Pat final, Ch 12-16, 18

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

(12-19) In a multiple-channel architecture (MCA) design, what is the greatest number of nonoverlapping channels that can be deployed in the 2.4 GHz ISM band? A. 3 B. 12 C. 11 D. 14 E. 4

A. 3

(14-19) Which of these encryption technologies have been cracked? (Choose all that apply.) A. 64-bit WEP B. TKIP/RC4 C. CCMP/AES D. 128-bit WEP E. Wired Equivalent Privacy

A. 64-bit WEP D. 128-bit WEP E. Wired Equivalent Privacy

(18-13) 802.11n (HT) radios are backward compatible with which of the following types of 802.11 radios? (Choose all that apply.) A. 802.11b radios (HR-DSSS) B. 802.11a radios (OFDM) C. 802.11 legacy radios (FHSS) D. 802.11g radios (ERP)

A. 802.11b radios (HR-DSSS) B. 802.11a radios (OFDM) D. 802.11g radios (ERP)

(13-18) Identify the security solutions that are defined by WPA2. (Choose all that apply.) A. 802.1X/EAP authentication B. Dynamic WEP encryption C. Optional CCMP/AES encryption D. Passphrase authentication E. DES encryption

A. 802.1X/EAP authentication D. Passphrase authentication

(14-5) Select two types of rogue devices that cannot be detected by a layer 2 wireless intrusion prevention system (WIPS): A. 900 MHz radio B. 802.11h-compliant device C. FHSS radio D. 802.11b routers E. 802.11g mixed-mode device

A. 900 MHz radio C. FHSS radio

(18-6) How can an HT radio increase throughput at the MAC sublayer of the Data-Link layer? (Choose all that apply.) A. A-MSDU B. RIFS C. A-MPDU D. Guard interval E. MTBA

A. A-MSDU B. RIFS E. MTBA

(15-8) You have been hired by the Barry Corporation to conduct an indoor site survey. What information will be in the final site survey report that is delivered? (Choose all that apply.) A. AP placement B. Firewall settings C. Router access control lists D. Access point transmit power settings E. Antenna orientation

A. AP placement D. Access point transmit power settings E. Antenna orientation

(14-15) Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.) A. Wi-Fi phishing B. Happy AP attack C. Peer-to-peer attack D. Malicious eavesdropping E. 802.11 sky monkey attack F. Man-in-the-middle G. Wireless hijacking

A. Wi-Fi phishing C. Peer-to-peer attack D. Malicious eavesdropping F. Man-in-the-middle G. Wireless hijacking

(15-2) Name a unique consideration when deploying a wireless network in a hotel or other hospitality business. (Choose the best answer.) A. Equipment theft B. Aesthetics C. Segmentation D. Roaming E. User management

B. Aesthetics

(16-8) Name potential sources of interference in the 5 GHz U-NII band. (Choose all that apply.) A. Microwave oven B. Cordless phones C. FM radios D. Radar E. Nearby 802.11b/g WLAN

B. Cordless phones D. Radar

(15-16) Typically what are the biggest concerns when planning for a WLAN in a warehouse environment? (Choose all that apply.) A. Capacity B. Coverage C. Security D. Roaming

B. Coverage C. Security D. Roaming

(18-16) A WLAN consultant has recommend that a new 802.11n HT network be deployed by using channels in the 5 GHz U-NII bands. Why would he recommend 5 GHz over 2.4 GHz? A. HT radios do not require DFS and TPC in the 5 GHz bands. B. HT radios get better range using TxBF in the 5 GHz bands. C. 40 MHz channels do not scale in the 2.4 GHz ISM band. D. 5 GHz HT radios are less expensive than 2.4 GHz HT radios.

C. 40 MHz channels do not scale in the 2.4 GHz ISM band.

(13-5) The 802.11 legacy standard defines which wireless security solution? A. Dynamic WEP B. 802.1X/EAP C. 64-bit static WEP D. Temporal Key Integrity Protocol E. CCMP/AES

C. 64-bit static WEP

(13-15) Identify some aspects of the Temporal Key Integrity Protocol. (Choose all that apply.) A. 128-bit temporal key B. 24-bit initialization vector C. Message integrity check D. 48-bit IV E. Diffie-Hellman Exchange

A. 128-bit temporal key C. Message integrity check D. 48-bit IV

(16-1) The Crocker company has generated a visual model of RF coverage for its corporate headquarters by using predictive modeling site survey software. The next step requires validation with a manual site survey. What modeling parameters should be validated during the manual site survey? (Choose all that apply.) A. AP placement and power settings B. Throughput C. Coverage boundaries D. Encryption settings E. Roaming parameters

