Exam Cram Chapter 8 CompTIA Network + N10-006

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

3. In the 802.1X security framework, which of the following best describes the role of the supplicant? ❍ A. Authenticating usernames and passwords ❍ B. Encrypting usernames and passwords ❍ C. The system or node requesting access and authentication to a network resource ❍ D. A control mechanism that allows or denies traffic that wants to pass through a port

3. C. The 802.1X security framework has three main components. The supplicant is the system or node requesting access and authentication to a network resource. The authenticator usually is a switch or AP that acts as a control mechanism, allowing or denying traffic that wants to pass through a port. Finally, the authentication server validates the credentials of the supplicant that is trying to access the network or resource.

Quiz 1 1. Which of the following wireless protocols operate at 2.4GHz? (Select three.) ❍ A. 802.11a ❍ B. 802.11b ❍ C. 802.11g ❍ D. 802.11n ❍ E. 802.11ac

Chapter 8 Quiz 1 1. B, C, D. Wireless standards specify an RF range on which communications are sent. The 802.11b and 802.11g standards use the 2.4GHz range. 802.11a and 802.11ac use the 5GHz range. 802.11n can operate at 2.4GHz and 5GHz.

Quiz 2 1. You are installing a wireless network solution, and you require a standard that can operate using either 2.4GHz or 5GHz frequencies. Which of the following standards would you choose? ❍ A. 802.11a ❍ B. 802.11b ❍ C. 802.11g ❍ D. 802.11n ❍ E. 802.11ac

Quiz 2 1. D. The IEEE standard 802.11n can use either the 2.4GHz or 5GHz radio frequencies. 802.11a uses 5GHz, and 802.11b and 802.11g use 2.4GHz. 802.11ac operates at 5GHz.

2. Which of the following best describes 802.1X? ❍ A. A port-based access control ❍ B. A wireless standard specifying 11Mbps data transfer ❍ C. A wireless standard specifying 54Mbps data transfer ❍ D. An integrity-based access control

2. A. 802.1X is an IEEE standard specifying port-based network access control. Port-based network access control uses the physical characteristics of a switched local-area network (LAN) infrastructure to authenticate devices attached to a LAN port and to prevent access to that port in cases where the authentication process fails.

2. Under what circumstance would you change the default channel on an access point? ❍ A. When channel overlap occurs between APs ❍ B. To release and renew the SSID ❍ C. To increase WPA2 security settings ❍ D. To decrease WPA2 security settings

2. A. Ordinarily, the default channel used with a wireless device is adequate; however, you might need to change the channel if overlap occurs with another nearby AP. The channel should be changed to another, nonoverlapping channel. Changing the channel would not impact the WPA2 security settings.

2. You experience connectivity problems with your SOHO network. What can you change in an attempt to solve this problem? ❍ A. Shorten the SSID. ❍ B. Remove all encryption. ❍ C. Lower the transfer rate. ❍ D. Raise the transfer rate.

2. C. If you experience connectivity problems between wireless devices, try using the lower transfer rate in a fixed mode to achieve a more stable connection. For example, you can manually choose the wireless transfer rate. The higher the transfer rate, the shorter the connection distance.

2. You are installing a wireless network solution that uses a feature known as MUMIMO. Which wireless networking standard are you using? ❍ A. 802.11a ❍ B. 802.11b ❍ C. 802.11n ❍ D. 802.11ac

2. D. MUMIMO is used by the 802.11ac standard and makes multiuser MIMO possible (increasing the range and speed of wireless networking). MIMO, itself, enables the transmission of multiple data streams traveling on different antennas in the same channel at the same time. CramQuizChapter 9

3. A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move she cannot access the network. Which of the following is most likely the cause of the problem? ❍ A. The SSIDs on the client and the AP are different. ❍ B. The SSID has been erased. ❍ C. The client has incorrect broadcast settings. ❍ D. The client system has moved too far from the AP.

3. D. An AP has a limited distance that it can send data transmissions. When a client system moves out of range, it cannot access the AP. Many strategies exist to increase transmission distances, including RF repeaters, amplifiers, and buying more powerful antennas or wireless APs. The problem is not likely related to the SSID or broadcast settings because the client had access to the network before, and no settings were changed.

Quiz 3 1. You are asked to configure the security settings for a new wireless network. You want the setting that offers the greatest level of security. Which of the following would you choose? ❍ A. WPA ❍ B. WPA2 Personal ❍ C. WPA2 Enterprise ❍ D. WEP

Quiz 3 1. C. WPA2 Enterprise needs an authentication server and thus provides the highest level of security of the choices given. WPA and WAP2 Personal use a preshared key and WEP is the simpler of the authentication methods because it does not perform any type of client verification.

Quiz 4 1. You purchase a new wireless AP that uses no security by default. You change the security settings to use 128-bit encryption. How must the client systems be configured? ❍ A. All client systems must be set to 128-bit encryption. ❍ B. The client system inherits security settings from the AP. ❍ C. Wireless security does not support 128-bit encryption. ❍ D. The client wireless security settings must be set to autodetect.

Quiz 4 1. A. On a wireless connection between an AP and the client, each system must be configured to use the same wireless security settings. In this case, they must both be configured to use 128-bit encryption.


Ensembles d'études connexes

improvement of study chapter 2 and 4

View Set

Chapter 12: Spinal Cord & Spinal Nerves.

View Set

MS2 Respiratory / Hematology Review Questions

View Set

Pharmocology Section #1 (Lexi + Emily+ Delaney)*

View Set

Second Year 2nd semester mid-term

View Set

PF: 1.3.1 Lesson: Services provided from taxes

View Set