SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Cisco Discovery - DHomesb Module 7 - V.4 in english.

Q.1 Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth
technology?


    transmits at much lower frequencies

    has higher power output

    transmits at much higher frequencies

    uses better encryption methods



Q.2 What are three advantages of wireless over wired technology? (Choose three.)


    more secure

    longer range

    anytime, anywhere connectivity

    easy and inexpensive to install

    ease of using licensed air space

    ease of adding additional devices



Q.3 What are two benefits of wireless networking over wired networking? (Choose two.)


    speed

    security

    mobility

    reduced installation time

    allows users to share more resources

    not susceptible to interference from other devices



Q.4 A technician has been asked to provide wireless connectivity to the wired Ethernet network of a
building. Which three factors affect the number of access points needed? (Choose three.)
the size of the building

    the number of solid interior walls in the building

    the presence of microwave ovens in several offices

    the encryption method used on the wireless network

    the use of both Windows and Appletalk operating systems

    the use of shortwave or infrared on the AP



Q.5 Why is security so important in wireless networks?


    Wireless networks are typically slower than wired networks.

    Televisions and other devices can interfere with wireless signals.

    Wireless networks broadcast data over a medium that allows easy access.

    Environmental factors such as thunderstorms can affect wireless networks.



Q.6 What does the Wi-Fi logo indicate about a wireless device?


    IEEE has approved the device.

    The device is interoperable with all other wireless standards.

    The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.

    The device is backwards compatible with all previous wireless standards.



Q.7 Which statement is true concerning wireless bridges?


    connects two networks with a wireless link

    stationary device that connects to a wireless LAN

    allows wireless clients to connect to a wired network

    increases the strength of a wireless signal
Q.8 Which WLAN component is commonly referred to as an STA?


    cell

    antenna

    access point

    wireless bridge

    wireless client



Q.9 Which statement is true concerning an ad-hoc wireless network?


    created by connecting wireless clients in a peer-to-peer network

    created by connecting wireless clients to a single, centralized AP

    created by connecting multiple wireless basic service sets through a distribution system

    created by connecting wireless clients to a wired network using an ISR




Q.10 Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the
Network Mode option Mixed mean?


    The router supports encryption and authentication.

    The router supports both wired and wireless connections.

    The router supports 802.11b, 802.11g, and 802.11n devices.

    The router supports connectivity through infrared and radio frequencies.
Q.11 Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration
option allows the presence of the access point to be known to nearby clients?


    Network Mode

    Network Name (SSID)

    Radio Band

    Wide Channel

    Standard Channel

    SSID Broadcast



Q.12 Which two statements about a service set identifier (SSID) are true? (Choose two.)


    tells a wireless device to which WLAN it belongs

    consists of a 32-character string and is not case sensitive

    responsible for determining the signal strength

    all wireless devices on the same WLAN must have the same SSID

    used to encrypt data sent across the wireless network



Q.13 Which two statements characterize wireless network security? (Choose two.)
Wireless networks offer the same security features as wired networks.

    Wardriving enhances security of wireless networks.

    With SSID broadcast disabled, an attacker must know the SSID to connect.

    Using the default IP address on an access point makes hacking easier.

    An attacker needs physical access to at least one network device to launch an attack.



Q.14 What type of authentication does an access point use by default?


    Open

    PSK

    WEP

    EAP



Q.15 Which statement is true about open authentication when it is enabled on an access point?


    requires no authentication

    uses a 64-bit encryption algorithm

    requires the use of an authentication server

    requires a mutually agreed upon password



Q.16 What are two authentication methods that an access point could use? (Choose two.)


    WEP

    WPA

    EAP

    ASCII

    pre-shared keys



Q.17 What is the difference between using open authentication and pre-shared keys?
Open authentication requires a password. Pre-shared keys do not require a password.

    Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.

   Pre-shared keys require an encrypted secret word. Open authentication does not require a secret
word.

    Pre-shared keys require a MAC address programmed into the access point. Open authentication
does not require this programming.



Q.18 What term describes the encoding of wireless data to prevent intercepted data from being read by
a hacker?


    address filtering

    authentication

    broadcasting

    encryption

    passphrase encoding



Q.19 What access-point feature allows a network administrator to define what type of data can enter
the wireless network?


    encryption

    hacking block

    traffic filtering

    MAC address filtering

    authentication



Q.20 What are the two WEP key lengths? (Choose two.)


    8 bit

    16 bit
32 bit

    64 bit

    128 bit



Q.21 Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless
networks.


    encrypt; authenticate users on

    filter traffic; select the operating frequency for

    identify the wireless network; compress data on

    create the smallest wireless network; limit the number of users on

Contenu connexe

Tendances

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?Jeff Green
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...IRJET Journal
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connectionsNitin kumar Gupta
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 

Tendances (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wlan security
Wlan securityWlan security
Wlan security
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
 
Wlan security
Wlan securityWlan security
Wlan security
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 

En vedette

Cisco discovery drs ent module 5 - v.4 in english.
Cisco discovery   drs ent module 5 - v.4 in english.Cisco discovery   drs ent module 5 - v.4 in english.
Cisco discovery drs ent module 5 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 1 - v.4 in english.
Cisco discovery   d homesb module 1 - v.4 in english.Cisco discovery   d homesb module 1 - v.4 in english.
Cisco discovery d homesb module 1 - v.4 in english.igede tirtanata
 