A. AP placement and power settings B. Throughput C. Coverage boundaries E. Roaming parameters

(13-10) What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.) A. Access to network resources B. Verification of access point credentials C. Dynamic authentication D. Dynamic encryption-key generation E. Verification of user credentials

A. Access to network resources D. Dynamic encryption-key generation E. Verification of user credentials

(15-19) What additional documentation is usually provided along with the final site survey deliverable? (Choose all that apply.) A. Bill of materials B. Implementation diagrams C. Network topology map D. Project schedule and costs E. Access point user manuals

A. Bill of materials B. Implementation diagrams D. Project schedule and costs

(15-6) What documents might be needed prior to performing an indoor site survey for a new wireless LAN? (Choose all that apply.) A. Blueprints B. Network topography map C. Network topology map D. Coverage map E. Frequency map

A. Blueprints C. Network topology map

(15-9) The Kellum Corporation has hired you to troubleshoot an existing WLAN. The end users are reporting having difficulties when roaming. What are some of the possible causes? (Choose all that apply.) A. Clients stations can only hear a -70 dBm signal from one access point. B. Clients stations hear a -70 dBm signal from 30 access points. C. The RF coverage cells are co-located. D. There is interference from the cellular network. E. There is interference from 2.4 GHz portable phones.

A. Clients stations can only hear a -70 dBm signal from one access point. B. Clients stations hear a -70 dBm signal from 30 access points. E. There is interference from 2.4 GHz portable phones.

(15-13) What factors need to be considered when planning for capacity and coverage in a 5 GHz WLAN? (Choose all that apply.) A. Data applications B. User density C. Peak usage level D. DFS channels

A. Data applications B. User density C. Peak usage level D. DFS channels

(14-8) Which of these attacks are considered layer 2 denial-of-service attacks? (Choose all that apply.) A. Deauthentication spoofing B. Jamming C. Virtual carrier attacks D. PS-Poll floods E. Authentication floods

A. Deauthentication spoofing C. Virtual carrier attacks D. PS-Poll floods E. Authentication floods

(14-7) What can happen when an intruder compromises the PSK or passphrase used during WPA/WPA2-Personal authentication? (Choose all that apply.) A. Decryption B. ASLEAP attack C. Spoofing D. Encryption cracking E. Access to network resources

A. Decryption E. Access to network resources

(12-1) What are some recommended best practices when deploying a high-density WLAN? (Choose all that apply.) A. Deploying unidirectional MIMO patch antennas B. Band steering of all clients to 5 GHz C. Load balancing D. Low AP transmit power E. Layer 3 roaming

A. Deploying unidirectional MIMO patch antennas C. Load balancing D. Low AP transmit power

(16-16) Which of the following tools may be found within an indoor site survey kit? (Choose all that apply.) A. Digital camera B. Colored electrical tape C. Grid antenna D. Access point enclosure unit E. Temporary mounting gear

A. Digital camera B. Colored electrical tape E. Temporary mounting gear

(12-6) What scenarios might result in a hidden node problem? (Choose all that apply.) A. Distributed antenna system B. Coverage cells that are too large C. Coverage cells that are too small D. Physical obstruction E. Co-channel interference

A. Distributed antenna system B. Coverage cells that are too large D. Physical obstruction

(14-14) Scott is an administrator at the Williams Lumber Company, and his WIPS has detected a rogue access point. What actions should he take after the WIPS detects the rogue AP? (Choose the best two answers.) A. Enable the layer 2 rogue containment feature that his WIPS provides. B. Unplug the rogue AP from the electrical outlet upon discovery. C. Call the police. D. Call his mother. E. Unplug the rogue AP from the data port upon discovery.

A. Enable the layer 2 rogue containment feature that his WIPS provides. E. Unplug the rogue AP from the data port upon discovery.

(14-16) Select two components that should be mandatory in every remote access wireless security policy. A. Encrypted VPN B. 802.1X/EAP C. Personal firewall D. Captive portal E. Wireless stun gun

A. Encrypted VPN C. Personal firewall

(14-6) When you're designing a wireless policy document, what two major areas of policy should be addressed? A. General policy B. Functional policy C. Rogue AP policy D. Authentication policy E. Physical security

A. General policy B. Functional policy

(12-16) What are some problems that can occur when an access point is transmitting at full power? (Choose all that apply.) A. Hidden node B. Co-channel interference C. Mismatched power between the AP and the clients D. Intersymbol interference

A. Hidden node B. Co-channel interference C. Mismatched power between the AP and the clients

(14-13) Select the four labels that a WIPS uses to classify an 802.11 device. A. Infrastructure B. Known C. Enabled D. Disabled E. Rogue F. Unknown

