Chapters 20 - 21: Wireless Security and Connectivity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network administrator is configuring security for new WLANs on a Cisco WLC. Which client authentication mode should the administrator use for a large scale deployment?

802.1x

Which three statements concerning wireless network security are accurate? (Choose three.

A wireless client first associates with an AP and then authenticates for network access.

What is the function provided by CAPWAP protocol in a corporate wireless network?

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

Which WLAN security measure requires a special backend authentication server?

EAP

A network administrator is adding a new WLAN with Open Authentication on a Cisco 3500 series WLC. Which tab should the administrator use to create it?

General

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

It is used to encrypt the messages between the WLC and the RADIUS server.

A network administrator of a small advertising company is configuring WLAN security on a Cisco WLC. The administrator decides to use the WPA2 PSK authentication method. On which OSI layer does WPA2 PSK provide security?

Layer 2

A network technician is checking the status of a live AP on the WLC. On the Access Point View screen, the technician notices that the AP is using channel 11 and the channel utilization is 35%. However, the technician notices that there is no wireless client associated with the AP. What is a possible explanation for the channel utilization?

Nearby APs and clients are also using channel 11.

A network administrator of a college is configuring WLAN security with WPA2 Enterprise authentication. Which server is required when deploying this type of authentication?

RADIUS

Which configuration is supported as the authentication server for implementation of 802.1X on Cisco devices?

RADIUS security system with EAP extensions

A network technician has received complaints from users in a particular area. Upon investigation, the technician notices a poor air quality value for the AP in that area. Which WLC GUI tab should the technician use next to determine if there are any neighbor or rogue APs interfering with the one AP?

RF TROUBLESHOOT

In addition to signal-to-noise ratio, what is used by a Cisco wireless LAN controller to determine which AP will respond to a client request to associate?

RSSI

A network administrator is configuring a WLAN with WPA2 Enterprise on a Cisco 3500 series WLC. Client authentications will be handled by a RADIUS server. Which tab should the administrator use to add the RADIUS server information?

SECURITY

. Users report that accesses to the wireless network inside a meeting room are not successful even after repeated attempts. A network technician verifies that the meeting room space is served by a lightweight AP and the radio is working. What is a likely cause of the problem?

The AP has lost connectivity to the WLC.

A company uses lightweight APs. Which criterion must be in place before an AP can successfully accept clients for a particular WLAN?

The AP must have connectivity to an access layer switch.

A network engineer is working with a user to troubleshoot connectivity of a laptop to a lightweight AP. The user has rebooted the laptop, and the network engineer is checking the connection status of the client from the WLC GUI. The client connection status dot is showing black on the DHCP step, just as it did before the reboot. What can the network engineer learn from this output?

The WLC controller has not received client IP addressing information from the DHCP server.

A network administrator opens the Client View screen on the WLC to review the performance data of a wireless client. The administrator notices that the client has a connection score value of 78%. What can the administrator conclude from this information?

The client is currently using a data rate that is 78% of its maximum capability.

A network administrator receives a complaint from a laptop user of slow web accesses through the wireless network. The administrator reviews the information in the Client View screen of the WLC and finds that the connection speed of the client is 30 Mbps and it has a connection score of 21%. What is likely the problem?

The client is too far from the AP.

A network administrator is configuring a WLC to provide WLAN access to users in an office building. When testing the newly created WLAN, the administrator does not see the SSID from a wireless device. What is a possible cause?

The new WLAN needs to be enabled.

A network technician is checking the status of a live AP on the WLC. On the Access Point View screen, the technician notices that the AP is using channel 11 and the noise level is -30 dBm. Which conclusion can be drawn with the information?

There are some non-802.11 devices around that interfere with the WLAN signal.

Users are complaining about the wireless connectivity in a particular area for a company that uses lightweight APs and wireless LAN controllers. The technician that handles the wireless networks notices that the particular AP has a poor air quality value. The technician uses the CLEAN AIR tab to further investigate and notices that there is an active interferer listed that has a duty cycle of 100%. What should the technician do next?

Track down the offending device that is using the particular frequency causing the interference.

A recently hired network engineer is new to the Cisco lightweight APs that the company uses. Which tool should the engineer use for managing and monitoring the wireless network?

WLC GUI

Which two hybrid modes can cause compatibility issues when configured on a WLAN controller? (Choose two.)

WPA with AES WPA2 with TKIP

Match the wireless security settings to the description. (Not all options are used.)

WPA-2 The AES cipher WPA- Enterprise RADIUS Server Open unencripted

What method of wireless authentication is dependent on a RADIUS authentication server?

WPA2 Enterprise

What advantage does WPA2 have over WPA?

WPA2 uses AES instead of TKIP.

Which wireless encryption method is the most secure?

WPA2 with AES

Which WLAN security protocol avoids attacks by strengthening the key exchange between clients and APs using a method known as Simultaneous Authentication of Equals?

WPA3-Personal

A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN?

a key that matches the key on the AP

Which term describes the role of a Cisco switch in the 802.1X port-based access control?

authenticator

What are two common issues that could cause a specific user to have problems when trying to connect to the wireless network within a company that uses lightweight APs? (Choose two.)

distance from the AP authentication

Several users from the same area cannot connect to the wireless network. The company uses lightweight APs and WLCs. What is one of the first things that the technician should check?

the AP

Which situation is an example of EAP deployment?

when a client communicates with a RADIUS server for authenticated access to the network through the AP Open authentication uses no client or AP verification. WPA1, WPA2, and WPA3 support both PSK or 802.1x client authentication modes.


Set pelajaran terkait

CO 48HR Contracts & Regulations Course

View Set

Health problems with older adults Med 3surge

View Set

NWACC Sociology Test 1 - Real World

View Set