Weekly Online Exam #9
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems? -WEP overlap -The SSIDs of the two server systems match -Overlapping channels -The SSIDs of the two client systems match -Crosstalk between the RF signals
Overlapping channels
Which of the following recomendations should you follow when placing access points to provide wireless access for users within your company? -Place access points in the basement. -Place access points above where most clients are. -Place multiple access points in the same area. -Place access points near outside walls.
Place access points above where most clients are
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wirelless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop. (Select two.) -Preshared key -AES encryption -Channel -BSSID -TKIP encryption
Preshared key TKIP encryption
You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three) -How many devices will need to be supported? -Where can network hardware be mounted in the building? -Are there microwaves or cordless phones that can cause interference? -Is the size of the business expected to grow in the future? -What type of data will be transmitted on the network?
-How many devices will need to be supported? -Is the size of the business expected to grow in the future? -What type of data will be transmitted on the network?
After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? (select two) -802.11g -802.11a -Bluetooth -802.11b
802.11g 802.11b
You are designing a wireless network for a client. You client needs the network to support a data rate of at least 150 Mpbs. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? -802.11a -802.11n -802.11g -802.11b
802.11n
You are designing an update to your client's wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. Due to budget constraints, you client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? -802.11n -802.11a -802.11d -802.b
802.11n
You are designing a wireless netowkr for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 Ghz. Which 802.11 standards will work best in this situation (select two). -802.11d -802.11n -802.11a -802.11b -802.11g
802.11n 802.11a
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (select two) -802.1x -WEP encryption -AES encryption -Open authentication -Preshared keys -TKIP encryption
802.1x AES encryption
You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptops wireless adapter works because you use a wireless connection at work. What is the likely cause of the issue? -PPP is not configured correctly -WAP is out of range -Different LAN protocols are being used -A mismatched SSID -Antenna strength on the WAP is too low
A mismatched SSID
You are designing a wireless network implementation for a small business. The business deals with sensative customer information, so data emanation must be reduced as much as possible. The floor plan of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. Each antenna type can be used once, more than once, or not at all. (OMNI-DIRECTIONAL / DIRECTIONAL / PARABOLIC) A= B= C= D= E= F= G=
A= DIRECTIONAL B= DIRECTIONAL C= OMNI-DIRECTIONAL D= DIRECTIONAL E= DIRECTIONAL F= DIRECTIONAL G= DIRECTIONAL
Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200m apart, as shown below. The objectives of the implementation are as follows: -Create a secure wireless network that doesn't emmanate beyond each office space by implementing access points in locations A-D in each buildings. -Connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F. Drag the antenna type from the list on the left to the appropriate locations on the right. Each antenna type may be used more than once. (Normal Gain directional antenna aimed North, East South, West / High Gain directional antenna aimed North, East, South, West) A= B= C= D= E= F=
A= Normal Gain directional antenna aimed east B= Normal Gain directional antenna aimed South C= Normal Gain directional antenna aimed north D= Normal Gain directional antenna aimed west E= High Gain directional antenna aimed east F= High Gain directional antenna aimed west
You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three) -Username and password -Channel -AED -Preshared key -SSID -TKIP
AES Preshared key SSID
You are building a wireless network within and between two buildings. The buildings are separated by more than 3000 feet. The wireless network should meet the following requirements: -Wireless data within Building 1 should be protected with the highest security. -Wireless data within Building 2 should be accessible and permitted by any wireless client. -Wireless signals between Building 1 and 2 should be protected with the highest degree of security. -Wireless signals within Building 1 and 2 should cover the whole structure, but not extend to the outside. For each location on the image below, you need to select the following: -Antenna Option -Security Option Drag the items from the list on the left to the location identifier on the right. Items may be used more than once. Not all items will be used. (NOTE: THERE IS AN IMAGE HERE - BUILDING ONE HAS LOCATION A, B, D, D. BUILDING TWO HAS LOCATION A) ---- Right / Left Facing directional WPA2 with CCMP / WEP with open Authentication Omni-Directional Antenna BUILDING 1 - LOCATION A = BUILDING 1 - LOCATION B = BUILDING 1 - LOCATION C = BUILDING 1 - LOCATION D = BUILDING 2 - LOCATION A = BUILDING 2 - LOCATION B =
BUILDING 1 - LOCATION A (Right facing direc antenna, WPA2-CCMP) BUILDING 1 - LOCATION B (Omni-direction antenna, WPA2-CCMP) BUILDING 1 - LOCATION C (Left facing direc antenna, WPA2-CCMP) BUILDING 1 - LOCATION D (Right facing high-gain antenna, WPA2-CCMP) BUILDING 2 - LOCATION A (Omni-Direction ant, WEP with open authentication BUILDING 2 - LOCATION B (Left-facing high-gain antenna, WPA2-CCMP)
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two) -Infrared -Bluetooth -802.11a -802.3a -802.11b
Bluetooth 802.11b
To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: -Non-overlapping -Low utilization -Low interface You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four waves whose crests are over channel 11 belong to channel 11) Based on the results, which channel should you configure your wireless AP to use? -Channel 11 -Channel 3 -Channel 1 -Channel 8 -Channel 6
Channel 1
