Testout Chapter 9 Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which wireless networking component is used to connect multiple APs together? WDS BSS STA IBSS

WDS

How many total channels are available for 802.11g wireless networks? 3 11 12 23 54

11

How many total channels (non-overlapping) are available for 802.11a wireless networks? 3 11 12 24 54

24

Listen to exam instructions You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standard works best in this situation? 802.11n 802.11a 802.11b 802.11g

802.11n

Which network modes can typically be used for both 2.4 GHz and 5 GHz clients? (Select two.) 802.11g only 802.11b only 802.11ax only 802-11a only 802.11n only

802.11n only 802.11ax only

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components should be part of your design? (Select two.) AES encryption WEP encryption TKIP encryption Open authentication 802.1x Pre-shared keys

802.1x AES encryption

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You're sure that your laptop's wireless adapter works because you use a wireless connection at work. What is the MOST likely cause of the problem? Incorrectly configured PPP An out-of-range WAP Different LAN protocols A mismatched SSID

A mismatched SSID

Listen to exam instructions Which of the following should you include in your site survey kit? A tall ladder A network bridge A GPS Mounting brackets

A tall ladder

Which of the following uses a 2.4 GHz ISM band, has fast transmission rates, and has been used for applications like geocaching and health monitors? 802.11ac Z-Wave NFC Ant+

Ant+

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.) 802.11a Bluetooth Infrared 802.11b 802.3a

Bluetooth 802.11b

Listen to exam instructions Which type of communication path-sharing technology do all 802.11 standards for wireless networking support? Token passing Polling CSMA/CA CSMA/CD

CSMA/CA

Match each wireless term or concept on the left with its associated description on the right. Each term may be used more than once. (Not all descriptions have a matching term.) Drag Recived singal level Signal-to-noise ratio Spectrum analysis. Drop Compares the Wi-Fi signal level to the level of background radio signals. Checks channel utilization and identifies sources of RF inference. Identifies how strong a radio signal is at the receiver.

Compares the Wi-Fi signal level to the level of background radio signals. Signal-to-noise ratio Checks channel utilization and identifies sources of RF inference. Spectrum analysis Identifies how strong a radio signal is at the receiver. Recived singal level

You are concerned that wireless access points might have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.) Implement an intrusion detection system (IDS). Check the MAC addresses of devices that are connected to your wired switch. Implement a network access control (NAC) solution. Implement an intrusion prevention system (IPS). Conduct a site survey.

Conduct a site survey. Check the MAC addresses of devices that are connected to your wired switch.

You have configured a wireless access point to create a small network. For security reasons, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do? Configure a profile on the wireless client. Set the channel on the client to match the channel used by the access point. Enable the wireless card on the client. Decrease the beacon interval on the access point.

Configure a profile on the wireless client manually

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do? Configure the connection to use 802.1x authentication and TKIP encryption. Configure the connection with a pre-shared key and AES encryption. Configure the connection to use 802.1x authentication and AES encryption. Configure the connection with a pre-shared key and TKIP encryption.

Configure the connection with a pre-shared key and AES encryption.

Which of the following can become a critical point of failure in a large wireless network infrastructure? Access point Wireless bridge Backhaul Controller

Controller

Which of the following usually provides DHCP services to dynamically assign IP addressing information to wireless clients and connect the wireless network to the internal wired network and the internet? Controllers Access points Bridges Backhauls

Controllers

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving? Use a form of authentication other than open authentication. Implement WPA2 Personal. Disable SSID broadcast. Change the default SSID.

Disable SSID broadcast.

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic? Hub-and-spoke infrastructure Lightweight access point (LWAP) with wireless controller infrastructure Distributed wireless mesh infrastructure Independent access points

Distributed wireless mesh infrastructure

Which of the following features are supplied by WPA2 on a wireless network? A centralized access point for clients Traffic filtering based on packet characteristics Client connection refusals based on MAC address Encryption

Encryption

Which of the following features does WPA2 supply on a wireless network? Client-connection refusal based on MAC address Encryption Centralized access points for clients Network identification

Encryption

Which of the following is true of a wireless network SSID? Coordinates all communications between wireless devices. Groups wireless devices together into the same logical network. Is a 48-bit value that identifies an AP. Enables wireless interconnection of multiple APs.

