ccna 3 chapter 4
If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.) 1 3 5 6 8 11
1 6 11
Which wireless RF band do IEEE 802.11b/g devices use? 900 MHz 2.4 GHz 5 GHz 60 GHz
2.4 GHz
Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.) 802.11ac 802.11g 802.11a 802.11n 802.11b
802.11g 802.11n 802.11b
Which statement defines the control frame operation between two stations? -A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame. -If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection. -After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found. -A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.
After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.
What is an advantage of SSID cloaking? -It is the best way to secure a wireless network. -Clients will have to manually identify the SSID to connect to the network. -It provides free Internet access in public locations where knowing the SSID is of no concern. -SSIDs are very difficult to discover because APs do not broadcast them.
Clients will have to manually identify the SSID to connect to the network.
A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this? -Change to WPA2 authentication. -Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band. -Deploy a Wi-Fi Range Extender. -Upgrade the firmware on the AP.
Deploy a Wi-Fi Range Extender.
Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) WLAN controller Ethernet switch RADIUS authentication server access point repeater
Ethernet switch access point
An IEEE 802.11n network has been configured for mixed mode and has clients that are using 802.11n and 802.11g radios on the network. The 802.11n clients are complaining of slower than normal speeds. What is the problem? -This is the normal behavior of a mixed-mode network. -The access point is failing. -The authentication is not allowing roaming. -Roaming between access points is disabled.
This is the normal behavior of a mixed-mode network.
Which security mode is the least secure choice when a home wireless router is configured? WEP WPA2 WPA2-Personal WPA
WEP
Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability of 802.11 products? Wi-Fi Alliance FCC IEEE ITU-R
Wi-Fi Alliance
Match the wireless technologies to the correct descriptions. (Not all options are used.) -useful in remote areas, but requires a clear line of sight Bluetooth Wi-Fi WiMAX
WiMAX
What Wi-Fi management frame is regularly broadcast by APs to announce their presence? probe beacon association authentication
beacon
Which type of management frame may regularly be broadcast by an AP? probe request probe response beacon authentication
beacon
What type of frames are used for advertising, authenticating, and associating with a wireless AP? data control management acknowledgment
management
What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms? dish directional omnidirectional Yagi
omnidirectional
For which discovery mode will an AP generate the most traffic on a WLAN? passive mode open mode active mode mixed mode
passive mode
Match the wireless technologies to the correct descriptions. (Not all options are used.) -uses device pairing to communicate over distances of up to 100 meters Bluetooth Wi-Fi WiMAX
Bluetooth
Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet? ESS IBISS BSS WiFi Direct ad hoc WLAN
ESS
What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment? -It is used to send data over a half-duplex connection. -It is used in a full-duplex environment to detect collisions. -It allows a client to detect whether or not a channel is clear prior to transmission. -It allows the client to change transmission channels.
It allows a client to detect whether or not a channel is clear prior to transmission.
What is a characteristic of a Yagi antenna that is used by Cisco Aironet Access Points? -It provides 360-degree coverage. -It can be used for long-distance Wi-Fi networking. -It is also referred to as a "rubber duck" design. -It has the same characteristics as an omnidirectional Wi-Fi antenna.
It can be used for long-distance Wi-Fi networking.
Which statement describes an ESS? An ESS consists of two or more BSSs that are interconnected wirelessly by a DS. Bluetooth is an example of ESS infrastructure mode. It involves several BSSs that are joined through a common distribution system. An ESS is a connection of a BSS to an ad hoc wireless network.
It involves several BSSs that are joined through a common distribution system.
Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did? SPS MIMO MITM WPS
MIMO
If an administrator is troubleshooting a WLAN using a bottom up approach, which action would be taken first? -Update the firmware on the AP. -Make sure all devices are powered on. -Ping the AP. -Verify that the GUI interface is accessible from a client.
Make sure all devices are powered on.
Which two recommendations should an administrator follow when planning the location of multiple APs? (Choose two.) -Position APs horizontally near the ceiling in the center of each coverage area, if possible. -Position APs in locations where users are expected to be. -An ESS should have 20 to 25 percent overlap between BSAs in an ESS. -Overlap channels to provide roaming capability. -Always consult the specifications for the AP when planning for coverage areas.
Position APs in locations where users are expected to be Always consult the specifications for the AP when planning for coverage areas.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the SSID of the connected network and which message is displayed in the browser window? -SSID: Home-Network Message: Good job! -SSID: Home-Net Message:Congratulations! You were able to connect it! -SSID: Home-Network Message: Well done! -SSID: Home-Net Message:Congratulations! You did it!
SSID: Home-Net Message:Congratulations! You were able to connect it!
What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate in a corporate environment? -Cisco corporate APs do not support PoE. -Autonomous APs are used only in the home environment, and they incorporate the functions of a router, switch, and AP into one device. -Controller-based APs are used in the corporate environment, and they are server-dependent devices that require an initial configuration to operate. -Some corporate AP models can operate in either autonomous mode or controller-based mode.
Some corporate AP models can operate in either autonomous mode or controller-based mode.
A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network? -Disable DHCP on the access point and assign static addresses to the wireless clients. -Upgrade the firmware on the wireless access point. -Split the traffic between the 2.4 GHz and 5 GHz frequency bands. -Replace the wireless NICs on the computers that are experiencing slow connections.
Split the traffic between the 2.4 GHz and 5 GHz frequency bands
Which combination of WLAN authentication and encryption is recommended as a best practice for home users? WEP and TKIP WPA2 and AES EAP and AES WPA and PSK WEP and RC4
WPA2 and AES
Match the wireless technologies to the correct descriptions. (Not all options are used.) -provides network access within a home with connectivity distances of up to 300 meters Bluetooth Wi-Fi WiMAX
Wi-Fi
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid? -accidental interference -improperly configured devices -interception of data -rogue access points
accidental interference
Fill in the blank. Known as "WiGig", the IEEE 802.11 _____ standard provides average speeds of up to 7 Gb/s, but will switch to a lower GHz band when roaming is employed.
ad
During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP? authentication encryption association probing discovery
association
Fill in the blank. A network administrator discovers a rogue AP in the network. The rogue AP is capturing traffic and then forwarding it on to the legitimate AP. This type of attack is known as a _____ attack.
man in the middle
A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point? beacon frame control frame management frame data frame
management frame
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation? rogue access point spoofing denial of service cracking
rogue access point
Fill in the blank. Do not use abbreviations. Ad hoc wireless topologies sometimes can use a feature called _____ to enable a smartphone to create a personal hotspot.
tethering