You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do? -Decrease the beacon interval on the access point -Set the channel on the client to match the channel used by the access point -Enable the wireless card on the client -Configure a profile on the wireless client
Configure a profile on the wireless client
Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic? -Lightweight access point (LWAP) with wireless controller infrastructure -Hub-and-spoke infrastructure -Distributed wireless mesh infrastructure -Independent access points
Distributed wireless mesh infrastructure
Math the wireless term or concept on the left with its associated description on the right. Not all descriptions have a term. (BOUNCE/RECEIVED SIGNAL LEVEL/SIGNAL TO NOISE RATIO/SPECTRUM ANALYSIS/DEVICE SATURATION) Compares the level of the Wi-Fi signal to the level of background radio signals= Checks channel utilization and identifies sources of RF interference = Identifies how strong a radio signal is at the receiver = Identifies the number of useful bits delivered from the sender to the receiver = Causes multiple copies of the same radio signal to be received by the receiving antenna = Degrades wireless network performance =
Compares the level of the Wi-Fi signal to the level of background radio signals= SIGNAL TO NOISE RATIO Checks channel utilization and identifies sources of RF interference = SPECTRUM ANALYSIS Identifies how strong a radio signal is at the receiver = RECEIVED SIGNAL LEVEL Identifies the number of useful bits delivered from the sender to the receiver = Causes multiple copies of the same radio signal to be received by the receiving antenna = BOUNCE Degrades wireless network performance = DEVICE SATURATION
You are the wireless network administrator for you organization. As the size of the organization has grown, you've decided to upgrade your wirelesss network to use 802.1x authentication instead of sing preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution). -Configure the RADIUS server with a server certificate. -Configure all wireless workstations with client certificates. -Configure the RADIUS server with a preshared key. -Configure all RADIUS clients with a preshared key. -Configure all wireless access points with client certificates.
Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.
You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do? -Change the channel on the access point to a lower number -Create a wireless profile on the client -Enable SSID broadcast -Decrease the beacon interval
Decrease the beacon interval
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antenna should you use on each side of the link? (Select two) -Omni-Directional -Directional -Normal-Gain -Bridge -High-Gain
Directional High-Gain
Which of the following measures will make your wireless network invisible to casual attacker performing war driving? -Change the default SSID -Implement WPA2 Personal -Disable SSID broadcast -Use a form of authentication other than open authentication
Disable SSID broadcast
Your wireless network consists of multiple 802.11n access points that are configured as follows: -SSID (hidden): CorpNet -Security: WPA2-PSK using AES -Frequency: 5.7 Ghz -Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do? -Upgrade to 802.11a access points. -Double the bandwidth assigned per channel to 40 MHz. -Implement antenna diversity. -Switch to TKIP encryption.
Double the bandwidth assigned per channel to 40 MHz
Which of the following features are supplied by WPA2 on a wireless network? -Client connection refusals based on MAC address -Network identification -Encryption -A centralized access point for clients -Traffic filtering based on packet characteristics
Encryption
An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using airsnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. What attack techniques did the attack us? (select two) -Denail of service -Evil Twin -Smurf -Pharming -Man-in-the-middle
Evil Twin Pharming
Your wireless network consists of multiple 802.11n access points that are configured as follows: -SSID (hidden): CorpNet -Security: WPA2-PSK using AES -Frequency: 5.75 GHz -Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do? -Switch to RADIUS authentication for wireless clients -Install directional access points -Implement antenna diversity -Reduce the power of the access point radio signals
Implement antenna diversity
Match each type of access point on the left with the wireless network architecture that they are commonly used on the right. (Intelligent AP / Lightweight AP) Independent access point infrastructure = Hub-and-spoke infrastructure = Distributed wireless mesh infrastructure =
Independent access point infrastructure = Intelligent AP Hub-and-spoke infrastructure = Lightweight AP Distributed wireless mesh infrastructure = Intelligent AP
Match each wireless device on the left with its corresponding characteristics on the right. Each device may be used once, more than one, or not at all. (Consumer-grade (SOHO) wireless router / Wireless Controller) Manages all of the APs that are connected to it = Supports 30 to 50 wireless clients per access point = Provides NAT routing and an Ethernet switch in one device = Supports a maximum of 5-10 wireless clients = Pushes wireless configuration settings to connected access points =
Manages all of the APs that are connected to it = Wireless Controller Supports 30 to 50 wireless clients per access point = Wireless Controller Provides NAT routing and an Ethernet switch in one device = Consumer-grade (SOHO) wireless router Supports a maximum of 5-10 wireless clients = Consumer-grade (SOHO) wireless router Pushes wireless configuration settings to connected access points = Wireless Controller
Match the wireless networking term or concept on the left with its appropriate description on the right. Each term may be used once, more than once, or not at all. (Device density / Roaming / LWAPP / VLAN pooling / Wireless bridge / Heat map / Goodput) Moving an wireless device between access points within the same wireless network = Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN = Specifies the number of clients that utilize the wireless network = Automatically partitions a single broadcast domain into multiple VLANs = Graphically displays wireless signal strength within an area = Connects two wired networks over a Wi-Fi network = Identifies relative strength of a radio signal at the receiver = The number of useful bits delivered from sender to receiver within a specified amount of time =
