B) 3 data streams
C) 4 data streams
D) 8 data streams
سؤال
 The wireless spectrum, as defined by the FCC, spans between which two frequencies?

A) 9 kHz and 300 GHz
B) 125 kHz and 150 GHz
C) 3 kHz and 500 GHz
D) 3 MHz and 300 GHz
سؤال
 In an 802.11 data frame, what is the maximum amount of data that can be sent?

A) 1500 bytes
B) 2312 bytes
C) 4582 bytes
D) 9000 bytes
سؤال
 If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

A) spectrum analyzer
B) protocol analyzer
C) Wi-Fi analyzer
D) air scanner
سؤال
 The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

A) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
B) Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
C) Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)
D) Carrier Sense Single Access with Collision Adaptation (CSSA/CA)
سؤال
 When troubleshooting wireless issues, what statement is accurate?

A) A WPA key can be used to associate with a WEP configured access point.
B) Access points that use overlapping channels can cause interference with each other if they are too close.
C) Simultaneous wired and wireless network connections do not affect the ability to communicate on the network.
D) Access point power levels should always be configured to output as much power as possible.
سؤال
 802.11ac Wave 2 devices can theoretically support how much maximum throughput?

A) 600 Mbps
B) 1.3 Gbps
C) 3.47 Gbps
D) 6.93 Gbps
سؤال
 What is the purpose of the Layer 2 LLC sublayer?

A) It is used to handle multiplexing, flow and error control, and reliability.
B) It is used to manage MAC addresses in message frames.
C) It performs management of the physical layer's modulation techniques.
D) It is used to manage low-level encryption on a network.
سؤال
 What type of device can be used to assess the quality of a wireless signal?

A) Wi-Fi analyzer
B) spectrum analyzer
C) channel scanner
D) frequency hopper
سؤال
 When using RFID, what is an ARPT (Active Reader Passive Tag)?

A) It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely.
B) It is a tag that requires an active reader, but still contains a battery in the tag.
C) It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
D) It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.
سؤال
 What scenario describes an evil twin attack?

A) A malicious access point is configured with the SSID of a non-malicious public access point.
B) An attacker is actively attempting to brute force the PIN of a WPS enabled access point.
C) A hacker is actively sending wireless probes to discover available wireless networks.
D) A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.
سؤال
 Near-field communication devices send data at what fixed frequency?

A) 8.65 MHz
B) 13.56 MHz
C) 21.39 MHz
D) 47.1 MHz
سؤال
 What are some of the different types of wireless topologies that can be created?
سؤال
 What is the difference between war driving and war chalking?
سؤال
 Why should the WPS PIN feature be avoided if possible?
سؤال
 Describe the 802.11a standard, and detail some of its history and advantages / disadvantages versus other 802.11 standards.
سؤال
 Most wireless devices use one of two technologies to avoid interference. What are these technologies?
سؤال
 When deciding antenna types, why might the use of an omnidirectional antenna be inadvisable?
سؤال
 Why should an access point not always utilize all the power it has for broadcasting wireless signals?
سؤال
 How does configuration of wireless clients for wireless access in an enterprise environment differ from normal setup?
سؤال
 Radiation patterns can be used to classify antennas into what two basic categories?
سؤال
 What is the hidden node problem, and how can it be mitigated?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Wireless Networking
1
 Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
False
2
 Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

A) management frames
B) control frames
C) data frames
D) extended frames
B
3
 In Linux, what command can be used for viewing and setting wireless interface parameters?

A) ifconfig
B) iwconfig
C) wlanconf
D) wifid
B
4
 What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

A) broadcast frame
B) beacon frame
C) announcement packet
D) alert message
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
 Infrared technology utilizes an LED that emits light with shorter wavelengths than red light.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
 NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
 Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
 The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
 The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
 At what layer of the OSI model do the 802.11 standards vary?

A) Physical layer
B) Network layer
C) Data link layer
D) Transport layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
 The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

A) multiple input-multiple output (MIMO)
B) channel bonding
C) frame aggregation
D) spread spectrum frequency hopping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
 How does the 802.11 data frame indicate how a large packet should be fragmented?

A) It uses the preamble header to estimate the ideal packet size.
B) The frame check sequence dictates the calculated packet size.
C) The sequence control field indicates how packets will be subdivided.
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
 How does refraction affect the propagation of a wireless transmission?

A) It distorts the signal as it travels into and through a different transmission medium.
B) It splits the signal into secondary waves that continue in the direction in which they split.
C) It causes the signal to be returned back towards the source of the origin.
D) It causes the signal to be absorbed by the refracting material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
 All wireless signals are carried through the air by electromagnetic waves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
 In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?

A) extended service set
B) basic service set
C) modified service set
D) generic service set
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
 The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
 The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
 Diffraction has what affect on a wireless signal's propagation?

