Implementing and Troubleshooting Wireless Networks (Lesson 13)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the speed of a 802.11ac network?

1 Gbps

What is the speed of a 802.11n network?

108-300 mbps

What is the speed of a 802.11b network?

11 Mbps

On which bandwidth does 802.11b operate?

2.4 GHz

On which bandwidth does 802.11g operate?

2.4 GHz

On which bandwidth does 802.11n operate?

2.4/5 GHz

How many watts does PoE+ with the 801.3a standard support?

30

On which bandwidth does 802.11a operate?

5 GHz

On which bandwidth does 802.11ac operate?

5 GHz

Which frequency band is less likely to suffer from co-channel interference, 2.4 GHz or 5 GHz?

5 GHz

What is the speed of a 802.11a network?

54 Mbps

What is the speed of a 802.11g network?

54 Mbps

Which 802.11 standard(s) use orthogonal frequency-division multiplexing (OFDM)?

802.11a, 802.11g, 802.11n, and 802.11ac

Which 802.11 standard(s) use direct-sequence spread-spectrum (DSSS)?

802.11b

All of the following security techniques will prevent unauthorized connections through a WAP, EXCEPT: _____. A) Blacklist all approved Wi-Fi MAC addresses B) Whitelist all approved Wi-Fi MAC addresses C) Blacklist the offender's Wi-Fi MAC address

A

A technician notes that jitter is an issue with a wireless device. What is the technician referring to? A) A measure of the Round-Trip Time (RTT) of individual packets. B) A variable delay in the Round-Trip Time (RTT) of packets. C) A device is within the supported range but has a weak signal. D) Too many client devices are connecting to the same Access Point (AP).

B

All of the following 802.11 extensions operate mainly at 5GHz, EXCEPT: _____. A) 802.11ac B) 802.11b C) 802.11n D) 801.11a

B

Compare the configurations and determine which is characteristic of a Basic Service Set (BSS). A) Each station is configured to connect through a base station or Access Point (AP). B) An Access Point (AP) mediates communications between wireless stations and provides a wireless bridge to a cabled network segment. C) A group of wireless stations combine and provide a bridge to a cabled network segment. D) The Wireless Access Point (WAP) is attached to other WAPs by using standard cabling, and transmits and receives network traffic to and from wireless devices.

B

WPA2 uses which encryption protocol? A) TKIP B) CCMP-AES C) WPA2 is unencrypted

B

What antenna type sends out a flat donut radiation pattern? A) Omni B) Dipole C) Patch d) Directional/Yagi

B

What is the most common cause for a slow wireless network? A) Low network security B) Over capacity C) Incorrect WAP password D) WPS issues

B

What type of enterprise authentication scheme uses a Protected Access Credential (PAC) to protect the user authentication credential? A) TKIP B) EAP- FAST C) EAP-TLS D) PEAP

B

Which is a means for an AP to allocate higher bandwidth to multiple stations at the same time. A) MIMO B) MU-MIMO C) OFDM D) DSSS

B

Which term describes the process of scouting for Wi-Fi networks that may be vulnerable? A) Snooping B) War driving C) Fox hunting D) Sniffing

B

A network manager implements geofencing to block anyone using a wireless device outside of the site perimeter. What are possible issues the network manager will face? (Select two) A) Most devices support Global Positioning Systems (GPS)-based location services. B) Global Positioning System (GPS) is not reliable when used indoors. C) New software would need to be installed on devices for the policy to take place. D) Many devices would need to be excluded from the policy.

B, D

What options may be available for an 802.11n network that are not supported under 802.11g? A) OFDM B) 5 GHz frequency band C) 2.4 GHz frequency band D) MIMO E) Channel bonding

B, D, E

Which of the following is not a viable wireless security configuration (select all that apply)? A) MAC ACL B) WEP encryption C) Multiple SSID D) DHCP issue limiting E) BPDU guard F) Change default username and password G) Client isolation

B, E

Documenting a "find" after a war driving excursion is known as what? A) Updating B) Blogging C) War chalking D) War marking

C

Users in the corner of an office building cannot get good Wi-Fi reception.Your office manager doesn't want to use his budget to purchase a new AP.He's noticed that the power level control on the AP is set to 3 out of 5 and wants to know why turning up the power isn't the best solution? A) Increasing the power may cause attenuation B) Increasing the power will not change the signal strength C) Increasing the power may cause interference with another cell D) Increasing the power may cause over saturation

