Windows- Wireless Network & wireless security 6.5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps. The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps. The IEEE 802.11a standard defines wireless transmission rates up to 54 Mbps. The IEEE 802.11n standard defines wireless transmission rates up to 100 Mbps. References

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards can be used in this situation? (Select two.)

802.11n 802.11a 802.11a and 802.11n are both possible choices for this client. Both standards operate at 54 Mbps or higher (802.11n operates at 100 Mbps). Both standards also operate in the 5 GHz frequency range, which won't interfere with the phone system. (802.11n can be configured to operate in either the 2.4 GHz or the 5 GHz frequency ranges as needed.)

Which of the following wireless network methods make it easy for clients to find and connect to the wireless network?

802.1x SSID broadcast Shared secret key Each access point has a Service Set ID (SSID), which identifies the wireless network. By default, access points broadcast the SSID to announce their presence and make it easy for clients to find and connect to the wireless network.

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled. Which type of authentication method and encryption combination should you use for the strongest security possible?

A pre-shared key and AES encryption To connect to the wireless network using WPA2-Personal, you need to use a pre-shared key for authentication. AES encryption is supported by WPA2 and is the strongest encryption method.

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)

AES Pre-shared key SSID WPA2-Personal uses a shared key for authentication. Once authenticated, dynamic keys are generated to be used for encryption. WPA2 supports AES and TKIP encryption. AES is the stronger encryption method of the two. With the SSID broadcast turned off, you need to manually configure the SSID on the client. Uses Advanced Encryption Standard (AES) with a 128-bit key and a 48-bit initialization vector for encryption. It is more secure than TKIP.

Which of the following measures will make your wireless network invisible to the casual attacker?

Disable the SSID broadcast

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS 802.1x authentication uses user names and passwords, certificates, or devices such as smart cards to authenticate wireless clients. 802.1x authentication requires the following components: A RADIUS server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information. A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate.

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2 WPA2 includes specifications for both encryption and authentication.

You use a Windows notebook system that is a member of the domain on your network at work. You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a username and password for authentication using AES encryption. Which type of security standard should you use while configuring the connection?

WPA2-Enterprise Select the WPA2-Enterprise security standard for the wireless connection. WPA2 is required to support AES encryption. An Enterprise configuration (using either WPA or WPA2) authenticates using usernames, passwords, and 802.1x authentication. A RADIUS server is required for using 802.1x.


Ensembles d'études connexes

ECON chpt 3 practice test, Microeconomics Production and Cost, Chpt 4, ECON 101 Test 2, ECON chpt 3 practice test, ECON 202 CH. 9, Econ Q 6/7, MicroEconomics, MICRO ALL CHAPTERS

View Set

MKTG 409 Exam 3 (Chp 16,17,18,10)

View Set

Evaluating Mental and Emotional Health | Practice

View Set