TestOut Chapter 10 - Wireless Networking

¡Supera tus tareas y exámenes ahora con Quizwiz!

10.2.7 you are designing a wireless network for a client. your client needs the network so support a data rate of at least 54 Mbps. in addition, the client already has a wireless telephone system installed that operates 2.4 GHz. which 802.11d standard will work in this situation?

802.11a

10.4.9 you are designing a wireless network for a client. Your client the network to support a data of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz.

802.11a 802.11n

10.2.7 what is the frequency of 802.11a networking?

5.75 GHz

After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? (Select two.) - 802.11b - Bluetooth - 802.11a - 802.11g

- 802.11b - 802.11g

You are troubleshooting a wireless connectivity issue is a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.) - Infrared - 802.11a - 802.3a - Bluetooth - 802.11b

- Bluetooth - 802.11b

Mobile devices in your organization use the access point shown in the figure below to connect to your wireless network. http://prntscr.com/ro61he Recently, a catastrophic early morning power surge occurred. It was followed by an outage that lasted longer than your backup equipment could supply temporary power. After you powered the equipment back on, everything initially appeared to work correctly. However, ever since this event, some mobile users report that wireless network connections sometimes get dropped or perform very poorly. What should you do. (Select two.) - Set the channel used by access point B to 11. - Configure each access point to use a different SSId. - Set the channel used by access point B to 8. - Set the channel used by access point A to 5. - Set the access point B to use 802.11n wireless networking. - Configure each access point to use 802.1x authentication. - Set the channel used by access point C to 7. - Set access points A and C to use 802.11b wireless networking.

- Set the channel used by access point B to 11. - Set the access point B to use 802.11n wireless networking.

10.2.7 which of the ff are frequencies defined by 802.11 committees for wireless networking? select two

2.4 GHz 5.75 GHz

10.4.9 what purpose does a wireless site survey fulfill? choose two

1. to identify the coverage are and preffered placement of access points 2. to identify existing or potential sources of inference

10.2.7 hw many total channels are available for 802.11g wireless networks?

11

10.2.7 which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

10.2.7 how many total channels are availb,e for 802.11a wireless networks?

23

10.2.7 which IEEE standard describes wireless communication?

802.11b

10.2.7 which IEEE wireless standards specify transmission speeds up o 54 Mbps? select two

802.11g 802.11a

10.2.7 you are designing an update y\to your client's network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to run up to 600 Mbps. due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade wireless network boards in her user's workstations. She has also indicated that the system must continue to function during the transition period. which 802.11 standard will work best in this situation?

802.11n

10.2.7 you have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 1,200 feet, use a frequency range of 5 GHz, and provide the highest possible transmission speeds. which of the ff. wireless solutions would you recommend?

802.11n

10.4.9 You are designing an update to your client's wireless network. the Existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next Year, she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. which 802.11 standard will work best in this situation?

802.11n

10.4.9 you are designing a wireless network for a client. Your client needs the network to support a data of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz.

802.11n

10.6.7 which of the ff protocols o mechanism is used to provide security on a wireless network?

802.1x IPsec WPA

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptops wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem? - PPP is not configured correctly. - A mismatched SSID. - Different LAN protocols are being used. - Antenna strength on the WAP is too low. - WAP is out of range.

A mismatched SSID.

10.6.7 You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as mush as possible. the floor plan of the office is shown below...

A-Direciton B-Direction C-Omni-Direction D-Direciton E-Direciton F-Direciton G-Direciton

10.6.7 your consulting firm has been hired by a small business to implement a r=wireless network. the company leases two offices suites within a business park approximately 200m part, as shown below. the objectives of the implementation are as follows: -create a secure network that doesn't emanate beyond each office space by implementing access points in locations A-D in each building - connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F

A= normal gain directional antenna east B= normal gain directional antenna south C= normal gain directional antenna north D= normal gain directional antenna west E= high-gain directional antenna east F= high-gain directional antenna west

10.6.7 You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? select two

AES encryption 802.1x

10.1.5 All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

CSMA/CA

10.4.9 match each wireless term or concept on the left with its associated description on the right. Each term may be used more than once; not all descriptions have a matching term.

