Chapter 10 of TestOut 10.4 - 10.7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? (Select two)

1) 802.11a 2) 802.11n

After installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? (Select two)

1) 802.11g 2) 802.11b

You need to configure a wireless network. You want to use WPA2 enterprises. Which of the following components will be part of your design? (select two)

1) 802.1x 2) AES encryption

Which of the following protocols or mechanisms is used to provide security on a wireless network? (select three)

1) 802.1x 2) WPA 3) IPsec

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones usd in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (select two)

1) Bluetooth 2) 802.11b

You are the wireless network administration for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (select two. Each response is a part of the complete solution)

1) Configure all wireless access points without client certificates 2) Configure the RADIUS server with a server certificate

You need to implement a wireless network between two buildings on a college campus. A wired network has already been implemented within each building. the buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (select two)

1) High-gain 2) Directional

Which of the following provides security for wireless networks?

WPA

An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using airsnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she she presets them with a web page asking thm to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. What attack techniques did the attack us? select two

1) Pharming 2) Evil twin

You want to connect your client computer to a wireless access point connected to your wired network air work. The network Admin tells you that the access point is configured to use WPA2 personal with the strongest encryption method possible. SSID broadcast is ruined off. Which of the following must you configure manually on the client. select three

1) SSID 2) Preshared key 3) AES

What purpose does a wireless site survey fulfill?(Choose two.)

1) To identify existing or potential sources of interference 2) to identify the coverage area and preferred placement of access points

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three)

1) What type of data will be transmitted on the network? 2) How many devices will need to be supported? 3) Is the size of the business expected to grow in the future?

example of mobile devices below (select two)

1) set the access point B to use 802.11n wireless networking 2) set the channel used by access point B to 11

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?

802.11n

You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible The floor plan of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. Each antenna type can be used once, more than once, or not at all

A Directional B Directional C Omni-directional D Directional E Directional F Directional G Directional

Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200 m apart, as shown below. The objectives of the implementation are as follows: • Create a secure wireless network whose signal doesn't emanate beyond each office space by implementing access points in locations A-D in each building. • Connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F. Drag the antenna type from the list on the left to the appropriate location on the right. Each antenna type can be used more than once or not at all.

A Normal gain directional antenna aimed east B Normal gain directional antenna aimed south C Normal gain directional antenna aimed north D Normal gain directional antenna aimed west E High-gain directional antenna aimed east F High-gain directional antenna aimed west

You are building a wireless network within and between two buildings. The buildings are separated by more than 3000 feet. The wireless network should meet the following requirements:

Building 1 - Location A Right-facing directional antenna WPA2 with CCMP Building 1 - Location B Omni-directional antenna WPA2 with CCMP Building 1 - Location C Left-facing directional antenna WPA2 with CCMP Building 1 - Location D Right-facing high gain directional antena WPA2 with CCMP Building 2 - Location A Omni-directional antenna WEP with open authentication Building 2 - Location B Left-facing high-gain directional antenna WPA2 with CCMP

LAB: secure an enterprise wireless network You are a network techniciaon for a small corperate network. You need to increase the security of your wireless ntworl. Your new wireless controller provides several security features that you would like to implement

Change the admin username and password as follows:From the taskbar, open Internet Explorer.Maximize Internet Explorer.Type 192.168.0.6 and press Enter.Enter admin.Enter password.Select Login.From the top, select the Administer tab.Ensure Authenticate using the admin name and password is selected.In the Admin Name field, enter WxAdmin.In the Current Password field, enter password.In the New Password field, enter ZDAdminsOnly!$ (Note: O is the capital letter O).In the Confirm New Password field, enter ZDAdminsOnly!$.On the right, select Apply. Enable MAC address filtering as follows:From the top, select the Configure tab.From the left menu, select Access Control.Expand L2-L7 Access Control.Under L2/MAC address Access Control, select Create New.In the Name field, enter Allowed Devices.Under Restriction, make sure Only allow all stations listed below is selected.Enter a MAC address.Select Create New.Repeat steps 2g-2h for each MAC address you would like to add to the ACL.Click OK. Configure access controls as follows:In Access Control, expand Device Access Policy.Select Create New.In the Name field, enter NoGames.Select Create New.Use the OS/Type drop-down list to select Gaming.Use the Type drop-down to select Deny.Under Uplink, ensure Disabled is selected.Under Downlink, ensure Disabled is selected.Click Save.Click OK.

