Wireless Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

c. WPA2 enterprise

A company wants to simplify network authentication for their users. Which of the following would be used to implement wireless security with single sign-on? a. PAT b. Stateful firewall c. WPA2 enterprise d. WEP

a. WPA

A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this? a. WPA b. Stateful inspection c. Open with EAP d. WEP

d WEP

A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose? a WPA2 b WPS c WPA d WEP

a. Evil twin

A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP? a. Evil twin b. War driving c. DDoS d. Man-in-the-middle

d 802.11a

Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? a 802.11b b 802.11n c 802.11g d 802.11a

b. Clear line of sight

Which of the following is a requirement for bridging with 802.11a? a. Governmental licenses b. Clear line of sight c. WPA encryption d. High gain yagi antennas

c. Clear line of sight

Which of the following is a requirement for bridging with 802.11a? a. WPA encryption b. High gain yagi antennas c. Clear line of sight d. Governmental licenses

d A WAP

Which of the following is known as a Basic Service Set in infrastructure mode? a A RADIUS server b A TKIP c A WPA d A WAP

c. RADIUS

Which of the following is needed when using WPA2-Enterprise wireless encryption? a. TFTP b. LDAP c. RADIUS d. IPSec

c. Create a MAC filter containing the current users.

Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect? a. Change the encryption type to AES 256-bit for current users. b. Reduce the signal strength to 0 percent. c. Create a MAC filter containing the current users. d. Turn off SSID broadcast.

a Speed

Which of the following is the difference between 802.11b and 802.11g? a Speed b Distance c Transmission power Explanation: 802.11b has a maximum speed of 11Mbps whereas 802.11g has a speed of 54Mbps. d Frequency

a. Enable mixed mode

Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate? a. Enable mixed mode b. Enable 'n' only mode c. Disable SSID d. Disable encryption

a. WPA2 (WPA2 is the most secure because it uses CCMP-AES, a 128-bit cipher that is harder to crack than the 128-bit TKIP wrapper used by WPA. Both WPA and WPA2 are stronger than WEP. WEP2 was never fully developed.)

Which of the following is the most secure method of wireless encryption? a. WPA2 b. WPA c. WEP d. WEP2

a 802.11n

Which of the following is the only standard that can operate at either frequency? a 802.11n b 802.11g c 802.11a d 802.11b

a. 2.4 GHz at 54 Mbps

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards? a. 2.4 GHz at 54 Mbps b. 2.4 GHz at 128 Mbps c. 2.0 GHz at 33 Mbps d. 5.0 GHz at 54 Mbps

b. 802.11n

Which of the following technologies can change channel widths? a. 802.11a b. 802.11n c. Bluetooth d. 802.11b

b. 802.11a

Which of the following technologies has more non-overlapping channels to utilize in a wireless LAN? a. 802.11i b. 802.11a c. 802.11b d. Bluetooth

MAC address filtering

Which of the following wireless security measures, although widely implemented, does not provide strong security? WPA2 IPSec MAC address filtering 802.1x

c 802.11a / 802.11n

Which of the following wireless standards can operate on the same frequency but are not compatible? a 802.11g / 802.11n b 802.11a / 802.11b c 802.11a / 802.11n d 802.11b / 802.11g

c. 802.11b

Which of the following wireless standards has a maximum rate of less than 50 Mbps? a. 802.11g b. 802.11n c. 802.11b d. 802.11a

d. 802.11a

Which of the following wireless standards is capable of ONLY operating on 5.8GHz? a. 802.11n b. 802.11g c. 802.11b d. 802.11a

d. 802.11b

Which of the following wireless standards provide speed of 11Mbps? a. 802.11a b. 802.11n Explanation: 802.11a - 54Mbps - OFDM 802.11b - 11Mbps - DSSS 802.11g - 54Mbps - OFDM/DSSS 802.11n - 150/300Mbps (MIMO) - OFDM c. 802.11g d. 802.11b