Moving an wireless device between access points within the same wireless network = Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN = LWAPP Specifies the number of clients that utilize the wireless network = Device density Automatically partitions a single broadcast domain into multiple VLANs = VLAN pooling Graphically displays wireless signal strength within an area = Heat map Connects two wired networks over a Wi-Fi network = Wireless bridge Identifies relative strength of a radio signal at the receiver = Heat map The number of useful bits delivered from sender to receiver within a specified amount of time = Goodput
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? -Near a window -Above the 3rd floor -In the center of the building -In common or community work areas
Near a window
You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue? -Access points -Network hub -Range extender -Network bridge
Network bridge
You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern? -Omni-directional -Multi-point -Directional -Mutli-directional -Uni-directional
Omni-directional
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication? -On the wireless access point -On the wireless access point adn each wireless device -On a RADIUS server -On a certificate authority
On a RADIUS server
You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point? -In the basement -In the kitchen area -Near the backup generators -On the top floor
On the top floor
You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength? -Increase the RF setting on the AP -Increase the RF setting on the client system -Increase the RF power on the isotropic antenna -Replace the omni-directional antenna with a directional antenna -Replace the directional antenna with an omni-directional antenna
Replace the omni-directional antenna with a directional antenna
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this? -Man-in-the-middle -Rouge access point -Physical security -Social engineering -Phishing
Rouge access point
You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP? -SSID -Channel -WEP -PS
SSID
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? -Same SSID, different channel -Different SSID, different channel -Different SSID, same channel -Same SSid, Same Channel
Same SSID, different channel
What purposes does a wireless site survey fulfill? (Choose two) -To identify existing or potential sources of interference. -To document existing infrared traffic in the 5.4 GHz spectrum. -To identify the recommended 100 degree seperation angle for alternating access points. -To identify the coverage area and preferred placement of access points.
To identify existing or potential sources of interference To identify the coverage area and preferred placement of access points
Mobile devices in your organization use the access points show in the figure below to connect to your wireless network. Recently, a catastrophic early morning power surge occurred. It was followed by an outage that lasted longer than your backup equipment could supply temporary power. After you powered the equipment back up, everything initially appeared to work correctly. However, ever since this event, some mobile users report that wirless network connections sometimes get dropped or perform very poorly. What should you do? (Select two) -Configure each access point to use a different SSID -Set access points A and C to use 802.11b wireless networking -Set the channel used by access point B to 11. -Set access point B to use 802.11n wireless networking -Set the channel used by access point C to 7 -Configure each access point to use 802.1x authentication -Set the channel used by access point A to 5 -Set the channel used by access point B to 8
Set the channel used by access point B to 11. Set access point B to use 802.11n wireless networking
A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem? -The encryption level has been erroneous set back to the default setting -The client has incorrect WEP settings -The client system has moved too far away from the access point -An SSID mismatch between the client and the WAP -An SSID mismatch between the client and the server
The client system has moved too far away from the access point
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem? -The user needs a new IP address because she is working on a different floor -The wireless network access point on the user's normal floor has failed -The user has not yet rebooted her laptop computer while at her now location -The user is out of the effective range of the wireless access point on her floor -The user has not yet logged off and back on to the network while at her new location.
The user is out of the effective range of the wireless access point on her floor
What is the risk associated with smart technology used in networked devices such as smart refrigerators, environmental controls, or industrial equipment? -They are not compatible with routing protocols, which causes a burden on network bandwidth. -They are not physically secure, so they can be configured by anyone who has access to them. -They are vulnerable to exploits due to weaker security. -They use redundant paths for fault tolerance that can cause message loops to develop on the network.
They are vulnerable to exploits due to weaker security
While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely going to adppt t in order to avoid conflict between the networks? -Use a different channel ID -Use the same channel ID, but configure your wireless network to use WEP -Use 802.11b instead of 802.11g -Use the same channel ID, but configure a different SSID
Use a different channel ID
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? -WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise -WPA Enterprise and WPA2 Enterprise -WEP, WPA Personal, and WPA2 Personal -WPA Personal and WPA2 Enterprise
WEP, WPA Personal, and WPA2 Personal
Which of the following provides security for wireless networks? -802.11a -WPA -802.3u -CSMA/CD -WAP
WPA
Which of the following protocols or mechanisms is used to provide security on a wireless network? -WPA -IPsec -RDP -802.1x
WPA IPsec 802.1x
Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, make devices act as repeaters, and has a low data transfer rate? -802.11 AC -Z-Wave -NFC -Ant+
Z-Wave