C

What antenna type is designed to be mounted on a wall? A) Omni B) Dipole C) Patch d) Directional/Yagi

C

What antenna type sends out a half-sphere radiation pattern? A) Omni B) Dipole C) Patch d) Directional/Yagi

C

What is required in any 802.11 network? A) router B) switch C) Wireless Access Point D) DNS server

C

What is the function of an Independent Basic Service Set (IBSS)? A) Is a mesh station capable of discovering one another and peering. B) Allows clients to join a Wireless Local Area Network (WLAN) through the network name. C) Is a wireless technology that allows peer connections without the use of an access point. D) Is a special management frame broadcast by the Access Point (AP) to advertise the Wireless Local Area Network (WLAN).

C

What is the most common way to fix jitter? A) Upgrade network security B) Change WAP password C) Increase capacity D) Manually set WAP to a separate channel

C

What type of enterprise authentication scheme uses server-side and client-side certificates to protect the user authentication credential? A) TKIP B) EAP- FAST C) EAP-TLS D) PEAP

C

Which choice is not a step in planning and installing a wireless network? A) Perform site survey. B) Plan the WAP locations. C) Install patch antenna(s). D) Configure WAP security.

C

An attacker sends packets to a wireless client that results in the client not being able to communicate with the network. What type of attack is used in this scenario? A) Evil twin B) Deauthentication C) Disassociation D) Denial of Service (DoS)

C (a disassociation attack sends packets that results in the client not being completely disconnected (like ion deauthentication), but it cannot communicate on the network until it reassociates.)

Are 802.11 networks CSMA/CD or CSMA/CA?

CSMA/CA

What mechanism does RTS/CTS support, CSMA/CD or CSMA/CA?

CSMA/CA

What is the term for allowing clients to connect to a single WAP, but making it so that each client is on its own broadcast domain?

Client isolation

A 802.11b wireless device joins a network, and the throughput of the entire Wireless Local Area Network (WLAN) is affected. Consider frequency mismatch issues to determine what is the MOST likely cause. A) The adapter does not support 5 GHz. B) The client is not configured to use the correct channel. C) The client and Access Points (APs) do not support the same Multiple Input Multiple Output (MIMO). D) Compatibility mode is enabled.

D

A technician is deploying a new wireless solution that works only in the 5 GigaHertZ (GHz) band. The technican's goal is to achieve a throughput like that of Gigabit Ethernet. Which Institute of Electrical and Electronic Engineers (IEEE) standard is the technician using in this scenario? A) 802.11n B) 802.11g C) 802.11b D) 802.11ac

D

A technician receives a report that a wireless device has a weak signal. The technician verifies that the device is within the supported range. Further troubleshooting identifies that a great deal of refraction is the cause of the issue. What device or object can cause this problem? A) Mirrors B) Walls C) Cordless phone D) Water

D

What antenna type sends out a stretched-out football radiation pattern? A) Omni B) Dipole C) Patch d) Directional/Yagi

D

What type of enterprise authentication scheme uses server-side certificates to protect the user authentication credential? A) TKIP B) EAP- FAST C) EAP-TLS D) PEAP

D

Which choice is not a typical Wi-Fi problem? A) Wrong WAP password B) WAP configuration has changed C) Interference D) WPS failure

D

Which of the following are characteristics of an enterprise wireless network? A) WAPs are managed by a wireless controller B) All WAPs are managed and configured with a single utility C) Enterprise WAPs with a common SSID work cooperatively D) All of the answers

D

Your office block is hosting a conference event. During the morning coffee break, several guests report that they cannot access their webmail. What is the likely cause? A) Absorption from the amount of people B) Electromagnetic interference from the new devices C) Attenuation from increased distance D) Device saturation from the new devices

D

ohn is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a WAP with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat? A) Interference B) War driving C) Blue snarfing D) Rogue access point

D

What does PoE describe? A) Using power lines to carry Ethernet data B) Using power cables as wireless antennas in Wi-Fi environments C) Using wireless access points to provide power to wireless clients D) Using Ethernet cables to carry data and power to network devices

D (Power over Ethernet (PoE) uses the unused wired in twisted pair Ethernet cables to carry power to network devices such as wireless access points (WAPs).)

What environment is more likely to use a wireless controller: SOHO or Enterprise?