c. 802.11n

Which of the following wireless standards provide speeds up to 150Mbps? a. 802.11a b. 802.11g c. 802.11n d. 802.11b

a. N

Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds? a. N b. A c. G d. B

d. A

Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps? a. G b. N Explanation: 802.11a standard uses the same core protocol as the original standard, operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s. The data rate is reduced to 48, 36, 24, 18, 12, 9 then 6 Mbit/s if required. c. B d. A

a. Enable an SNMP agent

Which of the following would Kim, a technician, do to monitor remote traffic through an access point? a. Enable an SNMP agent b. Select WPA2 c. Enable network mapping d. Set monitoring SSID

d. PKI

Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates? a. TACACS+ b. Kerberos c. RADIUS d. PKI

b Satellite

Which of these communication systems will have the longest delay? a wifi b Satellite c Fiber Optic d UTP

b. Wireless telephones

Which of these consumer electronics may cause interference with 802.11n wireless networks? a. Wireless televisions b. Wireless telephones c. Television remote controls d. Cellular telephones

802.11b

Which wireless standard works at a MAXIMUM data rate of up to 11Mbps? 802.11a 802.11g 802.1q 802.11b

c 802.11g

Which wireless standard works at a MAXIMUM data rate of up to 54Mbps? a 802.11b b 802.1q c 802.11g d 802.11n

d. places all or almost all of the application logic on the server

A "thin client" architecture approach: a. always is a two-tier network architecture b. refers to the size of the cable connecting the clients to the network c. always is an n-tiered architecture d. places all or almost all of the application logic on the server e. places all or almost all of the application logic on the client

a. 16 kbps

A 16 QAM constellation diagram has 16 bits per symbol. If I can send 1,000 symbols per second what is my bits per second rate a. 16 kbps b. 32 kbps c. 1 kbps d. Not enough information to determine bit rate

a. WAP d. Switch

A SOHO (small office/home office) client has tasked Fred, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Fred need to purchase for his client? (Select TWO). a. WAP b. UTM device Answer: CD c. Repeater d. Switch e. IDS

a. The laptops are only capable of functioning on 2.4GHz spectrum

A SOHO company just installed new 802.11a wireless APs. All company laptops have gigabit LAN ports along with wireless-g cards. Which of the following is the issue with this setup? a. The laptops are only capable of functioning on 2.4GHz spectrum b. The wired network is likely not backwards compatible with the gigabit LAN ports on the laptops c. The laptops will have a max wireless speed of 300Mbps d. The wireless system will only function at a slow 11Mbps

a Move the access point

A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity? a Move the access point b Disable SSID broadcast c Change the broadcast channel d Increase the signal strength

b Channel selection

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client's wireless network to help ensure that interference from other wireless networks is at a minimum? a WPA encryption key selection b Channel selection c Antenna types d Disable SSID

a. Incompatible NICs

A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point. Which of the following is the MOST likely reason some users cannot connect? a. Incompatible NICs b. Incorrect SSID c. Weak encryption d. Incorrect channel

d Change the channel to be unique for each WAP.

A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended? a Change the antenna direction to be unique for each WAP. b Change the encryption method to be unique for each WAP. c Change the SSID to be unique for each WAP. d Change the channel to be unique for each WAP.

c. 802.11ac with 2 spatial streams and an 80MHz bandwidth

A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need? a. 802.11ac with 3 spatial streams and a 40MHz bandwidth b. 802.11ac with 4 spatial streams and a 160MHz bandwidth c. 802.11ac with 2 spatial streams and an 80MHz bandwidth d. 802.11ac with 3 spatial streams and a 20MHz bandwidth

A RADIUS server and an access point

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results? A RADIUS server and an access point A RADIUS server and a network controller A TACACS+ device and a RADIUS server A TACACS and a proxy server

b. WPA Enterprise d. 802.1x

A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO). a. MAC address filtering b. WPA Enterprise c. WPA2 Personal d. 802.1x e. 802.1q

c MAC filtering

A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured? a SSID disable b ACL rules c MAC filtering d WPA encryption

b. MAC filtering

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk's wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk? a. Host-based antivirus b. MAC filtering c. Firewall d. Web filtering

d Wireless router

A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC's that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network? a. Wireless bridge b VPN concentrator c Default WAP d Wireless router

b. Change the antennas.

