Chapter 9
How many total channels are available for 802.11a wireless networks?
23
For home or small business implementations, you typically use a consumer-grade access point that combines many functions into a single device. What is the maximum number of clients that can be supported at a time?
5-10 wireless clients
Which IEEE standard describes wireless communication?
802.11
You are designing a wireless network for a client. Your client would like to implement the highest speed possible. Which 802.11 standard will work best in this situation?
802.11ac
You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a frequency range of 5 GHz and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?
802.11ac
You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?
802.11n
You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptop's wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem?
A mismatched SSID.
Which of the following best describes a site survey?
A process of planning and designing a wireless network.
Which of the following best describe a spectrum analyzer?
A tool used to determine the noise floor in the desired frequency range.
Which of the following best describes a hub-and-spoke infrastructure deployment model?
A wireless controller is connected to all access points through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
Which of the following is considered the strongest encryption method?
AES
Which of the following allows devices to find a specific access point within an extended service set that has multiple access points?
BSSID
All of the 802.11 standards for wireless networking support which type of communication path sharing technology?
CSMA/CA
A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is most likely to improve VoIP performance?
Change QoS settings to give VoIP traffic more priority.
A technician is installing a new SOHO wireless router. Which of the following is the first thing the technician should do to secure the router?
Change the router's default password.
To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: Non-overlapping Low utilization Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results, which channel should you configure your wireless AP to use?
Channel 1
A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take next?
Check for and apply firmware updates.
What is Channel bonding?
Combines two non-overlapping channels into a single channel, resulting in slightly more than double the bandwidth.
You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but you cannot see your network. What should you do?
Configure a profile on the wireless client.
A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is most likely to restore internet connectivity?
Configure the SOHO router for NAT.
Which of the following is the backbone or local area network that connects multiple access points (and basic service sets) together?
DS
Which wireless networking component is used to connect multiple APs together?
DS
You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?
Decrease the beacon interval.
Which of the following measures makes your wireless network invisible to the casual attacker performing war driving?
Disable SSID broadcast.
Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic?
Distributed wireless mesh infrastructure
Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.7 GHz Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do?
Double the bandwidth assigned per channel to 40 MHz.
A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?
Enable MAC filtering
A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal?
Enable content filtering
Which of the following is true of a wireless network SSID?
Groups wireless devices together into the same logical network.
An access point that conforms to the IEEE 802.11ac standard handles network traffic similarly to which other networking device?
Hub
Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?
Implement antenna diversity.
Which enterprise deployment has limited mobility and is difficult to manage?
Independent access points
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?
MAC address filtering
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?
Near a window
You are an administrator of a growing network. The network you have created is broadcasting, but you cannot ping systems on different segments of your network. Which device should you use to fix this issue?
Network bridge
You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern?
Omni-directional
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings remain configured to the default with the exception of SSIDs. Which of the following might you suspect as the cause of the connectivity problems?
Overlapping channels.
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
Place access points above where most clients are.
You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
RADIUS
You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?
Replace the omni-directional antenna with a directional antenna.
As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as?
Roaming
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
Rogue access point
Which of the following is used on a wireless network to identify the network name?
SSID
Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?
SSID broadcast
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points?
Same SSID, different channel
A user on your network has moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?
The client system has moved too far away from the access point.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point on her floor.
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: A wireless television distribution system running at 2.4 GHz. A wireless phone system running at 5.8 GHz. A wireless phone system running at 900 MHz. An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range. Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
The wireless TV system
What is a lightweight access point used for?
To route frames between the wireless and wired networks.
While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?
Use a different channel ID.
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2
Which of the following is true when the DHCP setting is disabled in a wireless network?
Wireless clients must use a static IP address within the correct IP address range to connect to the network.
Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?
Z-Wave