Ch9: wireless Networks

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

802.11g and 802.11b

After installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? (Select two.)

Hub

An access point that conforms to the IEEE 802.11ac standard handles network traffic similarly to which other networking device?

To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: • Non-overlapping • Low utilization • Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results, which channel should you configure your wireless AP to use?

Channel 1

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)

Check the MAC addresses of devices connected to your wired switch Conduct a site survey

You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but you cannot see your network. What should you do?

Configure a profile on the wireless client.

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)

Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is most likely to restore internet connectivity?

Configure the SOHO router for NAT

A technician is installing a SOHO routèr at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal?

Enable content filtering

An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page that asks them to enter the WPA2 passphrase. When they do, she uses the password to connect a wireless client to the real access point. Which attack techniques did the attacker use in this scenario? (Select two.)

Evil twin Pharming

You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antennae should you use on each side of the link? (Select two.)

High-gain Directional

Match each type of access point on the left with the wireless network architecture where it is commonly used on the right. Each type of access point may be used once, more than once, or not at all.

Independent access point infrastructure/ Intelligent AP Hub-and-spoke infrastructure/ Lightweight AP Distributed wireless mesh infrastructure/ Intelligent AP

Uses a narrow frequency band and hops data signals in a predictable sequence: FHSS Breaks data into pieces and sends the pieces across multiple frequencies in a defined range: DSSS breaks data into very small data streams in order to send the information across long distances: OFDM

Match each wireless signaling method on the left with its definition on the right. (Not all of the signaling methods match a definition.)

Match each wireless networking term or concept on the left with the appropriate description on the right. Each term may be used once, more than once, or not at all.

Moving a wireless device between access points within the same wireless network. o Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN. o LWAPP Specifies the number of clients that utilize the wireless network. o Device density Automatically partitions a single broadcast domain into multiple VLANs. o VLAN pooling Connects two wired networks over a Wi-Fi network -Wireless bridge The number of useful bits delivered from sender to receiver within a specified amount of time. -Goodput

You are an administrator of a growing network. The network you have created is broadcasting, but you cannot ping systems on different segments of your network. Which device should you use to fix this issue?

Network bridge

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points?

Same SSID, different channel

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2 Explanation Wi-Fi Protected Access 2 (WPA2) is currently the most secure wireless security specification. WPA2 includes specifications for both encryption and authentication. WPA was an earlier implementation of security specified by the 802.11i committee. WEP was the original security method for wireless networks. WPA is more secure than WEP, but less secure than WPA2. Kerberos is an authentication method, not a wireless security method.

Combines two non-overlapping channels into a single channel, resulting in slightly more than double the bandwidth

What is Channel bonding?

802.11

Which IEEE standard describes wireless communication?

802.11g and 802.11a

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

BSSID

Which of the following allows devices to find a specific access point within an extended service set that has multiple access points?

- 2.4 GHZ 5.75 GHZ

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)

DS

Which of the following is the backbone or local area network that connects multiple access points (and basic service sets) together?

Groups wireless devices together into the same logical network.

Which of the following is true of a wireless network SSID?

Reader/writer Peer-to-peer Card Emulation

Which of the following modes are used for Near Field Communications? (Select three.)

Place access points above where most clients are.

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Eight MIMO radio streams 160 MHz bonded channels

Which technologles are used by the 802.11ac standard to increase network bandwidth? (Select two.)

SSID (Service Set Identifier)

You have physically added a wireless access point to your network and Installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have concluded that you must manually configure the wireless access point(AP). Which of the following values uniquely identifies the network AP?

On the top floor

You need to place a wireless access point in your two-story building. While trying to avoid interference, which of the following is the best location for the access point?

The wireless TV system

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz. A wireless phone system running at 5.8 GHz. • A wireless phone system running at 900 MHz. An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. • An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range. Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

Implement antenna diversity.

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet • Security: WPA2-PSK using AES Frequency: 5.75 GHZ Bandwidth per channel: 40 MHZ Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?

Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?

Z-Wave

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)

1) Near backup generators 2) Near cordless phones

For home or small business implementations, you typically use a consumer-grade access point that combines many functions into a single device. What is the maximum number of clients that can be supported at a time?