A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this? a. Change the broadcast channel. b. Change the antennas. c. Lower the signal strength. d. Disable the SSID.

b. WPA2

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method? a. SSID disable b. WPA2 c. SNMPv3 d. WEP

d. Close to the suspended ceiling, but not above.

A consultant is installing new WAPs for an office using wall mounts. Which of the following is the BEST location for the new boxes for signal strength and coverage? a. Above the suspended ceiling with antennas positioned upward. b. Above the suspended ceiling with antennas positioned downward. c. Close to the floor level to allow the signal to traverse the floor laterally. d. Close to the suspended ceiling, but not above.

c Channels

A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems? a Firewalls b VLANs c Channels d Antenna types Explanation: Protocol requires 16.25 to 22 MHz of channel separation (as shown above), adjacent channels overlap and will interfere with each other. Channels 1, 6, and 11 are the most common channels to choose, and most routers will use one of them as the default channel--but the general idea is to be as far away from everybody else as you can.

d. Change the channel to a different channel than the other wireless networks.

A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network? a. Change the WAP to a different manufacturer than the other wireless networks. Explanation: To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs. You can use any other channel instead of the one that you are using. b. Change the SSID to match other wireless networks for increased throughput. c. Change the encryption type to a different mechanism to avoid interference. d. Change the channel to a different channel than the other wireless networks.

c 802.11a e 802.11ac

A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO) a 802.11b b 802.11g c 802.11a d 802.11n e 802.11ac

a. Establish a plan of action

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step? a. Establish a plan of action b. Establish a theory of probable cause c. Identify the problem d. Question the user

d. CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol)

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method? a. WEP b. TKIP c. CHAP d. CCMP

b Jamming

A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing? a Removing the AP from the classroom b Jamming c Firewall d IPS e ACL

d Use a wireless controller

A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings. Which of the following methods provides this functionality? a Use WAP auto-configuration b Use DHCP scope options c Use PXE to load and track WAPs d Use a wireless controller

a. Dictionary file

A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key? a. Dictionary file b. Buffer overflow c. DoS d. SQL injection

c. Signal strength

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review? a. WPA2 encryption b. WEP encryption c. Signal strength d. SSID name

d. Use the same SSIDs on different channels and AP isolation

A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the BEST way to configure the new wireless network in the new building? a. Use different SSIDs on the same channels with VLANs b. Use the same SSIDs on same channels with AP isolation c. Use different SSIDs on different channels and VLANs d. Use the same SSIDs on different channels and AP isolation

a. WAP placement

A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment? a. WAP placement b. Transmission power c. Signal strength d. TX/RX channel

d. 11, 1, 6, 11, 1, 6, 11

A network administrator needs to deploy seven equally spaced WAPs along an underground tunnel. Which of the following is the BEST channel design to avoid interference? a. 1, 11, 1, 11, 1, 11, 1 b. 1, 6, 11, 1, 1, 6, 11 c. 1, 3, 5, 7, 9, 11, 1 d. 11, 1, 6, 11, 1, 6, 11

c. 36, 44, 52, 60

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels? a. 36, 40, 44, 48 b. 36, 48, 60, 64 c. 36, 44, 52, 60 d. 36, 44, 48, 52

b. The number of allowable MAC addresses.