A) The signal is redirected into multiple directions.
B) The signal is split into secondary waves that continue in the direction in which they split.
C) The signal is returned back towards the source of the original signal.
D) The signal is completely absorbed by the diffracting material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
 What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

A) management frames
B) control frames
C) data frames
D) extended frames
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
 An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
 Which of the following statements regarding the 802.11ac standard is NOT accurate?

A) The standard was officially approved in early 2014.
B) 802.11ac access points function more like a hub than a switch.
C) 802.11ac access points can handle multiple transmissions at one time over the same frequency.
D) 802.11ac operates on the 5-GHz band.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
 A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?

A) beacon frame
B) association request
C) probe frame
D) ping frame
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
 Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

A) Class 1
B) Class 2
C) Class A
D) Class X
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
 You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?

A) The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.
B) The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g.
C) The client is using a network adapter with outdated firmware.
D) The client is only able to get line of sight with an omnidirectional antenna.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
 Healing messages are a feature of what smart home protocol?

A) ZigBee
B) Bluetooth
C) Z-Wave
D) ANT+
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
 What optional protocol can be used in 802.11 to reserve the medium for one node's use?

A) RTS/CTS (Request to Send/Clear to Send)
B) RAR/CTU (Reserve Airtime Request/Clear to Use)
C) HA/RA (Hold Airtime/Reserved Airtime)
D) RT/FT (Request Time/Fair Time)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
 In an 802.11 data frame, what is the size of the frame check sequence field?

A) 2 bytes
B) 4 bytes
C) 6 bytes
D) 8 bytes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
 Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

A) guest network profile
B) captive portal
C) WPA2-Enterprise
D) browser hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
 How many data streams are used in 802.11ac Wave 2 devices?

A) 2 data streams
B) 3 data streams
C) 4 data streams
D) 8 data streams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
 The wireless spectrum, as defined by the FCC, spans between which two frequencies?

A) 9 kHz and 300 GHz
B) 125 kHz and 150 GHz
C) 3 kHz and 500 GHz
D) 3 MHz and 300 GHz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
 In an 802.11 data frame, what is the maximum amount of data that can be sent?

A) 1500 bytes
B) 2312 bytes
C) 4582 bytes
D) 9000 bytes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
 If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

A) spectrum analyzer
B) protocol analyzer
C) Wi-Fi analyzer
D) air scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
 The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

A) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
B) Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
C) Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)
D) Carrier Sense Single Access with Collision Adaptation (CSSA/CA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
 When troubleshooting wireless issues, what statement is accurate?

A) A WPA key can be used to associate with a WEP configured access point.
B) Access points that use overlapping channels can cause interference with each other if they are too close.
C) Simultaneous wired and wireless network connections do not affect the ability to communicate on the network.
D) Access point power levels should always be configured to output as much power as possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
 802.11ac Wave 2 devices can theoretically support how much maximum throughput?

A) 600 Mbps
B) 1.3 Gbps
C) 3.47 Gbps
D) 6.93 Gbps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
 What is the purpose of the Layer 2 LLC sublayer?

A) It is used to handle multiplexing, flow and error control, and reliability.
B) It is used to manage MAC addresses in message frames.
C) It performs management of the physical layer's modulation techniques.
D) It is used to manage low-level encryption on a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
 What type of device can be used to assess the quality of a wireless signal?

A) Wi-Fi analyzer
B) spectrum analyzer
C) channel scanner
D) frequency hopper
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
 When using RFID, what is an ARPT (Active Reader Passive Tag)?

A) It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely.
B) It is a tag that requires an active reader, but still contains a battery in the tag.
C) It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
D) It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
 What scenario describes an evil twin attack?

A) A malicious access point is configured with the SSID of a non-malicious public access point.
B) An attacker is actively attempting to brute force the PIN of a WPS enabled access point.
C) A hacker is actively sending wireless probes to discover available wireless networks.
D) A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
 Near-field communication devices send data at what fixed frequency?

A) 8.65 MHz
B) 13.56 MHz
C) 21.39 MHz
D) 47.1 MHz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
 What are some of the different types of wireless topologies that can be created?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
 What is the difference between war driving and war chalking?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
 Why should the WPS PIN feature be avoided if possible?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
 Describe the 802.11a standard, and detail some of its history and advantages / disadvantages versus other 802.11 standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
 Most wireless devices use one of two technologies to avoid interference. What are these technologies?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
 When deciding antenna types, why might the use of an omnidirectional antenna be inadvisable?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
 Why should an access point not always utilize all the power it has for broadcasting wireless signals?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
 How does configuration of wireless clients for wireless access in an enterprise environment differ from normal setup?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
 Radiation patterns can be used to classify antennas into what two basic categories?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
 What is the hidden node problem, and how can it be mitigated?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.