9.5.14 Practice Questions Test Out

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast.

Which of the following features are supplied by WPA2 on a wireless network?

Encryption

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do?

Implement a captive portal

You're replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)

Install a RADIUS server and use 802.1x authentication. Configure devices to run in infrastructure mode

Which of the following do switches and wireless access points use to control access through a device?

MAC address filtering

Which of the following locations creates the greatest amount of interference for a wireless access point? (Select two.)

Near backup generators Near cordless phones

You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process?

On a RADIUS server.

Your company security policy states that wireless networks are not to be used because of the potential security risk they present. One day you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?

Rogue access point

Which of the following wireless security methods uses a common shared key that's configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Which of the following provides security for wireless networks?

WPA


Set pelajaran terkait

Anatomy and Physiology- Chapter 1 Homework

View Set

NCLEX LPN Basic Care and Comfort

View Set

RN professionalism and Leadership Assessment

View Set

Random Process-M1-Probability Theory and Random Processes

View Set

XCEL Chapter 11 - Laws and Rules

View Set