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed? a. The signal strength of the router. b. The number of allowable MAC addresses. c. The network address translation IP range. d. The DCHP lease time.

c Site survey

A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference which of the following? a PoE requirements b Network diagram c Site survey d Network topology

a 802.11ac

A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design? a 802.11ac b 802.11a c 802.11b d 802.11g

a. Placement

A network technician has received a help desk ticket indicating that after the new wireless access point was installed, all of the media department's devices are experiencing sporadic wireless connectivity. All other departments are connecting just fine and the settings on the new access point were copied from the baseline. Which of the following is a reason why the media department is not connecting? a. Placement b. Channel mismatch c. Wrong SSID d. Rogue access point

d. Channel

A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting? a. SSID b. Encryption c. Firewall rule d. Channel

b. Rogue AP

A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find? a. AP isolation b. Rogue AP c. DDoS d. Evil twin

a. Yagi

A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution? a. Yagi b. Parabolic c. Patch d. Omni-directional

b. Channel bonding

A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution? a. Disable SSID b. Channel bonding c. MIMO d. Increase the signal

a. 1, 6, 11

A network technician needs to install an additional access point to the company's wireless network. The network has two 802.11b access points. Which of the following channels should be used to allow the access point's coverage areas to overlap? a. 1, 6, 11 b. 3, 13, 23 c. 2, 5, 10 d. 4, 8, 16

d. Incorrect channel

A new SOHO wireless network is set up using two access points with separate SSIDs on the same frequency. However, the users are experiencing intermittent connectivity on both SSIDs. Which of the following is the problem? a. Encryption type b. SSID mismatch c. Wrong DNS d. Incorrect channel

Incompatible hardware

A new WAP is configured to only use 802.11g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem? Incorrect encryption type EUI-64 Incompatible hardware Latency

d. Signal strength

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following? a. SSID mismatch b. Channel mismatch c. Encryption mismatch d. Signal strength

b Directional

A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements? a Parabolic b Directional c Dipole d Omni-directional

b. doubling the channel width.

A technician can increase the bandwidth of an 802.11n cell by: a. adding a second access point. b. doubling the channel width. c. disabling MIMO. d. enabling diversity.

b Latency

A technician has determined that calls placed over a wireless connection are breaking up and the speaker's voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues? a Bad GBIC b Latency c SSID mismatch d Bad SFP

b. Signal bounce

A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability? a. Wrong encryption type b. Signal bounce c. Incorrect channel d. SSID mismatch

a. Channel width is set to 40MHz

A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason? a. Channel width is set to 40MHz b. Channels are in the 5GHz range by mistake c. Channel 1 should have been set to 11 to avoid an overlap d. Channels below 9 overlap each other

a SSID broadcasting is disabled on the WAP

A technician is attempting to set up a new laptop for a user. The user's old laptop connects to the corporate wireless network "CompanyWiFi" automatically. However, when the technician looks for the "CompanyWiFi" network on the new laptop, he does not find it in the list of available networks. Both laptops have 802.11g wireless network adapters and are sitting next to each other on the user's desk. Which of the following would MOST likely be the reason that the new laptop cannot see the "CompanyWiFi" network? a SSID broadcasting is disabled on the WAP b RFID interference from other electronic devices c Incorrect WEP key was input d Loss of signal strength

b. 2

A technician is installing 802.11a wireless access points in an open warehouse 300 feet (91.44 meters) long and 200 feet (60.96 meters) wide. Which of the following would be the LEAST number of devices needed to provide coverage to the entire building? a. 3 b. 2 c. 4 d. 1

b. 802.11b

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using? a. 802.11n b. 802.11b c. 802.11g d. 802.11a

a. SSID broadcast e. Encryption

A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO). a. SSID broadcast b. Channel c. Frequency d. Diversity e. Encryption