A. Infrastructure B. Known E. Rogue F. Unknown

(15-15) The Jackson County Regional Hospital has hired you for a wireless site survey. Prior to the site survey, employees from which departments at the hospital should be consulted? (Choose all that apply.) A. Network management B. Biomedical department C. Hospital security D. Custodial department E. Marketing department

A. Network management B. Biomedical department C. Hospital security

(13-16) In a point-to-point bridge environment where 802.1X/EAP is used for bridge authentication, what device in the network acts as the 802.1X supplicant? A. Nonroot bridge B. Controller C. Root bridge D. RADIUS server E. Layer 3 core switch

A. Nonroot bridge

(15-10) After conducting a simple site survey in the office building where your company is located on the fifth floor, you have discovered that other businesses are also operating access points on nearby floors on channels 2 and 8. What is the best recommendation you will make to management about deploying a new WLAN for your company? A. Install a 2.4 GHz access point on channel 6 and use the highest available transmit power setting to overpower the WLANs of the other businesses. B. Speak with the other businesses. Suggest that they use channels 1 and 6 at lower power settings. Install a 2.4 GHz access point using channel 9. C. Speak with the other businesses. Suggest that they use channels 1 and 11 at lower power settings. Install a 2.4 GHz access point using channel 6. D. Recommend installing a 5 GHz access point. E. Install a wireless intrusion prevention system (WIPS). Classify the other businesses' access points as interfering and implement deauthentication countermeasures.

A. Install a 2.4 GHz access point on channel 6 and use the highest available transmit power setting to overpower the WLANs of the other businesses.

(14-18) Which WIDS architecture is the most commonly deployed? A. Integrated B. Overlay C. Access distribution D. Edge distribution E. Overlay enabled

A. Integrated

(12-18) Which type of interference is caused by destructive multipath? A. Intersymbol interference B. All-band interference C. Narrowband interference D. Wideband interference E. Physical interference

A. Intersymbol interference

(16-2) Which potential regional weather conditions can adversely affect an outdoor wireless bridge link and should be noted during an outdoor site survey? (Choose all that apply.) A. Lightning B. Dew point C. Wind D. Cloud cover E. Thunder

A. Lightning C. Wind

(16-11) Name the necessary calculations for an outdoor bridging survey under 5 miles. (Choose all that apply.) A. Link budget B. Free space path loss C. Fresnel zone D. Fade margin adjustment E. Height of the antenna beamwidth

A. Link budget B. Free space path loss C. Fresnel zone D. Fade margin adjustment

(18-20) What PHY layer mechanisms might be used to increase the range for an 802.11n radio using a MIMO system? (Choose all that apply.) A. Maximum ratio combining B. Guard interval C. Transmit beamforming D. Spatial multiplexing

A. Maximum ratio combining C. Transmit beamforming

(16-6) Which of the following tools can be used in an indoor site survey? (Choose all that apply.) A. Measuring wheel B. GPS C. Ladder D. Battery pack E. Microwave oven

A. Measuring wheel C. Ladder D. Battery pack

(16-4) ACME Hospital uses a connection-oriented telemetry monitoring system in the cardiac care unit. Management wants the application available over a WLAN. Uptime is very important because of the critical nature of the monitoring system. What should the site survey engineer be looking for that might cause a loss of communication over the WLAN? (Choose all that apply.) A. Medical equipment interference B. Safety glass containing metal mesh wire C. Patients D. Bedpans E. Elevator shafts

A. Medical equipment interference B. Safety glass containing metal mesh wire E. Elevator shafts

(12-17) Why would a WLAN network administrator consider disabling the two lowest rates on an 802.11b/g/n access point? (Choose all that apply.) A. Medium contention B. Adjacent channel interference C. Hidden node D. Intersymbol interference E. All of the above

A. Medium contention C. Hidden node

(14-9) Which of these can cause unintentional RF jamming attacks against an 802.11 wireless network? (Choose all that apply.) A. Microwave oven B. Signal generator C. 2.4 GHz cordless phones D. 900 MHz cordless phones E. Deauthentication transmitter

A. Microwave oven C. 2.4 GHz cordless phones

(18-10) Which HT protection modes allow only for the association of HT stations in the HT basic service set? (Choose all that apply.) A. Mode 0—Greenfield mode B. Mode 1—HT nonmember protection mode C. Mode 2—HT 20 MHz protection mode D. Mode 3—HT Mixed mode

A. Mode 0—Greenfield mode B. Mode 1—HT nonmember protection mode C. Mode 2—HT 20 MHz protection mode

(18-5) Name some of the factors that a modulation and coding scheme (MCS) uses to define data rates for an HT radio. (Choose all that apply.) A. Modulation method B. Equal/unequal modulation C. Number of spatial streams D. GI E. Channel size

