IST 275 Testout Chapter 10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which technologies are used by the 802.11ac standard to increase network bandwidth?

80 MHz bonded channels Eight MIMO radio streams

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?

802.11a 802.11n

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?

TKIP encryption Preshared key

How many total channels are available for 802.11a wireless networks?

23

What is the frequency of 802.11a netoworking?

5.75 GHz

You want to implement 802.1x authentication on our wireless network. Which of the following will be required?

RADIUS

How many total channels are abailable for 802.11g wireless networks?

11

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

Which of the following are frequencies defined by 802.11 committees for wireless networking?

2.4 GHz 5.75 GHz

Which IEEE standard describes wireless communication?

802.11b

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?

802.11b Bluetooth

after installing a new 2.4Gh cordless phone system in your office, you notice that wireless network performance is adversely affected. which of the following wireless networking standards are you most likely to be using?

802.11b 802.11g

You are designing an update on your client's wireless network. The existing wireless network uses 802.11b equipment; which you client complains runs too slowly. She wants to upgrade the network to run at 54 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in the situtation?

802.11g

You have been contracted by OsCorp to recommend a wireless Internet solution,. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

802.11g

Which IEEE wireless standards specify transmission speeds up to 54 Mbps?

802.11g 802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?

802.11n

You are designing an update to your client's wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the newotk to run at 150 Mbps or faster. Due to budget contraints, your client wants to upgrade only the wireless access points in the network this year. Next year she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.1 standard will work best in this situation?

802.11n

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design?

802.1x AES encrpytion

You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible. The floor plabn of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. each antenna type can be used once, more than once, or not at all.

A=Directional B=Directional C=Omnidirectional D=Directional E-Directional F=Directional G=Directional

You are building a wireless network within and between two buildings. the buildings are separated by more than 3000 feet. the wireless network should meet the following requirements: -Wireless data within Building 1 should be protected with the highest degree of security -wireless data within building 2 should be accessible and permitted by any wireless client. -wireless signals between buildings 1 and 2 should be protected with the hgihest degree of secuirty. -wireless signals within Buildings 1 and 2 should cover the whole structure, but not extend to the outside. for each location on the image below, you need to select the following: -antenna option -security option

Building 1 -Location A R-facing Directional antenna WPA2 WITH CCMP Building 1 -Location B Omni Directional Antenna WPA2 with CCMP Building 1 -Location C L-facing Directional antenna WPA2 WITH CCMP Building 1 -Location D R-facing parabolic antenna WPA2 WITH CCMP Building 2 -Location A Omni Directional Antenna WEP wit Open authntication Building 2 -Location B L-facing Parabolic Antenna WPA2 with CCMP

All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

CSMA/CA

To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: Non-overlapping Low utlilization Low interference You performed a spectrum analysis to identify 2.4GHz wireless channel utilization, as shown int he exhibit. (to read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. for example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results which channel should you configure your wireless AP to use?

Channel 1

Which wireless technology is used to enable 802.11a=ht networks to emulate 802.11n network speeds?

Channel bonding

Match each wireless term to concept on the left with its associated description on the right. Each term may be used more than once; not at all descriptions have a matching term.

Compares the level of the Wifi signal to the level of background radio signals Signal to Noise Ratio Checks channel utilization and identifies sources of RF interference Spectrum analysis Identifies how strong a radio signal is at the receiver. Received Signal Level Identifies the number of useful bits delivered from the sender tot he receiver. leave blank causes multiple copies of the same radio signal to be received by the receiving antenna. Bounce Degrades wireless network performance. Device saturation

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do?

Conduct a site survey Check the MAC addresses of devices connected to your wired switch

you have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network to connect to it. What should you do?

Configure a profile on the wireless client

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. to do this you need to configure a RADIUS server and RADIUS clients,. you want the server and the clients to mutually authenticate with each other.

Configure the Radius server with a server certificate Configure all wireless access points with client certificates

Which wireless networking component is used to connect multiple APs together?

DS

You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

Decrease the beacon interval

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of guest WLANs for keeping public wireless traffic separate from private traffic?

Distributed wireless mesh infrastrucutre

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.7 GHz Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. what should you do?

Double the bandwidth assigned per channel to 40 MHz.

Which of the following is true of a wireless network SSID?

Groups wireless devices together into the same logical network.

You have been hired to design a wireless network for a SOHO environment, You are currently in the process of gathering network requirements from management. Which of the following questions should you ask?

How many devices will need to be supported? Is the business expected to grow in size in the future? What type of data will be transmitted on the network?

An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?

Hub

your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.7 GHz Bandwidth per channel: 40 MHz becasue of the unique construction of your organizations facility, there are many locations that do not have a clear line-of-sight between network clients and access points. as a result, radio signals are reflected along multiple paths before finally being received. the result is distorted signals that interfere with each other. what should you do?