b. The WAP is using AES encryption e. The WAP is using the 5GHz channel

A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition. myClient$ wificard --getinfo agrCtlRSSI: -72 agrExtRSSI: 0 state: running op mode: station lastTxRate: 178 MaxRate: 300 802.11 auth: open link auth: wpa2-psk BSSID: 0F:33:AE:F1:02:0A SSID: CafeWireless Channel: 149,1 Given this output, which of the following has the technician learned about the wireless network? (Select TWO) a. The WAP is using 802.11g b. The WAP is using AES encryption c. The WAP is using the 2.4GHz channel d. The WAP is using RC4 encryption e. The WAP is using the 5GHz channel f. The WAP is using 802.11a

d. WAP placement

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST? a. Encryption type b. WAP SSID c. Bandwidth saturation d. WAP placement

d. The 802.11n WAPs are using a 5 GHz frequency channel.

A technician is troubleshooting a wireless network that was setup previously. The network is a hybrid of 802.11g and 802.11n WAPs. Users are not able to view or connect to the 802.11n WAPs. Which of the following is MOST likely the cause? a. The 802.11g WAPs are not setup for backwards compatibility. b. The 802.11g WAPs all have disabled SSID broadcast. c. The 802.11n WAPs are using a 2.4 GHz frequency channel. d. The 802.11n WAPs are using a 5 GHz frequency channel.

b. Key rotation

A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following? a. Shared secret keys b. Key rotation c. AES encryption d. Strong RC4 encryption

c. MAC address filtering

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration? a. PoE b. WEP c. MAC address filtering d. Port filtering

b. High availability

A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method? a. Load balancing b. High availability c. Quality of Service d. Caching engines

b. rogue access point.

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a: a. man-in-the-middle attack. b. rogue access point. c. evil twin. d. packet sniffer.

d. SSID mismatch

A user calls the helpdesk to report not being able to access network resources over the company's Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause? a. Antenna placement b. Incorrect WPA key c. Signal bounce d. SSID mismatch

c installed the printer in ad-hoc mode

A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office. The used has MOST likely: a Installed the printer in infrastructure mode b Installed the printer in the wrong subnet c installed the printer in ad-hoc mode d misconfigured the gateway on the wireless printer

a Interference

A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions? a Interference b Crosstalk c Bouncing signal d Signal strength latency

b. Re-establish a new theory or escalate.

A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT? a. Implement the solution or escalate as necessary. b. Re-establish a new theory or escalate. c. Test the theory to determine a cause. d. Establish a plan of action to resolve the problem.

b Adjust the signal strength of the access points with minimal coverage overlap.

A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues? a Configure each access point to use a different method of encryption than the others. b Adjust the signal strength of the access points with minimal coverage overlap. c Reconfigure each of the access points so that they broadcast different SSIDs. d Increase the pool in each of the access points to avoid running out of IPs.

a. Incorrect SSID

A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause? a. Incorrect SSID b. AP placement c. Interference d. Signal strength

d. Channel overlap

A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem? a. WEP encryption Explanation: To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs. b. Incompatible network card c. Latency d. Channel overlap

a WAP radio power

A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured? a WAP radio power b Channel overlay c WAP encryption strength d SSID name

c. MAC filtering

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points? a. TLS/TTLS b. IP ACL c. MAC filtering d. Port forwarding

a. 11 Mbps.

An 802.11b wireless network has a maximum data rate of: a. 11 Mbps. b. 54 Mbps. c. 20 Mbps. d. 28 Mbps.

d. Change the channel on the access point to channel 11.