A. Modulation method B. Equal/unequal modulation C. Number of spatial streams D. GI E. Channel size

(13-6) Paul has been hired as a consultant to secure the Levasseur Corporation's WLAN infrastructure. He has been asked to choose a solution that will both protect the company's equipment from theft and hopefully protect the access point's configuration interfaces from outside attackers. What recommendations would be appropriate? (Choose all that apply.) A. Mounting all access points in lockable enclosure units B. Using an IPsec VPN C. Configuring all access points via Telnet D. Configuring access points from the wired side using HTTPS or SSH E. Implementing 802.1X/EAP

A. Mounting all access points in lockable enclosure units D. Configuring access points from the wired side using HTTPS or SSH E. Implementing 802.1X/EAP

(15-12) The Chang Company has hired you to troubleshoot an existing legacy 802.11a/b/g WLAN. The end users are reporting having difficulties with throughput performance. What are some of the possible causes of the difficulties? (Choose all that apply.) A. Multipath interference B. Co-channel interference C. Co-location interference D. Inadequate capacity planning E. Low client device transmit power

A. Multipath interference B. Co-channel interference D. Inadequate capacity planning

(18-9) Name a capability not defined for A-MPDU. A. Multiple QoS access categories B. Independent data payload encryption C. Individual MPDUs having the same receiver address D. MPDU aggregation

A. Multiple QoS access categories

(16-13) Which of the following tools can be used in an indoor 802.11 site survey? (Choose all that apply.) A. Multiple antennas B. 902 to 928 MHz spectrum analyzer C. Client adapter D. Access point E. Floor plan map

A. Multiple antennas C. Client adapter D. Access point E. Floor plan map

(15-17) What type of hardware may be necessary when installing APs to be used for outdoor wireless coverage? (Choose all that apply.) A. NEMA enclosure B. Parabolic dish antennas C. Patch antennas D. Outdoor ruggedized core switch

A. NEMA enclosure C. Patch antennas D. Outdoor ruggedized core switch

(16-15) Savannah has to perform a site survey for a WLAN by using a multiple-channel architecture (MCA) system in a 20-story building with multiple tenants. What should Savannah consider during the planning and implementation stages of the site survey? (Choose all that apply.) A. Other tenants' WLANs should be considered. B. Only WLAN controller solutions with lightweight APs should be deployed and not autonomous access points. C. Access points should use high-gain omnidirectional antennas to provide coverage across multiple floors. D. Access points should be at full transmit power to provide coverage across multiple floors. E. The cell coverage of each access point should extend to only one floor above and one floor below to create a three-dimensional channel reuse pattern.

A. Other tenants' WLANs should be considered. E. The cell coverage of each access point should extend to only one floor above and one floor below to create a three-dimensional channel reuse pattern.

(13-8) What wireless security solutions are defined by Wi-Fi Protected Access? (Choose all that apply.) A. Passphrase authentication B. LEAP C. TKIP/RC4 D. Dynamic WEP E. CCMP/AES

A. Passphrase authentication C. TKIP/RC4

(14-11) Select two solutions that can help mitigate peer-to-peer attacks from other clients associated to the same 802.11 access point. A. Personal firewall B. Client isolation C. OSPF D. MAC filter

A. Personal firewall B. Client isolation

(16-18) What access point settings should be recorded during manual coverage analysis? (Choose all that apply.) A. Power settings B. Encryption settings C. Authentication settings D. Channel setting E. IP address

A. Power settings D. Channel setting

(15-3) Which of the following statements best describe security considerations during a wireless site survey? (Choose all that apply.) A. Questions will be asked to define the customer's security expectations. B. Wireless security recommendations will be made after the survey. C. Recommendations about wireless security policies may also be made. D. During the survey, both mutual authentication and encryption should be implemented.

A. Questions will be asked to define the customer's security expectations. B. Wireless security recommendations will be made after the survey. C. Recommendations about wireless security policies may also be made.

(15-11) The Harkins Corporation has hired you to make recommendations about a future wireless deployment that will require more than 300 access points to meet all coverage requirements. What is the most cost-efficient and practical recommendation in regard to providing electrical power to the access points? A. Recommend that the customer replace older edge switches with new switches that have inline PoE. B. Recommend that the customer replace the core switch with a new core switch that has inline PoE. C. Recommend that the customer use single-port power injectors. D. Recommend that the customer hire an electrician to install new electrical outlets.