Compares the level of the Wi-Fi signal to the level of background radio signals: signal to noise ration Checks channel utilization and identifies sources of RF inference: spectrum analysis identifies how strong a radio signal as at the receiver: Relieve signal level causes multiple copies of the same radio signal to be received by the receiving antenna: bounce degrades wireless network performance: device saturation

10.6.7 You are the wireless network Admin for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.11x authentication instead of pre-shared keys. What should you do

Configure all wireless access points with client certs. Configure the RADIUS server with a server cert.

10.1.5 which wireless networking is used to connect multiple APs together?

DS

10.6.7 Which of the following measures will make your wireless network inviable to the casual attacker performing war driving?

Disable the SSID broadcast

10.5.5 Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of quest WLANs for keeping public wireless traffic separated from private traffic?

Distributed wireless mesh infrastructure

10.4.9 your wireless network consists of multiple 802.11n access points that are configures as follows: -SSID (hidden): Corpnet -security: WPA2-PSK using AES -Frequency: 5.7 GHz -Bandwidth per channel: 20 MHz

Double the bandwidth assigned per channel to 40 MHz.

10.1.5 which of the ff is true of a wireless network SSID?

Groups wireless devices together into the same logical network.

10.1.5 An access point that conforms to the IEEE 802.11b standard behaves similarly to what other networking device?

Hub

Your wireless network consists of multiple 802.11n access points that are configured as follows: - SSID (hidden): CorpNet - Security: WPA2-PSK using AES - Frequency: 5.75 GHz - Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do? - Install directional access points. - Switch to RADIUS authentication for wireless clients. - Implement antenna diversity. - Reduce the power of the access point radio signals.

Implement antenna diversity.

10.5.5 Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right

Independent access point infrastructure/ Intelligent AP Hub-and-spoke infrastructure/ Lightweight AP Distributed wireless mesh infrastructure/ Intelligent AP

10.5.5 Match each wireless device on the left with is corresponding characteristics on the right.

Manages all of the Apps that are connected to it/ Wireless controller Suppors 30 to 50 wireless clients per access point/ Wireless controller Profides NAT routing and an ethernet switch in one device/ SOHO wireless router Supports a maximum of 5-10 wireless clients/ SOHO wireless router Pushes wireless configurations settings to connected access points/ Wireless controller

10.5.5 Match the wireless networking term or concept on the left with its appropriate description on the right.

Moving an wireless device/Roaming Used by Cisco wireless equipment/ LWAPP Specifies the number of clients/ Device density Automatically partitions a single/ VLAN pooling Graphically displays wireless/ Heat map Connects tow wired networks/ Wireless bridge Identifies how strong/heatmap The number of useful bits/ Goodput

10.6.7 What is the LEAST secure place to locate an access point with an omni-directional antenna when creating a wireless cell?

Near a window

10.6.7 you want to implement 802.1x authentication on your wireless network. where would you configure passwords that are used for authentication?

ON A radius SERVER

You are setting up a wireless hotspot in a local coffee shop. For the best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern? - Directional - Uni-directional - Multi-point - Multi-directional - Omni-directional

Omni-directional

You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point? - On the top floor - Near the backup generators - In the basement - In the kitchen

On the top floor

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems? - The SSIDs of the two client systems match. - WEP overlap. - Crosstalk between the RF signals. - The SSIDs of the two server systems match. - Overlapping channels.

Overlapping channels.

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? - Place access points in the basement. - Place access points near outside walls. - Place access points above where most clients are. - Place multiple access points in the same area.

Place access points above where most clients are.

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength? - Increase the RF power on the isotropic antenna. - Replace the directional antenna with an omni-directional antenna. - Increase the RF setting on the client system. - Increase the RF setting on the AP. - Replace the omni-directional antenna with a directional antenna.

Replace the omni-directional antenna with a directional antenna.

10.6.7 Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. What type of security risk is this?

Rogue access point

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP? - SSID - PS - Channel - WEP

SSID

10.6.7 You want to connect your client computer to a wireless access point connected to your wired network air work. The network Admin tells you that the access point is configured to use WPA2 personal with the strongest encryption method possible. SSID broadcast is ruined off. Which of the following must you configure manually on the client? select three

SSID AES Preshared Key

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she only has occasional network access through her wireless connection. Which of the following is most likely the cause of the problem? - The client system has moved too far away from the access point. - An SSID mismatch between the client and the server. - The encryption level has been erroneously set back to the default setting. - An SSID mismatch between the client and the WAP. - The client has incorrect WEP settings.