Implement antenna diversity

Match each type of access point on the left with the wireless network architecture tha they are commonly used in on the right. Each type of access point may be used one, more than once, or not at all.

Independent access point infrastructure. Intelligent AP Hub-and-spoke infrastructure Lightweight AP Distributed wireless mesh infrastrucutre Intelligent AP

Match each wireless device on the left with its corresponding characteristics on the right. each device may be used once, more than once, or not at all.

Manages all of the APs that are connected to it wireless controller Supports 30 to 50 wireless clients per access point Wireless controller Provides NAT routing and an Ethernet switch in one device. SOHO wireless router Supports a maximum of 5-10 wireless clients. SOHO wireless router Pushed wireless configuration settings to connected access points. wireless controller

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

Match the wireless networking term or concept on the left with its appropriate description on the right. each term may be used once, more than once, or not at all.

Moving an wireless device between access points within the same wireless network. Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN. LWAPP Specifies the number of clients that utilize the wireless network. Device density Automatically partitions a single broadcast domain into multiple VLANs. VLAN pooling Graphically displays wireless signal strength within an area. Heat map Connects two wired networks together over a WiFi network. Wireless bridge. Identifies how strong a radio signal is at the receiver. Leave Blank The number of useful bits delivered from sender to receiver within a specified amount of time. Goodput

You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following types of antennas would you use on the AP to provide a 360-degree dispersed wave pattern?

Omni-directional

You want to connect your client computer to a wireless access point connected to our wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client?

Preshared key AES SSID

You have been hired to troubleshoot a wireless connectivity issue or two separate networks located within a close proximity. both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems.

Overlaping channels

an attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. she onfigured the fake access point witht he same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. What attack techniques did the attacker use in this scenario?

Pharming, evil twin

Match each Wi-Fi jamming attack on the left with its corresponding description on the right.

Random noise jamming Random pulse jamming Spark jamming

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?

Replace the Omni-directional antenna with a directional antenna

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rouge access point

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running windows. neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access point (AP) which of the following values uniquely identifies the network AP?

SSID

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point, and to be able to roam between the two access points. How should you configure the access points?

Same SSID, different channel

Which encryption method is used by WPA for wireless networks?

TKIP

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: A wirelss televion distribution system running at 2.4 GHz A wireless phone system running at 5.8 GHZ A wireless pone system running at 900 MHz An 802.11a wireless network running in the 5.725-5.850 GHz frequenc range An 802.11j wireless network running in the 4.9-5.0 GHz frequency range Since this equipment was installed, your wireless netowrk has been experiencing significant interference. Which system is to blame?

The wireless TV system

What purpose does a wireless site survey serve?

To identify existing or potential sources of interference To identify the coverag area and preferred placement of access points.

Which of the following wireless ecurity methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

you need to place a wireless access point in your two-story building. while trying avoid interference which of the following is the best location for the access point?

in the top floor

you have decided to conduct a business meeting at a local coffee shop. the coffee shop you chose has a wireless hotspot for its customers who want Internet access. You decide to check your e-mail before the meeting begins, but when you open the browser you cannot gain internet access. other customers are on the internet and because you use a wireless connection at work, you are sure your laptops wireless adapter works. what is the likely cause of the problem?

mismatched SSID

What is the lest secure place to locate an an access point wit an omni-directional antenna when creating a wireless cell?

near a window

ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link?

parabolic high-gain

which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

place access points above where most clients are

which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

place access points above where most clients are.

Mobile devices in your organization use the access points shown in the figure below to connect to your wireless network. recently a catastrophic early morning power surge occurred, followed by an outage that lasted longer than your backup equipment could supply temporary power. after, you powered the equipment back on, everything initially appeared to work correctly. however, ever sine this event, some mobile users report that wireless network connections sometimes get dropped or perform very poorly. which should you do?

set the channel used by access point B to 11 set access point b to use 802.11n wireless networking

a user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. while talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. what is the most likely cause of her connectivity problem?

the user is out of the effective range of the wireless access point on her floor

while configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

use a different channel ID

match the wireless signaling method on the left with its definition on the right

uses a narrow frequency bad and hops data signals in a predictable sequence FHSS Breaks data into pieces and sends the pieces across multiple frequencies in a defined range. DSSS breaks data into very small data streams in order to send the information across long distances. OFDM


संबंधित स्टडी सेट्स

Chapter 12: Social Psychology Norton InQuizitive, Social Psychology inquizitive

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

The Point Chapter 12, Chapter 12: PrepU, Mental Health test #3 Chapter 12 Abuse and Violence, Abuse and violence prepU, Ch 12: Prep-U, Chapter 12 Abuse and Violence Questions, Chapter 12: Abuse and Violence

View Set

Carbohydrates-monosaccharides, Disaccharides, & Polysaccharides

View Set