An administrator is receiving reports from an executive that the executive's wireless access point loses the signal frequently, even though the WAP is on the executive's desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive's office? a. Turn off as many lights in the executive's office as possible to reduce interference. b. Replace the 802.11n access point in the office with an 802.11a access point. c. Turn off SSID broadcasting for the executive's access point. d. Change the channel on the access point to channel 11.

d. PoE

An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation? a. Multimode fiber b. Wireless bridge c. Coaxial d. PoE

c. Channel bonding

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using? a. MIMO b. AP isolation c. Channel bonding d. Burst mode

d An 802.11n smartphone

An office has an 802.11a access point. A technician has been asked to identify devices that are compatible with this AP. Which of the following devices is MOST likely compatible? a An 802.11g laptop b An 802.1q SOHO router c An 802.11b tablet computer d An 802.11n smartphone

a. Connection speed

Channel bonding will improve which of the following wireless characteristics? a. Connection speed b. Signal strength c. Coverage area d. Encryption strength

c SSID Mismatch

Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network. Which of the following settings is incorrect on the client? a Incorrect WEP Key b The mode is incorrect c SSID Mismatch d Channel is set incorrectly

c. SSID Mismatch

Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network. Which of the following settings is incorrect on the client? a. The mode is incorrect b. Incorrect WEP Key c. SSID Mismatch d. Channel is set incorrectly

b WPA2, SSID disabled, and 802.11a.

During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario? a WEP, SSID disabled, and 802.11g. b WPA2, SSID disabled, and 802.11a. c WEP, SSID enabled, and 802.11b. d WPA2, SSID enabled, and 802.11n.

d Conduct a wireless survey of the back warehouse.

Fred, a network technician, is asked to install a couple new WAP's inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Fred already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Fred should do before choosing which WAP's to use? a Ask the vendor that provided the WAP's for the main warehouse for recommendations. b Only order WAP's that support 5GHz channels. c Ask the systems administrator which WAP's are preferred. d Conduct a wireless survey of the back warehouse.

a TKIP e AES

Fred, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO). a TKIP b SSL c TLS d SSH e AES f 3DES

c. Determine which wireless channels and bands to use to mitigate as much interference as possible.

Fred, a network technician, is tasked with setting up a new wireless network in an office for office laptops and desktops only. The surrounding offices already have many wireless networks. Fred discovered that over 30 wireless networks were showing up as he completed a wireless survey of the office. Every single one of the networks that Fred was able to see while conducting the wireless survey were 802.11b/g networks. Which of the following should Fred consider before purchasing/installing the new wireless access points? a. Determine if the business should relocate to a building with a lot less surrounding wireless networks. b. Turn the SSID broadcasts off to decrease interference. c. Determine which wireless channels and bands to use to mitigate as much interference as possible. d. Move the WAP so that it is close to the interior walls.

c. The wireless router at the customer's site is configured with MAC filtering.

Fred, a vendor, walks into a customer's site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site's wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem? a. The customer's wireless router uses WPA encryption. b. The customer's WAP uses WEP encryption. c. The wireless router at the customer's site is configured with MAC filtering. d. The customer's IT department blocks all visitors from connecting to their network.

d. Wireless channel

George, a business owner, has discovered that several of the nearby businesses have wireless networks. George wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks? a. MAC filtering b. WPA encryption c. PPPoE authentication d. Wireless channel

a. WPA encryption c. MAC filtering

George, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. George believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO). a. WPA encryption b. Changing wireless channels c. MAC filtering d. SSID disable e. Changing wireless speed standards

MAC filtering

If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network? Wireless standard Encryption type MAC filtering Device placement

d decreases

In RF communications when wavelength increases, frequency ____. a stays the same b there is no relationship between wavelength and frequency c increases d decreases

c. MIMO, OFDM

In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n? a. CSMA, CDMA Explanation: 802.11n builds upon previous 802.11 standards by adding multiple-input multiple- output (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level) b. CSMA, DSSS c. MIMO, OFDM d. MIMO, DSSS

c Disable 802.11b and 802.11g

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients? a Limit the DHCP address pool b Name the SSID on the 802.11n network only c Disable 802.11b and 802.11g d Only use WPA encryption

a. Set up encryption on the WAP and clients

Jennifer, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network? a. Set up encryption on the WAP and clients b. Change the device placement to further obfuscate the signal c. Decrease signal strength on the antenna d. Change the wireless channel on the WAP

a. Decreasing radio strength

Jennifer, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this? a. Decreasing radio strength b. MAC filtering c. WEP encryption d. SSID broadcast disable

c. Users with a slow connection are too far away from the wireless router.