Match each wireless term or concept on the left with its associated description on the right. Each term may be used more than once: not all descriptions have a matching term.

Compares to level of Wi-Fi signal to the level of background radio signals Signal to noise ratio Check channel utilization and identifies sources of RF interference. Spectrum analysis Identifies how strong a radio signal is at the receiver. received signal level Identifies the number of useful bites delivered from the sender to the receiver Causes multiple copies of the same radio signal to be received by the receiving antenna Bounce Degrades wireless network performance. Device saturation

LAB: Optimize a wireless network You are a network technician for a small corperate network. You would like to take advantage of the self healing features provided by the small console from ITAdmin

Configure Self Healing as follows:From the top, select the Configure tab.From the left menu, select Services.Select Automatically adjust AP radio power to optimize coverage when interference is present.Under Automatically adjust 2.4GHz channels using, select Background Scanning from the drop-down menu.Under Automatically adjust 5GHz channels using, select Background Scanning from the drop-down menu.On the right, click Apply. Configure Background Scanning as follows:Select Run a background scan on 2.4GHz radio.Enter 30 seconds.Select Run a background scan on 5GHz radio.Enter 30 seconds.On the right, click Apply. Configure Load Balancing as follows:Select Run load balancing on 2.4GHz radio.In the Adjacent radio threshold(dB) field, enter 40.Select Run load balancing on 5GHz radio.In the Adjacent radio threshold(dB) field, enter 40.On the right, select Apply. Configure Band Balancing as follows:Select Percent of clients on 2.4GHz radio.Enter the percentage.On the right, click Apply. Adjust the AP Power Level as follows:From the left menu, select Access Points.From the top right, select Exhibit to determine which access points to adjust.Select Edit next to the access point to be modified.Under Radio B/G/N(2.4G) next to TX Power, make sure Override Group Config is selected.From the TX Power drop-down list, select -3dB (1/2).Under Radio A/N/AC(5G) next to TX Power, make sure Override Group Config is selected.From the TX Power drop-down list, select -3dB (1/2).Click OK.Repeat steps 6b - 6f for additional access points.

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following enterprises wireless deployment models uses access points with enough intelligence to allow the creation of guests WLANs for keeping public wireless traffic separate from private traffic?

Distributed wireless mesh infrastructure

Your wireless network consists of multiple 802.11n access points that are configured as follows: *SSID (hidden): CorpNet *Security: WPA2-PSK using AES *Frequency: 5.7 GHz *Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. to ensure there is sufficient capacity, you want to maximize the available network bandwidth. what should you do?

Double the bandwidth assigned per channel to 40 MHz

Which of the following features are supplied by WPA2 on a wireless network?

Encryption

LAB: Implement an Enterprise Wireless Network You are a network technician for a small corporate network. You just installed a Ruckus zone controller and wireless access points throughout the buildings using wired connections. Now you need to configure basic wireless network settings. You can access the wireless controller console through Internet Explorer on http://192.168.0.6 using the username admin and the password password

From the taskbar, open Internet Explorer. In the URL field, enter 192.168.0.6 and press Enter. Log in to the wireless controller console with username admin and password password. Select the Configure tab. From the left menu, select WLANs. Under WLANs, select Create New. In the Name field, enter the network name. In the ESSID field, enter the ESSID for the network. Under Type, make sure Standard Usage is selected. Under Authentication Options, make sure Open is selected. Under Encryption Options, select WPA2. Under Encryption Options/Algorithm, make sure AES is selected. In the Passphrase field, enter the passphrase for the network. Click OK. Using the location tabs at the top of the screen, select Floor 1. In the Executive Office location, select Exec-Laptop. In the notification area, select the wireless network icon to view the available networks. Select CorpNet. Select Connect. Enter @CorpNetWeRSecure! for the security key; then click Next. Click Yes to make the computer discoverable on the network.

