9.5.14 Practice Questions Test Out
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
Disable SSID broadcast.
Which of the following features are supplied by WPA2 on a wireless network?
Encryption
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do?
Implement a captive portal
You're replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)
Install a RADIUS server and use 802.1x authentication. Configure devices to run in infrastructure mode
Which of the following do switches and wireless access points use to control access through a device?
MAC address filtering
Which of the following locations creates the greatest amount of interference for a wireless access point? (Select two.)
Near backup generators Near cordless phones
You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process?
On a RADIUS server.
Your company security policy states that wireless networks are not to be used because of the potential security risk they present. One day you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?
Rogue access point
Which of the following wireless security methods uses a common shared key that's configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
Which of the following provides security for wireless networks?
WPA