A. Recommend that the customer replace older edge switches with new switches that have inline PoE.

(12-20) What factors should be taken into consideration when designing a channel reuse plan for 5 GHz access points? (Choose all that apply.) A. Regulatory channels permitted B. Number of VLANs permitted C. Encryption D. DFS support for the clients E. DFS support for the APs

A. Regulatory channels permitted D. DFS support for the clients E. DFS support for the APs

(16-9) Which of these measurements are taken during a passive manual site survey? (Choose all that apply.) A. SNR B. dBi C. dBm signal strength D. dBd

A. SNR C. dBm signal strength

(18-2) How can a MIMO system increase throughput at the Physical layer? (Choose all that apply.) A. Spatial multiplexing B. A-MPDU C. Transmit beamforming D. 40 MHz channels E. Dual-CTS protection

A. Spatial multiplexing C. Transmit beamforming D. 40 MHz channels

(16-7) Which of the following tools might be used in an outdoor site survey used to provide outdoor coverage? (Choose all that apply.) A. Spectrum analyzer B. Outdoor blueprints or topography map C. Mesh routers D. GPS

A. Spectrum analyzer B. Outdoor blueprints or topography map C. Mesh routers D. GPS

(14-10) Which of these tools will best detect frequency hopping rogue devices? (Choose all that apply.) A. Standalone spectrum analyzer B. Distributed spectrum analyzer C. Distributed layer 2 WIDS D. Mobile layer 2 WIDS E. Layer 2 WIPS

A. Standalone spectrum analyzer B. Distributed spectrum analyzer

(13-11) Which technologies use the RC4 cipher? (Choose all that apply.) A. Static WEP B. Dynamic WEP C. CCMP D. TKIP E. MPPE

A. Static WEP B. Dynamic WEP D. TKIP E. MPPE

(13-4) What three main components constitute an 802.1X/EAP framework? (Choose all that apply.) A. Supplicant B. Authorizer C. Authentication server D. Intentional radiator E. Authenticator

A. Supplicant C. Authentication server E. Authenticator

(13-13) For an 802.1X/EAP solution to work properly, which two components must both support the same type of EAP? (Choose all that apply.) A. Supplicant B. Authorizer C. Authenticator D. Authentication server

A. Supplicant D. Authentication server

(12-15) Which of the following can cause roaming problems? (Choose all that apply.) A. Too little cell coverage overlap B. Too much cell coverage overlap C. Free space path loss D. CSMA/CA E. Hidden node

A. Too little cell coverage overlap B. Too much cell coverage overlap

(15-5) What are some additional recommendations that can be made along with the final site survey report? (Choose all that apply.) A. Training recommendations B. Security recommendations C. Coverage recommendations D. Capacity recommendations E. Roaming recommendations

A. Training recommendations B. Security recommendations

(12-3) What variables might affect range in an 802.11 WLAN? (Choose all that apply.) A. Transmission power B. CSMA/CA C. Encryption D. Antenna gain E. Physical environment

A. Transmission power D. Antenna gain E. Physical environment

(18-8) A 3×3:2 MIMO radio can transmit and receive how many unique streams of data? A. Two. B. Three. C. Four. D. Three equal and four unequal streams. E. None—the streams are not unique data.

A. Two.

(13-7) Which security solutions may be used to segment a wireless LAN? (Choose all that apply.) A. VLAN B. WEP C. RBAC D. CCMP/AES E. TKIP/RC4

A. VLAN C. RBAC

(18-18) What frequencies are defined for 802.11n (HT) radio transmissions? (Choose all that apply.) A. 902-928 MHz B. 2.4-2.4835 GHz C. 5.15-5.25 GHz D. 5.25-5.35 MHz

B. 2.4-2.4835 GHz C. 5.15-5.25 GHz

(18-19) What PHY layer mechanism might be used to increase throughput for an HT radio in a clean RF environment with minimal reflections and low multipath? A. Maximum ratio combining B. 400-nanosecond guard interval C. Switched diversity D. Spatial multiplexing E. Spatial diversity

B. 400-nanosecond guard interval

(18-1) Thirty 2×2:2 access points have been deployed at a school where all the client devices are 1×1:1 802.11n tablets. The access points are transmitting on 20 MHz channels with the standard guard interval of 800 ns. What is the highest 802.11n data rate that can be used for communications between the APs and tablets? A. 54 Mbps B. 65 Mbps C. 72 Mbps D. 150 Mbps E. 300 Mbps

B. 65 Mbps

(13-2) Which wireless security standards and certifications call for the use of CCMP/AES encryption? (Choose all that apply.) A. WPA B. 802.11-2012 C. 802.1X D. WPA2 E. 802.11 legacy

B. 802.11-2012 D. WPA2

(13-1) Which WLAN security mechanism requires that each WLAN user have unique authentication credentials? A. WPA-Personal B. 802.1X/EAP C. Open System D. WPA2-Personal E. WPA-PSK

B. 802.1X/EAP

(13-12) What must occur to generate dynamic TKIP/RC4 or CCMP/AES encryption keys? (Choose all that apply.) A. Shared Key authentication and 4-Way Handshake B. 802.1X/EAP authentication and 4-Way Handshake C. Static WEP and 4-Way Handshake D. PSK authentication and 4-Way Handshake

