Section 6.12 SOHO Configuration
Which of the following is not one of the ranges of IP addresses defines in RFC 1918 that are commonly used behind a NAT server? a. 192.168.0.1 - 192.168.255.254 b. 172.16.0.1 - 172.31.255.254 c. 10.0.0.1 - 10.255.255.254 d. 169.254.0.1 - 169.254.255.254
169.254.0.1 - 169.254.255.254
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select Three) a. 224.15.166.12 b. 32.188.99.10 c. 240.12.188.1 d. 192.168.12.253 e. 127.0.0.1 f. 172.18.188.67 g. 10.0.12.15
192.168.12.253 172.18.188.67 10.0.12.15
You've just finished installing a wireless access point from a client. Which action best protects the access point from unauthorized configuration settings? a. Changing the administrative password b. Disabling the SSID broadcast c. Disabling DHCP d. Implementing MAC address filtering
Changing the administrative password
You've just installed a wireless access point (AP) for your organization's network. You know that the radio signals used by the AP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select Two) a. Disable the spread-spectrum radio signal feature on the AP. b. Use the AP configuration utility to reduce the radio signal strength. c. Configure the AP to filter out unauthorized MAC addresses. d. Implement an AP with a shorter range. e. Disable DHCP on the AP. f. Install a radio signal jammer at the perimeter of your organization's property.
Configure the AP to filter out unauthorized MAC addresses. Disable DHCP on the AP.
A customer has called an indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed Internet connection. Which of the following will help resolve this issue? (Select Two) a. Use the access point configuration utility to change the signal channel. b. Implement WPA2 c. Disable SSID broadcast on the AP d. Install radio signal jamming equipment between his house and the neighbor's house. e. Upgrade to an 802.11g access point
Implement WPA2 Disable SSID broadcast on the AP
You need to place a wireless access point in your two-story building? While trying to avoid interference, which of the following is the best location for the access point? a. In the basement b. Near the backup generators c. In the top floor d. In the kitchen area
In the top floor
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem? a. Interference is affecting the wireless signal. b. MAC filtering is preventing the computer from connecting. c. The client computer is using the wrong channel number. d. SSID broadcast has been disabled. e. The user has not yet rebooted her laptop computer while at her new location.
Interference is affecting the wireless signal.
What is the least secure place to locate the access point when creating a wireless network? a. In common or community work areas b. In the center of the building c. Near a window d. Above the 3rd floor
Near a window
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select Two) a. Near DCHP servers b. Near exterior walls c. Near cordless phones d. In the top floor of a two-story building e. Near backup generators
Near cordless phones Near backup generators
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? a. Place access points near outside walls. b. Place access points in the basement. c. Place access points above where most clients are. d. Place multiple access points in the same area.
Place access points above where most clients are .
A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the case of the problem? a. The client has incorrect WPA2 settings. b. The client system has moved too far away from the access point. c. An SSID mismatch between the client and the server. d. The encryption level has been erroneously set back to the default setting. e. An SSID mismatch between the client and the WAP.
The client system has moved too far away from the access point.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem? a. The user has not yet rebooted her laptop computer while at her new location. b. The user is out of the effective range of the wireless access point on her floor. c. The wireless network access point on the user's normal floor has failed. d. The user has not yet logged off and back on to the network while at her new location. e. The user needs a new IP address because she is working on a different floor.
The user is out of the effective range of the wireless access point on her floor.
Which of the following are good reasons to enable NAT? a. To limit public access to just your DHCP server instead of your whole network b. To translate between Internet IP addresses and the IP addresses on your private network c. To prevent hackers from assessing your network d. To cache web pages
To translate between Internet IP addresses and the IP addresses on your private network
You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the route? a. Enable NAT b. Update the firmware c. Configure the DHCP service d. Configure port triggering
Update the firmware
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? a. Kerberos b. WPA2 c. WPA d. WEP
WPA2