LAB: Explore wireless network problems To explore, diagnosis, and fix wireless network configuration problems

Identify the wireless connections on the IT-Laptop as follows:Under IT Administration, select IT-Laptop.In the notification area, select the wireless network icon.Which wireless networks are available to IT-Laptop? Which wireless network is IT-Laptop connected to?Select Start.Select Settings.Select Network & Internet.Under Wi-Fi, select Manage known networks.Which know networks are displayed?Select HomeWireless.Select Forget. On ITAdmin, view the wireless controller's configuration interface using Internet Explorer:From the navigation tabs at the top, select Floor 1 Overview to switch to the ITAdmin computer.Under IT Administration, select ITAdmin.From the taskbar, select Internet Explorer.In the URL field, enter 192.168.0.6 and press Enter.In the Admin Name field, enter WxAdmin.In the Password field, enter ZDAdminsOnly!$ (O is the letter o).Select Login.Select the Configure tab.From the left menu, select WLANs.What is the name of the corporate WLAN?Under WLANs, select Edit in the table under Actions.What is the passphrase used for the WLAN security key? Identify the wireless connections on Gst-Lap as follows:From the navigation tabs at the top, select Floor 1 Overview to switch to Gst-Lap.Under Lobby, select Gst-Lap.In the notification area, select the wireless network icon.Which wireless networks are available to Gst-Lap? Which wireless network is Gst-Lap connected to?Select Start.Select Settings.Select Network & Internet.Under Wi-Fi, select Manage known networks.Which known networks are displayed?In the notification area, select the wireless network icon.Select the CorpNet wireless network name.Select Connect.Why did Gst-Lap connect without you entering the security key? Identify the wireless connections on Exec-Laptop as follows:From the navigation tabs at the top, select Floor 1 Overview to switch to Exec-Laptop.Under Executive Office, select Exec-Laptop.In the notification area, select the wireless network icon.What wireless networks are available to Exec-Laptop?From the navigation tabs at the top, select Floor 1 Overview.Under Executive Office, select Hardware.Above the laptop, select Front to switch to the front view of the laptop and observe the switch for the wireless network interface card.What is the position of the switch for the wireless network interface card?Select the wireless switch to turn the wireless network interface card on.On Exec-Laptop, select the wireless network icon in the notification area to view the available networks.Which wireless networks are available to Exec-Laptop now?Manually connect to the CorpNet wireless network as follows:Select the CorpNet wireless network name.Select Connect.Enter the security key for the wireless network (the security key learned in Step 7 above) and click Next.Click Yes to make the PC discoverable.Exec-Laptop successfully connected to the CorpNet network.

Your wireless network consists of multiple 802.11n access points that are configured as follows: *SSID (hidden): CorpNet *Security: WPA2-PSK using AES because of the unique constriction of your organizations facility, thee are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally received. The result is distorted signals that interfere with each other. What should you do?

Implement antenna diversity

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Match each type of access point on the left with the wireless network architecture where it is commonly used on the right. Each type of access point may be used once, more than once, or not at all.

Independent access point infrastructure Intelligent AP Hub-and-spoke infrastructure Lightweight AP Distributed wireless meh infrastructure Intelligent AP

Match each wireless devices on the left with its corresponding characteristics on the right. Each device may be used once, more than once, or not at all.

Manages all of the AP's that are connected to it. Wireless controller Supports 30 to 50 wireless clients per access point. Wireless controller provides NAT routing and an Ethernet switch in one device. Consumer-grade (SOHO) wireless router Supports a maximum of 5-10 wireless clients. Consumer-grade (SOHO) wireless router Pushes wireless configuration settings to connected access points. Wireless controller

Match the wireless networking term or concept on the left with its appropriate description on the right. Each device may be used once, more than once, or not at all.

Moving an wireless device between access points within the same wireless network. Roaming Used by Cisco wireless equipment to route frames back and fourth between the wireless network an the wired LAN. LWAPP Specifies the number of clients that utilize the wireless network. Device density Automatically partitions a single broadcast domain into multiple VLANs. VLAN pooling Graphically displays wireless signal strength within an area Heat map Connects two wired networks over a Wi-Fi network. Wireless bridge identifies relative strength of a radio signal at the receiver. Heat map The number of useful bits delivered from sender to receiver within a specified amount of time. Goodput

What is the LEAST secure place to locate an access point with an omni-directional antenna when creating a wireless cell?

Near a window

You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop.Which of the following types of antennas would you use on the AP to provide a 360degree dispersed wave pattern?

Omni-directional

You want to implement 802.1x authentication on your wireless network, Where would you configure passwords that are used for authentication?

