1. What will a wireless client transmit to discover the available WLAN networks?
probe request
2. Which function is provided by a wireless access point?
converts data from 802.11 to 802.3 frame encapsulation
3. Why is security so important in wireless networks?
Wireless networks broadcast data over a medium that allows easy access.
4. Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?
Network Name (SSID)
5. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?
CSMA/CA
6. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?
beacon
7. Which three devices do many wireless routers incorporate? (Choose three.)
gateway for connecting to other network infrastructures
built-in Ethernet switch
wireless access point
8. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?
This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
9. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
802.11a suffers from a shorter range than 802.11g.
802.11g is backward compatible with 802.11b, but 802.11a is not.
10. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance?
802.11n
11. In a WLAN network, why should wireless access points be implemented with each access point using a different channel?
to keep signals from interfering with each other
12. What purpose does authentication serve in a WLAN?
determines that the correct host is utilizing the network
13. Which major problem does CSMA/CA overcome in wireless networks?
media contention
14. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?
MAC address filtering
15. Which network design process identifies where to place access points?
site survey
16. Which two statements characterize wireless network security? (Choose two.)
A rogue access point represents a security risk for the local network.
With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.
17. What occurs when a rogue access point is added to a WLAN?
Unauthorized users can gain access to internal servers, thus causing a security hole.
18. What procedure can prevent man-in-the-middle attacks?
Force all devices on a WLAN to authenticate and monitor for any unknown devices.
19. Which installation method will allow connectivity for a new wireless network?
set up open access on both the access point and each device connected to it
20. Which two statements are true regarding wireless security? (Choose two.)
Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections.
Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.
21. Which two statements concerning network security are accurate? (Choose two.)
Open authentication uses no client or AP verification.
802.11i incorporates a RADIUS server for enterprise authentication.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Hot nude scenes of Kim Min Sun ....! Large | Medium | Small | By webmaster ] Trailer of the film "Portrait of a Beauty" wa...
-
click here to view full size
-
Rolls-Royce says one part caused Qantas A380 blow-out Rolls Royce engine The engine broke apart on a Qantas A380 aircraft on 4 November Cont...
-
Top 25 body 'sexy' best bikini Tuesday, 08/06/2010 16:00 (2Sao) - Home entertainment network information can count the number of...
-
Cisco has very recently launched the new version of Packet Tracer 5.1. I have uploaded the software with tutorials for the users who are pr...
-
Angelina Jolie had to do incest with her stepfather at age 16 Large | Medium | Small | By webmaster ] After a drunken night with t...
-
1. Which two things can be determined by using the ping command? (Choose two.) the number of routers between the source and destination dev...
-
Go bar dancing hobby's drunk teen girl from china Author: l_lovestory_l 01:22 - When night falls cover the city of Beijing is also...
-
Renault can name new car Zoe as girls' case rejected Renault's zero-emissions car, Zoe, due for release in 2012 Renault has been giv...
-
1. Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEth...
2 comments
thanks!
Great help, thanks.
Post a Comment