B. 802.1X/EAP authentication and 4-Way Handshake D. PSK authentication and 4-Way Handshake

(12-10) What type of interference is caused by overlapping coverage cells with overlapping frequencies? A. Intersymbol interference B. Adjacent channel interference C. All-band interference D. Narrowband interference E. Co-channel interference

B. Adjacent channel interference

(12-11) Based on RSSI metrics, concentric zones of variable data rate coverage exist around an access point due to the upshifting and downshifting of client stations between data rates. What is the correct name of this process, according to the IEEE 802.11-2012 standard? A. Dynamic rate shifting B. Dynamic rate switching C. Automatic rate selection D. Adaptive rate selection E. All of the above

B. Dynamic rate switching

(12-7) What are some of the negative effects of layer 2 retransmissions? (Choose all that apply.) A. Decreased range B. Excessive MAC sublayer overhead C. Decreased latency D. Increased latency E. Jitter

B. Excessive MAC sublayer overhead D. Increased latency E. Jitter

(14-1) Which of these attacks are considered denial-of-service attacks? (Choose all that apply.) A. Man-in-the-middle B. Jamming C. Deauthentication spoofing D. MAC spoofing E. Peer-to-peer

B. Jamming C. Deauthentication spoofing

(15-7) What roaming issues should be discussed during an interview for a future VoWiFi network? (Choose all that apply.) A. Layer 2 boundaries B. Layer 3 boundaries C. Layer 4 boundaries D. Latency E. Throughput

B. Layer 3 boundaries D. Latency

(12-5) Layer 2 retransmissions occur when frames become corrupted. What are some of the causes of layer 2 retries? (Choose all that apply.) A. High SNR B. Low SNR C. Co-channel interference D. RF interference E. Adjacent channel interference

B. Low SNR D. RF interference E. Adjacent channel interference

(12-4) What can be done to fix the hidden node problem? (Choose all that apply.) A. Increase the power on the access point. B. Move the hidden node station. C. Increase power on all client stations. D. Remove the obstacle. E. Decrease power on the hidden node station.

B. Move the hidden node station. C. Increase power on all client stations. D. Remove the obstacle.

(16-12) Name potential sources of interference that might be found during a 2.4 GHz site survey. (Choose all that apply.) A. Toaster oven B. Nearby 802.11 FHSS access point C. Plasma cutter D. Bluetooth headset E. 2.4 GHz video camera

B. Nearby 802.11 FHSS access point C. Plasma cutter D. Bluetooth headset E. 2.4 GHz video camera

(16-19) Which type of manual coverage analysis does not require a radio card to be associated to an access point? A. Associated B. Passive C. Predictive D. Assisted E. Active

B. Passive

(18-14) How does transmit beamforming (TxBF) use multiple MIMO antennas to increase range? A. Beamsteering B. Phase shifting C. Dynamic beamforming D. Spatial multiplexing

B. Phase shifting

(16-17) Jane Barrett is installing a controller-based wireless network that uses both software and hardware to monitor and dynamically change the power and channel settings of the APs. This technology is known as what? (Choose all that apply.) A. Dynamic rate selection (DRS) B. Radio resource management (RRM) C. Adaptive radio configuration (ARC) D. Self-organizing wireless LAN

B. Radio resource management (RRM) D. Self-organizing wireless LAN

(13-9) Name the three main components of a role-based access control solution. A. EAP B. Roles C. Encryption D. Permissions E. Users

B. Roles D. Permissions E. Users

(14-17) MAC filters are typically considered to be a weak security implementation because of what type of attack? A. Spamming B. Spoofing C. Phishing D. Cracking E. Eavesdropping

B. Spoofing

(18-11) Which of these capabilities are considered mandatory for an 802.11n access point as defined by the Wi-Fi Alliance's vendor certification program called Wi-Fi CERTIFIED n? (Choose all that apply.) A. Three spatial streams in receive mode B. WPA/WPA2 C. WMM D. Two spatial streams in transmit mode E. 2.4 GHz-40 MHz channels

B. WPA/WPA2 C. WMM D. Two spatial streams in transmit mode

(13-17) CCMP encryption uses which AES key size? A. 192 bits B. 64 bits C. 256 bits D. 128 bits

D. 128 bits

(15-20) The WonderPuppy Coffee Company has hired you to make recommendations about deploying wireless hotspots inside 500 coffee shops across the country. What solutions might you recommend? (Choose all that apply.) A. WPA2-Personal security solution B. 802.11 a/b/g/n access points at 100 mW transmit power C. 802.11a/b/g/n access points at 1 to 5 mW transmit power D. NEMA enclosures E. Captive portal authentication F. 802.1X/EAP security solution

C. 802.11a/b/g/n access points at 1 to 5 mW transmit power E. Captive portal authentication

(16-10) Which of the following tools is not necessary for an outdoor bridging site survey? A. Inclinometer B. Digital camera C. Blueprints D. Spectrum analyzer E. GPS

C. Blueprints

(15-4) The ACME Corporation has hired you to design a wireless network that will have data clients, VoWiFi phones, and access for guest users. The company wants the strongest security solution possible for the data clients and phones. Which design best fits the customer's requirements?

C. Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three distinct VLANs. Use an 802.1X/EAP authentication with CCMP/AES encryption for security in the data VLAN. Use WPA2-Personal in the voice VLAN. The guest VLAN traffic will require a captive web portal and guest firewall policy for security.

(15-18) What is a telecommunications unit of measurement of traffic equal to 1 hour of telephone traffic in 1 hour of time? A. Ohm B. dBm C. Erlang D. Call hour E. Voltage Standing Wave Ratio

C. Erlang

(13-20) Which layer 2 protocol is used for authentication in an 802.1X framework? A. Extensible Authorization Protocol B. Extended Authentication Protocol C. Extensible Authentication Protocol D. CHAP/PPP E. Open System

C. Extensible Authentication Protocol

(18-15) Which HT PPDU formats support both 20 MHz and 40 MHz channels? (Choose all that apply.) A. Non-HT legacy format B. PCO mode C. HT Mixed format D. HT Greenfield format

C. HT Mixed format D. HT Greenfield format

(14-4) Which of these attacks can be mitigated with a mutual authentication solution? (Choose all that apply.) A. Malicious eavesdropping B. Deauthentication C. Man-in-the-middle D. Wireless hijacking E. Authentication flood

C. Man-in-the-middle D. Wireless hijacking

(16-3) Name the major types of coverage analysis site surveys. (Choose all that apply.) A. Assisted B. Self-organizing C. Manual D. Capacity E. Predictive

C. Manual E. Predictive

(18-17) What 802.11n mode of operation sends the same data on two adjacent 20 MHz channels? A. Greenfield mode B. HT Mixed mode C. Non-HT duplicate mode D. LDPC mode

C. Non-HT duplicate mode

(16-20) Which type of site survey uses modeling algorithms and attenuation values to create visual models of RF coverage cells? A. Associated B. Passive C. Predictive D. Assisted E. Active

C. Predictive

(14-2) Which of these attacks would be considered malicious eavesdropping? (Choose all that apply.) A. NetStumbler B. Peer-to-peer C. Protocol analyzer capture D. Packet reconstruction E. PS polling attack

C. Protocol analyzer capture D. Packet reconstruction

(18-7) Transmit beamforming uses what type of frames to analyze the MIMO channel before transmitting directed paths of data? A. Trigger frames B. Beaming frames C. Sounding frames D. SM power save action frames

C. Sounding frames

(18-12) MIMO radios use which mechanisms for transmit diversity? (Choose all that apply.) A. Maximum ratio combining (MRC) B. Spatial multiplexing (SM) C. Space-time block coding (STBC) D. Cyclic shift diversity (CSD) E. Multiple traffic ID block acknowledgment (MTBA)

C. Space-time block coding (STBC) D. Cyclic shift diversity (CSD)

(14-12) What type of solution can be used to perform countermeasures against a rogue access point? A. WIDS B. 802.1X/EAP C. WIPS D. TKIP/RC4 E. WINS

C. WIPS

(13-14) When you're using an 802.11 wireless controller solution, which device would be usually function as the authenticator? A. Access point B. LDAP server C. WLAN controller D. RADIUS server

C. WLAN controller

(15-1) You have been hired by the XYZ Company for a wireless site survey. Which statements best describe site survey best practices when choosing vendor equipment to be used during the survey? (Choose two answers.) A. When conducting a wireless site survey with a WLAN switch, you should use both standalone and contoller-based access points. B. When conducting a wireless site survey with standalone access points, you should use different vendors' APs together. C. When conducting a wireless site survey with a WLAN controller, you should use the controller-based access points from the same vendor. D. When conducting a wireless site survey with standalone access points, you should use standalone access points from the same vendor. E. When a wireless site survey is conducted, proprietary security solutions are often implemented.

C. When conducting a wireless site survey with a WLAN controller, you should use the controller-based access points from the same vendor. D. When conducting a wireless site survey with standalone access points, you should use standalone access points from the same vendor.