Jennifer, a technician, installs a wireless router in a network closet in a large office. She then configures all workstations in various offices on that floor to use the wireless connection. Maximum connection speed at each workstation is 54 Mbps. Some users complain that their network connection is very slow. Which of the following is MOST likely the problem? a. Workstations were configured with the wrong connection speed on the wireless adapter. b. Users that cannot connect are configured on the wrong channel. c. Users with a slow connection are too far away from the wireless router. d. Wireless network SSID is incorrect.

d. Evil twin

Jennifer, a user, connects to her company's secured wireless network in the conference room when attending meetings. While using the conference room this morning, Jennifer notices an unsecured wireless network with the same name is available. Jennifer connects her laptop to this network instead of to the secured one. Jennifer has fallen victim to which of the following threats? a. ARP poisoning b. Rogue access point c. Replay attack d. Evil twin

d Bounce

Jennifer, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal. Which of the following is the MOST likely cause of the issue? a AP configuration b Signal-to-noise ratio c Incorrect SSID d Bounce

b Reduce the transmission power

Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue? a Change the security method b Reduce the transmission power c Change the frequency d Change the SSID

a. Multipath support

MIMO technology in the 802.11n standard provides for which of the following benefits? a. Multipath support b. Channel expansion c. Gigabit wireless bandwidth d. Channel bonding

a. Use a VPN after connecting to the coffee shop wireless

Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop? a. Use a VPN after connecting to the coffee shop wireless b. Enable the host-based firewall on each of the laptops c. Edit the SSID connection information and change 'open' to 'shared' d. Connect to the open SSID then switch on WPA2 encryption

b Modulation

OFDM, QAM and QPSK are all examples of which of the following wireless technologies? a RF interference b Modulation c Frequency d Spectrum

a Change SSID in Building C to match Building A

Some employees are unable to maintain a wireless network connection. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings? a Change SSID in Building C to match Building A b Change Encryption in Building B to match A and C c Change Channel in Building B to 7 d Change Channel in Building C to 1

a. Encryption set to Open in Building B

Some visitors are unable to access the wireless network. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors? Building A Building B Building C Channel: 2 Channel: 6 Channel: 11 Encryption: WPA2 Encryption: WPA2 Encryption: WPA2 a. Encryption set to Open in Building B b. Encryption set to WEP in Building B c. Encryption set to Open in all Buildings d. Channel set to 11 in Building B

a. The channels are overlapping with other wireless networks and should be changed.

Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem? a. The channels are overlapping with other wireless networks and should be changed. b. The users have incompatible wireless network cards and should upgrade. c. The default idle period for logoff is too short and should be changed to a longer limit. d. The SSIDs are incompatible and should be renamed.

c The installation exceeds the link limitations

The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue? a The dBi output of the antenna is too low b The antenna is mounted for vertical polarization c The installation exceeds the link limitations d The radio is too powerful for the installation Explanation: Unlike isotropic antennas, dipole antennas are real antennas. Dipole antennas have a different radiation pattern compared to isotropic antennas. The dipole radiation pattern is 360 degrees in the horizontal plane and 75 degrees in the vertical plane (assuming the dipole antenna is standing vertically) and resembles a donut in shape. Because the beam is "slightly" concentrated, dipole antennas have a gain over isotropic antennas of 2.14 dB in the horizontal plane. Dipole antennas are said to have a gain of 2.14 dBi (in comparison to an isotropic antenna).

b. Use only 20 MHz channel bandwidth

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue? a. Configure Quality of Service b. Use only 20 MHz channel bandwidth c. Configure Wi-Fi Multimedia support d. Enable band steering to use 802.11n

d. Low signal strength or interference

The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem? a. Incorrect IP address or subnet mask b. Incorrect encryption scheme c. Incorrect service set identifier d. Low signal strength or interference

c. Channel bonding

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this? a. Switch the channel b. Change frequencies c. Channel bonding d. Increase the signal

c Unplug appliances (e.g. microwaves) to see if they are causing interference.