Groups wireless devices together into the same logical network.

Which of the following is a configuration in which a wireless controller is connected to all APs through a wired link? Bridges Independent APs Mesh infrastructure Hub and spoke

Hub and spoke

Which of the following purposes do wireless site surveys fulfill? (Select two.) Identify the recommended 100 degree separation angle for alternating access points. Determine the amount of bandwidth required in various locations. Identify the coverage area and preferred placement of access points. Identify existing or potential sources of interference. Document existing infrared traffic in the 5.4 GHz spectrum.

Identify the coverage area and preferred placement of access points. Identify existing or potential sources of interference.

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do? Implement a captive portal. Implement MAC address filtering. Implement 802.1x authentication using a RADIUS server. Implement pre-shared key authentication.

Implement a captive portal.

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of your facility's unique construction, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do? Install directional access points. Reduce the power of the access point radio signals. Implement antenna diversity. Switch to RADIUS authentication for wireless clients.

Implement antenna diversity.

You're replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.) Use open authentication with MAC address filtering. Install a RADIUS server and use 802.1x authentication. Configure devices to run in ad hoc mode. Use shared secret authentication. Configure devices to run in infrastructure mode.

Install a RADIUS server and use 802.1x authentication. Configure devices to run in infrastructure mode.

Listen to exam instructions You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.) Where can network hardware be mounted in the building? How many devices will need to be supported? What are the zoning and permit requirements? Is there future construction that might affect or disrupt the RF signals? Which type of data will be transmitted on the network? Are there microwaves or cordless phones that can cause interference? Is the size of the business expected to grow in the future?

Is the size of the business expected to grow in the future? Which type of data will be transmitted on the network? How many devices will need to be supported?

Which of the following is a limitation of consumer-grade wireless equipment? It makes the transmitted bandwidth signal wider than the data stream needs. It supports a maximum of 5-10 wireless clients at a time. It operates on 5 GHz channels at 20 MHz wide. APs can quickly re-associate themselves with a different wireless controller.

It supports a maximum of 5-10 wireless clients at a time.

Which of the following do switches and wireless access points use to control access through a device? Session filtering MAC address filtering IP address filtering Port number filtering

MAC address filtering

Listen to exam instructions Which of the following does an SNR higher than 1:1 indicate? No noise More noise than signal More signal than noise No signal

More signal than noise

Match the wireless networking term or concept on the left with its appropriate description on the right. (Each term may be used once, more than once, or not at all.) Drag: Device Density Roaming LWAPP VLAN pooling Wireless bridge Goodput Drop: Moving a wireless device between access points within the same wireless network. Used by Cisco wireless equiopment to route frames back and forth between the wireless network and the wired LAN. Specifies the number of clients that can utilize the wireless network. Automatically partitions a single broadcast domain into multiple VLANs. Connects two wired networks over a Wi-Fi network. The number of useful bits delivered from sender to receiver within a specified amount of time.

Moving a wireless device between access points within the same wireless network. Roaming Used by Cisco wireless equiopment to route frames back and forth between the wireless network and the wired LAN. LWAPP Specifies the number of clients that can utilize the wireless network. Device density Automatically partitions a single broadcast domain into multiple VLANs. VLAN pooling Connects two wired networks over a Wi-Fi network. Wireless bridge The number of useful bits delivered from sender to receiver within a specified amount of time. Goodput

Which of the following functions does a consumer-grade access point combine into a single device? (Select two.) SSID NAT WPA AES WAP

NAT WAP

Which of the following locations creates the greatest amount of interference for a wireless access point? (Select two.) Near DCHP servers Near backup generators In the top floor of a two-story building Near a geofence Near cordless phones

Near backup generators Near cordless phones

You are an administrator of a growing network. You notice that the network you've created is broadcasting, but you can't ping systems on different segments. Which device should you use to fix this issue? Range extender Network hub Access point Network bridge

Network bridge

You're setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern? Multi-directional Uni-directional Omni-directional Directional

Omni-directional

You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process? On the wireless access point and each wireless device. On a certificate authority (CA). On the wireless access point. On a RADIUS server.