The client system has moved too far away from the access point.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem? - The user has not yet logged off and back on to the network while at her new location. - The wireless network access point on the user's normal floor has failed. - The user has not yet rebooted her laptop computer while at her new location. - The user needs a new IP address because she is working on a different floor. - The user is out of the effective range of the wireless access point on her floor.

The user is out of the effective range of the wireless access point on her floor.

10.6.7 which of the ff provides security for wireless networks?

WPA

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks? - Use the same channel ID, but configure a different SSID. - Use a different channel ID. - Use the same channel ID, but configure your wireless network to use WEP. - Use 802.11b instead of 802.11g.

Use a different channel ID.

10.1.5 match the wireless signaling method on the left with its definition on the right.

Uses a narrow frequency band and hops data signals in a predictable sequence: FHSS Breaks data into pieces and sends the pieces across multiple frequencies in a defined range: DSSS breaks data into very small data streams in order to send the information across long distances: OFDM

10.6.7 Which of the following wireless security methods uses common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

10.4.9 which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?

Z-Wave

10.4.9 you have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. which of the ff. questions should you ask? select three

is the size of the business expected to grow in the future? how many devices will need to be supported? what type data will be transmitted on the network?

10.4.9 you are building a wireless network within and between two buildings. the buildings re separated by more than 300 feet, The wireless network should meet the following requirements: -wireless data with in building 1 should be protected with the highest degree of security. -wireless data within building 2 should be accessible and permitted by any wireless client. -wireless signals between buildings 1 and 2 should be protected with the highest degrees of security. -wireless signals within buildings 1 and 2 should cover the whole structure, but not extended to the outside. for each location on the image below, you need to select the ff: -antenna option -security option

building 1 - Location A: 1.Right - facing directional antenna. 2. WPA2 with CCMP Building 1 - Location B: 1.WPA2 with CCMP 2. Omni-directional antenna. Building 1 - Location C 1. Left- facing directional antenna 2. WPA2 with CCMP Building 1 - Location D 1. WPA2 with CCMP 2. right facing high again directional antenna. Building 2 - Location A 1. Omni-directional antenna 2. WEP with open authentication Building 2 -mLocation B 1. left-facing high-gain directional antenna 2. WPA2 with CCMP

10.4.9 to optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: -Non-overlapping -low utilization -low interference yo performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four whose crest are over channel 11 belong to channel 11.) based on the result, which channel you configure your wireless AP to use?

channel 1

10.3.7 You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area but cannot see your network to connect to it. What should you do?

configure a profile on the wireless client

10.3.7 You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

decreased the beacon interval

10.6.7 You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. the building are 100 meters apart. what type of wireless antennae should you use on each side of the link?

directional high gain

10.2.7 which technologies are used by the 802.11ac standard to increase network bandwidth?

eight MOMO radio streams 160 MHz bonded channels

10.6.7 which of the ff features re supplied by WPA2 on a wireless network?

encryption

10.3.7 you are an administrator of a growing network. You notice the network you have created is broadcasting, but you can not ping systems on different segments of your network. what device should you use to fix this issue?

network bridge

10.6.7 An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using airsnort to capture packets, but found that she couldn't break the encryption. What attack techniques did the attack us? select two

pharming evil twin attack

10.3.7 You have a small wireless network that uses multiple access points. The network currently uses WPA. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?

preshared key TKIP encryption

10.3.7 You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and to be able to roam between the two access points. How should you configure the access points

same SSID, different channel

10.2.7 your organization uses an 802.11b wireless network. recently, other tenants installed the ff. equipment in your building: -A wireless television distribution system running at 2.4 GHz -A wireless phone system running at 5.8 GHz -A wireless phone system running at 900 MHz -An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. -An 802.11j wireless network uniting in the 4.9 - 5.0 GHz frequency range since the equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

the wireless TV system

10.4.9 what is the risk associated with smart technology used in networked devices such as smart refrigerators, environmental controls, or industrial equipment?

they are vulnerable to exploits due to weaker security


Conjuntos de estudio relacionados

DMV Written Test Question Bank (CA)

View Set

business ethics and social responsibility Ch 2

View Set

Pharmacology Made Easy 4.0 The Hematologic System

View Set