5-10 wireless clients

Which of the following specifications identifies security that can be added to wireless networks? (Select,two.)

802.11i 802.1x

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?

802.11n

Which of the following best describes a site survey?

A process of planning and designing a wireless network.

Which of the following should you include in your site survey test equipment? (Select two.)

A spectrum analyzer A tall ladder

Which of the following best describe a spectrum analyzer?

A tool used to determine the noise floor in the desired frequency range.

The user is out of the effective range of the wireless access point on her floor.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The client system has moved too far away from the access point.

A user on your network has moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

Which of the following best describes a hub-and-spoke infrastructure deployment model?

A wireless controller is connected to all access points through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).

Which of the following is considered the strongest encryption method?

AES

You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)

AES Preshared key SSID

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)

AES encryption 802.1x

CSMA/CA

All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when ne person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is most likely to improve VolP performance?

Change QoS settings to give VolP traffic more priority.

A technician is installing a new SOHO wireless router. Which of the following is the first thing the technician should do to secure the router?

Change the router's default password

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take next?

Check for and apply firmware updates.

You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

Decrease the beacon interval.

Which of the following measures makes your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic?

Distributed wireless mesh infrastructure

Your wireless network consists of multiple 802.11n access points that are configured as follows: • SSID (hidden): CorpNet Security: WPA2-PSK using AES › Frequency: 5.7 GHZ • Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do?

Double the bandwidth assigned per channel to 40 MHZ.

A technician is installing a new SOHO wireless router in a home office, The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?

Enable MAC filtering

23

How many total channels are available for 802.11a wireless networks?

What purposes does a wireless site survey fulfill? (Select two.)

Identify existing or potential sources of interference. Identify the coverage area and preferred placement of access points.

Which enterprise deployment has limited mobility and is difficult to manage?

Independent Access Points

Line of sight Diffuse

Infrared operates in which of the following modes? (Select two.)

DS

Which wireless networking component is used to connect multiple APs together?

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

Match each wireless device on the left with its corresponding characteristics on the right. Each device may be used once, more than once, or not at all.

Manages all of the APs that are connected to it. /-Wireless controller Supports 30 to 50 wireless clients per access point. /-Wireless controller Provides NAT routing and an Ethernet switch in one device. /-Consumer-grade (SOHO) wireless router Supports a maxiumum of 5-10 wireless clients. /-Consumer-grade (SOHO) wireless router Pushes wireless configuration settings to connected access points. /-Wireless controller

You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals even throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern?

Omni-directional

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue access point

Which of the following is used on a wireless network to identify the network name?

SSID

Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?

SSID broadcast

You have a small wireless network that uses multiple access points. The network uses WA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)

TKIP encryption Preshared key

Use a different channel ID

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

What is a lightweight access point used for?

To route frames between the wireless and wired networks.

To enable roaming, network administrators have to configure all access points in the network to comply with which of the following criteria? (Select three.)

To use the same channel. To function on the same IP subnet. To have the same SSID.

Which of the following are features of Hotspot 2.0? (Select two.)

Uses WPA2 Enterprise for authentication and encryption. Is enabled by default on Windows 10.

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Which of the following is true when the DHCP setting is disabled in a wireless network?

Wireless clients must use a static IP address within the correct IP address range to connect to the network

802.11

You are designing a wireless network for a client. Your client would like to implement the highest speed possible. Which 802.11 standard will work best in this situation?

What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?

near the window

Replace the omni-directional antenna with a directional antenna

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?

802.11b, Bluetooth

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

802.11ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a frequency range of 5 GHz and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

overlapping channels

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings remain configured to the default with the exception of SSIDs. Which of the following might you suspect as the cause of the connectivity problems?

Mismatch SSID

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptop's wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem?

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

radius

As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as?

roaming


संबंधित स्टडी सेट्स

Bio 191 exam 3 homework problems

View Set

Market Motive Email Marketing Practitioner

View Set

The seven articles of the US constitution

View Set

Greek Magic Part 2: Electric Boogaloo

View Set

Level F, Unit 8 Synonyms/Antonyms

View Set

Nursing Malpractice and Negligence Presentations

View Set

Unit 7: Industrial and Economic Development

View Set