On a RADIUS server.

You need to place a wireless access point in your two-story building while avoiding interference. Which of the following is the best location for the access point? On the top floor In the basement Near the backup generators In the kitchen area

On the top floor

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? Place multiple access points in the same area. Place access points above where most clients are. Place access points near outside walls. Place access points in the basement.

Place access points above where most clients are.

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters do you need to configure on the laptop? (Select two.) Channel BSSID AES encryption Pre-shared key TKIP encryption

Pre-shared key TKIP encryption

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with it. Which of the following strategies could you try to increase signal strength? Replace the omni-directional antenna with a directional antenna. Increase the RF power on the isotropic antenna. Increase the RF setting on the client system. Replace the directional antenna with an omni-directional antenna.

Replace the omni-directional antenna with a directional antenna.

Your manager has asked you to set up four independent APs and configure them with the same SSID, channel, and IP subnet. What should you enable to accomplish this? A spectrum analyzer Channel bonding Roaming A basic service set

Roaming

Your company security policy states that wireless networks are not to be used because of the potential security risk they present. One day you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this? On-path attack Physical security Phishing Rogue access point Social engineering

Rogue access point

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the MOST likely cause of her connectivity problem? The user has not yet rebooted her laptop computer while at her new location. The user needs a new IP address because she is working on a different floor. The user is out of the effective range of the wireless access point. The user has not yet logged off and back on to the network while at her new location. The wireless network access point on the user's normal floor has failed.

The user is out of the effective range of the wireless access point.

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network, and you've come to the conclusion that you must manually configure the wireless access point (WAP). Which of the following values uniquely identifies the WAP? SSID Frequency Channel WEP

SSID

Which of the following wireless network protection methods prevents the wireless network name from being broadcast? MAC filtering 802.1x SSID broadcast Shared secret key

SSID broadcast

Which of the following BEST describes roaming? The name of the wireless network that is broadcasted from an AP. A model that connects wired and/or wireless networks. The ability to broadcast the same SSID across multiple APs. A deployment model used by newer wireless networks.

The ability to broadcast the same SSID across multiple APs.

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem? The client system has moved too far away from the access point. The encryption level has been erroneously set back to the default setting. An SSID mismatch between the client and the server. The client has incorrect WEP settings. An SSID mismatch between the client and the WAP.

The client system has moved too far away from the access point.

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults. Which of the following might you suspect is the cause of the connectivity problems? There is crosstalk between the RF signals. The two client systems' SSIDs match. The two server systems' SSIDs match. There are overlapping channels. There is WEP overlap.

There are overlapping channels.

Which of the following wireless security methods uses a common shared key that's configured on the wireless access point and all wireless clients? WPA Personal and WPA2 Enterprise WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise WPA Enterprise and WPA2 Enterprise WEP, WPA Personal, and WPA2 Personal

WEP, WPA Personal, and WPA2 Personal

Which of the following provides security for wireless networks? CSMA/CD WPA 802.11a WAP

WPA

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? WEP WPA Kerberos WPA2

WPA2

Which of the following connects wired or wireless networks together? Wireless bridge Hub and spoke Wireless mesh Wireless router

Wireless bridge

Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate? Z-Wave 802.11ac NFC Ant+

Z-Wave


Ensembles d'études connexes

Human Anatomy & Physiology Ch#4 Q&A

View Set

Week 24: Teaching & Learning (Chapter 25)

View Set

Part 2: Summarizing Central Ideas about Elizabethan England

View Set

GEO Chapters 1 & Chapter 2 - Minerals & The Rock Cycle = Metamorphic, Igneous and Sedimentary Rocks.

View Set

AP Government: Landmark Supreme Court Cases long version

View Set