(12-14) Given: Wi-Fi clients can roam seamlessly at layer 2 if all the APs are configured with the same SSID and same security settings. However, if clients cross layer 3 boundaries, a layer 3 roaming solution will be needed. Which device functions as the home agent if a Mobile IP solution has been implemented in an enterprise WLAN environment where no WLAN controller is deployed? A. Wireless network management server (WNMS) B. Access layer switch C. Layer 3 switch D. Access point on the original subnet E. Access point on the new subnet

D. Access point on the original subnet

(16-14) Brandon Burmeister is a site survey engineer who is planning to deploy a wireless controller solution with dual-radio, dual-frequency lightweight access points. The employees will be assigned to the 5 GHz network, and the guest users will be assigned to the 2.4 GHz network. CCMP/AES encryption will be required for the employees, while the guest users will use only static WPA-PSK. Name the best possible choice that Brandon has for coverage analysis. (Choose the best answer.)

D. Conduct manual coverage analysis for the 5 GHz network first and then conduct manual coverage analysis for the 2.4 GHz network based on the AP placement of the 5 GHz APs.

(14-3) Which of these attacks will not be detected by a wireless intrusion detection system (WIDS)? A. Deauthentication spoofing B. MAC spoofing C. Rogue access point D. Eavesdropping with a protocol analyzer E. Association flood

D. Eavesdropping with a protocol analyzer

(14-20) What is another name for a wireless hijacking attack? A. Wi-Fi phishing B. Man-in-the-middle C. Fake AP D. Evil twin E. AirSpy

D. Evil twin

(12-9) A single user is complaining that her VoWiFi phone has choppy audio. The WLAN administrator notices that the user's MAC address has a retry rate of 25 percent when observed with a protocol analyzer. However, all the other users have a retry rate of about 5 percent when also observed with the protocol analyzer. What is the most likely cause of this problem? A. Near/far B. Multipath C. Co-channel interference D. Hidden node E. Low SNR

D. Hidden node

(18-3) Which new power-management method defined by the 802.11n amendment conserves power by powering down all but one radio? A. A-MPDU B. Power Save protection C. PSMP D. SM power save E. PS mode

D. SM power save

(13-3) 128-bit WEP encryption uses a user-provided static key of what size? A. 104 bytes B. 64 bits C. 124 bits D. 128 bits E. 104 bits

E. 104 bits

(16-5) Which type of coverage analysis requires a radio card to be associated to an access point? A. Associated B. Passive C. Predictive D. Assisted E. Active

E. Active

(12-12) Which of these weather conditions is a concern when deploying a long-distance point-to-point bridge link? A. Wind B. Rain C. Fog D. Changes in air temperature E. All of the above

E. All of the above

(15-14) During the interview process, which topics will be discussed so that the WLAN will integrate properly into the existing wired architecture? A. PoE B. Segmentation C. User management D. Infrastructure management E. All of the above

E. All of the above (PoE, Segmentation, User management, Infrastructure management)

(12-13) What variables might affect range in an 802.11 WLAN? A. Wavelength B. Free space path loss C. Brick walls D. Trees E. All of the above

E. All of the above (Wavelength, Free space path loss, Brick walls, Trees)

(13-19) What encryption method does the IEEE 802.11-2012 standard mandate for robust security network associations and what method is optional? A. WEP, AES B. IPsec, AES C. MPPE, TKIP D. TKIP, WEP E. CCMP, TKIP

E. CCMP, TKIP

(12-2) If the access points transmit on the same frequency channel in an MCA architecture, what type of interference is caused by overlapping coverage cells? A. Intersymbol interference B. Adjacent channel interference C. All-band interference D. Narrowband interference E. Co-channel interference

E. Co-channel interference

(18-4) The guard interval is used as a buffer to compensate for what type of interference? A. Co-channel interference B. Adjacent cell interference C. RF interference D. HT interference E. Intersymbol interference

E. Intersymbol interference

(12-8) Several users are complaining that their VoWiFi phones keep losing connectivity. The WLAN administrator notices that the frame transmissions of the VoWiFi phones are corrupted when listened to with a protocol analyzer near the access point but are not corrupted when listened to with the protocol analyzer near the VoWiFi phone. What is the most likely cause of this problem? A. RF interference B. Multipath C. Hidden node D. Adjacent channel interference E. Mismatched power settings

E. Mismatched power settings


Ensembles d'études connexes

Prevention and care of sports injury- chapter quizzes

View Set

Environmental Science - Soil and Water Pollution

View Set

Ch 29 Care of Patients with Noninfectious Upper Respiratory Problems

View Set

ACTIVATE_12 Project Manager Mock Exam Questions [Full]

View Set

NCLEX Review Med Surg Renal & Urinary

View Set

Chapter 26: Transferability and Holder in Due Course

View Set

NSG 1000: Patient Safety and Medical Errors (Week 11)

View Set

Interpersonal Messages Chapter 1

View Set