On a RADIUS server

LAB: Design an Outdoor Wireless Network You are a network technician for a small corporate network. You have been asked to create a network connection between two buildings. You've decided that a wireless connection between the two buildings would be the best solution. In addition, employees have been complaining about the wireless connection on the patios of both buildings. You conducted a wireless site and survey and found that the wireless signal on both patios is very poor

On the Shelf, expand the High-gain Antennas category. Drag the High-gain Antenna (Directional) to the installation area on the roof of Building A. Drag the remaining High-gain Antenna (Directional) to the installation area on the roof of Building B. On the Shelf, expand the Wireless Access Points category. Drag the Wireless Access Point (Outdoor) to the installation area on the roof of Building A. Drag the remaining Wireless Access Point (Outdoor) to the installation area on the roof of Building B. On the Shelf, expand the WAP Antennas category. Drag the WAP Antenna (Directional) to one of the installed outdoor WAPs. Drag the remaining WAP Antenna (Directional) to the other installed outdoor WAP. To complete the lab, select Done.

LAB: Design an Indoor Wireless Network You are a network technician for a small corporate network. It's been decided that the office needs a wireless network for employees. You've already installed and configured a wireless controller and are in the process of installing wireless access points (WAPs) in the office. In this lab, your task is to install the proper types of WAPs in order to provide adequate wireless coverage while also reducing signal emanation as much as possible. As you install each WAP, consider the following:

On the Shelf, expand the Wireless Access Points category. Drag the Wireless Access Point (Omnidirectional Antenna) to the installation area in the Lobby. Drag one of the Wireless Access Point (Directional Antenna) to the installation area on the west wall of the IT Administration office. Drag another Wireless Access Point (Directional Antenna) to the installation area on the east wall of the Networking Closet. To complete the lab, select Done.

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?

Overlapping channels

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360 dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?

Replace the omni-directional antenna with a directional antenna

Your company security policy states that wireless networks are not to be used because of potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue access point

you have physically added a wireless access point to your network and installed a wireless network card in two laptops running windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access points (AP). Which of the following values uniquely identifies the network AP?

SSID

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point

a user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works what is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor

What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment?

They are vulnerable to exploits due to weaker security

LAB: In the executive office, Exec-laptop is having problems connecting to the corpnet wireless netwwork and the internet

Under IT Administrator, select IT-Laptop. In the notification area, select the wireless network icon to view the available networks to verify the problem found on the laptop in the Executive Office. The CorpNet wireless network is displayed in the list of available networks. Select the CorpNet wireless network. Select Connect. Enter @CorpNetWeRSecure!& for the security key and select Next. Select Yes.IT-Laptop is now connected to the CorpNet wireless network. Because IT-Laptop can connect to the wireless network, the problem may be limited to only the Exec-Laptop laptop in the Executive Office. From the top navigation tabs, select Floor 1 Overview to switch to Exec-Laptop. Under Executive Office, select Exec-Laptop. In the notification area, select the wireless network icon to view the available networks. There are no wireless networks shown as available for this laptop. Possible causes for this include:The wireless network interface card is not turned on (the wireless switch on the exterior of the laptop is in the off position). Since no wireless networks are shown in the list, you must take additional steps.The wireless network's SSID is not broadcasted. From step 1, you know that the wireless access point is broadcasting the SSID.The wireless access point is not powered on. From step 1, you know that the wireless access point is powered on. From the top navigation tabs, select Floor 1 Overview to switch to the Exec-Laptop. Under Executive Office, select Hardware. On the front of the Exec-Laptop, Confirm that the switch for the wireless network interface card is in the On position. The switch is in the off position. Slide the wireless switch to the On position to turn the wireless network interface card on. On the laptop monitor, select Click to view Windows 10. In the notification area, select the wireless network icon to view the available networks. The CorpNet wireless network is now displayed in the list of available networks. Select the CorpNet wireless network. Select Connect. Enter @CorpNetWeRSecure!& for the security key and select Next. Select Yes.Exec-Laptop is now connected to the CorpNet wireless network.

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

Use a different channel ID

Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?

Z-Wave

To optimize your network, you want to configure your wireless AP to use a channel that means the following criteria: *Non-overlapping *Low utilization *Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. for example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results, which channel should you configure your wireless AP to use?

channel 1

You have to decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open your browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptops wireless adapter works because you use a wireless connection at work what is likely the cause of the problem?

mismatched SSID

You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point?

on the top floor


संबंधित स्टडी सेट्स

Completing the Application, Underwriting, and Delivering the Policy

View Set

Pharmacology Chapter 54: Drugs Acting on the Upper Respiratory Tract

View Set