Enterprise

What is an intentional rogue access point called?

Evil twin

True or False? Suppressing transmission of the WLAN beacon improves security.

False (The beacon cannot be suppressed completely because clients use it whenconnecting with the AP. Increasing the broadcast interval reduces network overhead, but it increases the time required to find and connect to the network.)

True of false: Both Wifi analyzers and spectrum analyzers can detect electromagnetic interference.

False (only spectrum analyzers can detect electromagnetic interference)

What term describes how far an antenna signal radiates?

Gain

Is WPS secure (yes or no)?

No

Is an ad hoc topology more scalable than a wireless mesh topology?

No (a wireless mesh is more scalable than an ad hoc)

What is the term for the word/phrase that is broadcasted to devices attempting to login to a wireless network?

SSID

Evaluate the Institute of Electrical and Electronic Engineers (IEEE) 802.11 standards to determine what occurs during the Multiple Input Multiple Output (MIMO) process. A) The bandwidth is increased by multiplexing the signals from 2 to 4 separate antennas. B) The Access Point (AP) uses its multiple antennas to process a spatial stream of signals in the direction of a particular station. C) The Access Point (AP) mediates communications between wireless stations and provides a bridge to a cabled network segment. D) Bandwidth increases from using the option to consolidate two adjacent 20 MegaHertZ (MHz) channels to a single 40 MHz channel.

A

WPA uses which encryption protocol? A) TKIP B) CCMP-AES C) WPS is unencrypted

A

WPS is used for what purpose? A) Automatically configures a wireless device to connect to a WAP B) Automatically sets up a personal area network C) Automatically shares the Wi-Fi password D) Automatically applies protection services to wireless devices

A

What antenna type sends out a sphere radiation pattern? A) Omni B) Dipole C) Patch d) Directional/Yagi

A

What does ad-hoc mode describe? A) Wireless network comprised only of peer computers B) Wireless devices connected to a WAP C) A bluetooth environment comprised of a mouse and keyboard D) 802.11 network

A

Which of the following is not a security task that should be performed on a new WAP? A) Enable backward compatibility. B) Change administrator account and password. C) Disable SSID broadcast. D) Enable encryption.

A

Which of the following is not an antenna type typically found in a Wi-Fi environment? A) Tripole B) Dipole C) Yagi D) Patch

A

Identify the characteristics of a rogue Access Point (AP). (Select two) A) A rogue Access Point (AP) can be malicious or accidental. B) A rogue Access Point (AP) is used to perform a deauthentication attack. C) A rogue Access Point (AP) can be an evil twin. D) A rogue Access Point (AP) is used for geofencing.

A, C

The lobby area of your office building has undergone a renovation, the centerpiece of which is a large aquarium in the middle of the room, separating a visitor seating and greeting area from the reception desks, where the AP facilitating guest Internet access is located. Since the renovation, many guests have been unable to connect to Wi-Fi from the seating area. Could the aquarium really be the cause, and what solution could you recommend? (Choose 2) A) Yes, a dense body of water could cause absorption and refraction issues B) Yes, a dense body of water could cause electromagnetic interference C) No, wireless signals can easily pass through water D) Mount a second AP, preferably to the ceiling to avoid interference E) Upgrade wireless standard F) No solution necessary

A, D

Which IEEE WLAN standards specify a data transfer rate of up to 54 Mbps? (Choose all that apply) A) 802.11a B) 802.11b C) 802.11n D) 802.11ac E) 802.11g

A, E

True or False: SSID Infrastructure Mode utilizes a WAP, while Ad Hoc Mode does not.

True

True or False: the 8-digit code passed between the router & the connecting device during WPS is easily hackable?

True

True or False? Stations with 802.11ac capable adapters must be assigned to the 5 GHz frequency band.

True

True or false: The BSSID is the MAC address of an AP.

True

True or false: a thin AP requires a wireless controller, a fat AP does not require a wireless controller.

True


Set pelajaran terkait

Health Assessment Chapter 13 PrepU

View Set

CH 25 Anatomy by Trying2GetFitOH

View Set

ATI PN Nursing Care of Children 2020 Practice A

View Set

Unit 15: Agency in Real Estate Quiz

View Set

Monopolistic Competition Chapter 25 Practice

View Set

Chapter 36: Emergency Preparedness and Protective Practices

View Set

Business Strategy chapter 10 Connect Questions

View Set