Users are contacting the internal helpdesk, stating that they are having difficulty staying connected to the wireless network. When the technician investigates, it is discovered that the users are having a problem using the wireless network in the company break rooms. Which of the following should the technician do FIRST? a Remount the access points to a place on the ceiling closer to the break rooms. b Change the encryption on the access points from WPA2 to WEP. c Unplug appliances (e.g. microwaves) to see if they are causing interference. d Install a new access point in each break room to provide adequate coverage.

b. RADIUS

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue? a. WPA2 security key b. RADIUS c. CSMA/CA d. SSL certificates

a. Evil twin

Users in a coffee shop may connect to the shops's hotspot named "CoffeeshopWiFi". Another patron has initialized a virtual AP with an identical SSID with the goal of stealing customer's logon credentials. Which of the following is occurring in this scenario? a. Evil twin b. Man in the middle c. Spoofing d. War Driving e. Rouge AP

d. Transit beamforming (using multiple antennas)

What feature enables 802.11n networks to minimize dead spots? a. FIFO b. MIMO c. Channel bonding d. Transit beamforming

c. A wireless bridge d. An access point

What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode? (Select two.) a. A router b. A hub c. A wireless bridge d. An access point

a. 2.4GHz

What radio frequency does 802.11g use? a. 2.4GHz b. 2.4MHz c. 5.3GHz d. 900MHz

a. n

Which of the following 802.11 standards can operate at both 2.4Ghz and 5.0Ghz? a. n b. g c. a d. b

b. Unidirectional

Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a narrow path? a. Omni-direction b. Unidirectional c. Yagi d. Patch

a. WPA2

Which of the following WAP security features offers the STRONGEST encryption? a. WPA2 b. WPA c. Hidden SSID d. WEP

b. MIMO technology

Which of the following allows 802.11n higher transfer speeds than the previous wireless standards? a. Backwards compatibility b. MIMO technology c. Dual frequency d. Enhanced encryption

c. Evil twin

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key? a. Buffer overflow b. Virus c. Evil twin d. War chalking

b. Channel bonding

Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps? a. MIMO technology b. Channel bonding c. Encryption type d. Frequency

a. WPA2

Which of the following configurations of a wireless network would be considered MOST secure? a. WPA2 b. WEP using MAC Filtering c. WEP and hiding the SSID d. WPA TKIP and hiding the SSID

b. Antenna

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues? a. UTP patch cables b. Antenna c. Security standard d. Power adapter

c. yagi

You are setting up a wireless network connection between two buildings the buildings are 1 mile apart. What is the most appropriate type of antenna to use? a. planar b. omni c. yagi d. panel

d. microwave

__________ is a line-of-sight type of wireless media. a. fiber optic b. coaxial cable c. radio d. microwave e. twisted pair


Set pelajaran terkait

AP world final about mikes ancestors the nazis

View Set

CertMaster CompTIA Network+ Final Assessment

View Set

Psychology Homemade Study Guide- Chapter 10 & 11

View Set

certification PSM 1 - SCRUM, SCRUM PSM I Assessment, Professional Scrum Master 1 (PSM1) "Questions and explanations", SCRUM MASTER, Scrum Study Guide - Rachel, Scrum, Scrum, PSM I Assessment, PSM I Assessment

View Set

Web Servers and Hypertext Transfer Protocol

View Set

Chapter 8: New Product Development

View Set

Chapter 12 PMBOK 5th edition - Practice Test #10

View Set

Social Psychology 9th Edition Chapter 7

View Set

WMS050: Midterm, Key Concepts: Weeks 1-5

View Set