Cisco discovery drs ent module 6 - v.4 in english.
Cisco discovery   drs ent module 6 - v.4 in english.Cisco discovery   drs ent module 6 - v.4 in english.
Cisco discovery drs ent module 6 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 3 - v.4 in english.
Cisco discovery   d homesb module 3 - v.4 in english.Cisco discovery   d homesb module 3 - v.4 in english.
Cisco discovery d homesb module 3 - v.4 in english.igede tirtanata
 
Cisco discovery drs ent module 7 - v.4 in english.
Cisco discovery   drs ent module 7 - v.4 in english.Cisco discovery   drs ent module 7 - v.4 in english.
Cisco discovery drs ent module 7 - v.4 in english.igede tirtanata
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.igede tirtanata
 
EduDivision-DATACOM NETWORKING
EduDivision-DATACOM NETWORKINGEduDivision-DATACOM NETWORKING
EduDivision-DATACOM NETWORKINGigede tirtanata
 
E wallet nfc service payment
E wallet nfc service paymentE wallet nfc service payment
E wallet nfc service paymentigede tirtanata
 

En vedette (19)

Cisco discovery drs ent module 5 - v.4 in english.
Cisco discovery   drs ent module 5 - v.4 in english.Cisco discovery   drs ent module 5 - v.4 in english.
Cisco discovery drs ent module 5 - v.4 in english.
 
Cisco discovery d homesb module 1 - v.4 in english.
Cisco discovery   d homesb module 1 - v.4 in english.Cisco discovery   d homesb module 1 - v.4 in english.
Cisco discovery d homesb module 1 - v.4 in english.
 
Ccna1v31 mod11
Ccna1v31 mod11Ccna1v31 mod11
Ccna1v31 mod11
 
Ccna1v3 mod08
Ccna1v3 mod08Ccna1v3 mod08
Ccna1v3 mod08
 
Cisco discovery drs ent module 6 - v.4 in english.
Cisco discovery   drs ent module 6 - v.4 in english.Cisco discovery   drs ent module 6 - v.4 in english.
Cisco discovery drs ent module 6 - v.4 in english.
 
Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Ccna1v3 mod10
Ccna1v3 mod10Ccna1v3 mod10
Ccna1v3 mod10
 
Ccna1v31 mod04
Ccna1v31 mod04Ccna1v31 mod04
Ccna1v31 mod04
 
Ccna1v3 mod03
Ccna1v3 mod03Ccna1v3 mod03
Ccna1v3 mod03
 
Cisco discovery d homesb module 3 - v.4 in english.
Cisco discovery   d homesb module 3 - v.4 in english.Cisco discovery   d homesb module 3 - v.4 in english.
Cisco discovery d homesb module 3 - v.4 in english.
 
Ccna1v3 mod11
Ccna1v3 mod11Ccna1v3 mod11
Ccna1v3 mod11
 
Cisco discovery drs ent module 7 - v.4 in english.
Cisco discovery   drs ent module 7 - v.4 in english.Cisco discovery   drs ent module 7 - v.4 in english.
Cisco discovery drs ent module 7 - v.4 in english.
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.
 
iSeries IBM
iSeries IBMiSeries IBM
iSeries IBM
 
EduDivision-DATACOM NETWORKING
EduDivision-DATACOM NETWORKINGEduDivision-DATACOM NETWORKING
EduDivision-DATACOM NETWORKING
 
Ccna1v31 mod03
Ccna1v31 mod03Ccna1v31 mod03
Ccna1v31 mod03
 
Ccna1v31 mod05
Ccna1v31 mod05Ccna1v31 mod05
Ccna1v31 mod05
 
E wallet nfc service payment
E wallet nfc service paymentE wallet nfc service payment
E wallet nfc service payment
 

Similaire à Cisco discovery d homesb module 7 - v.4 in english.

Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelesskratos2424
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 

Similaire à Cisco discovery d homesb module 7 - v.4 in english. (20)

Ccna 1 7
Ccna 1  7Ccna 1  7
Ccna 1 7
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Security Basics
Wireless Security BasicsWireless Security Basics
Wireless Security Basics
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 

Plus de igede tirtanata

Cisco discovery drs ent module 8 - v.4 in english.
Cisco discovery   drs ent module 8 - v.4 in english.Cisco discovery   drs ent module 8 - v.4 in english.
Cisco discovery drs ent module 8 - v.4 in english.igede tirtanata
 
Cisco discovery drs ent module 4 - v.4 in english.
Cisco discovery   drs ent module 4 - v.4 in english.Cisco discovery   drs ent module 4 - v.4 in english.
Cisco discovery drs ent module 4 - v.4 in english.igede tirtanata
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 

Plus de igede tirtanata (13)

GSM 3G Basic
GSM 3G BasicGSM 3G Basic
GSM 3G Basic
 
Cisco discovery drs ent module 8 - v.4 in english.
Cisco discovery   drs ent module 8 - v.4 in english.Cisco discovery   drs ent module 8 - v.4 in english.
Cisco discovery drs ent module 8 - v.4 in english.
 
Cisco discovery drs ent module 4 - v.4 in english.
Cisco discovery   drs ent module 4 - v.4 in english.Cisco discovery   drs ent module 4 - v.4 in english.
Cisco discovery drs ent module 4 - v.4 in english.
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Ccna1v31 mod09
Ccna1v31 mod09Ccna1v31 mod09
Ccna1v31 mod09
 
Ccna1v31 mod07
Ccna1v31 mod07Ccna1v31 mod07
Ccna1v31 mod07
 
Ccna1v31 mod06
Ccna1v31 mod06Ccna1v31 mod06
Ccna1v31 mod06
 
Ccna1v31 mod02
Ccna1v31 mod02Ccna1v31 mod02
Ccna1v31 mod02
 
Ccna1v31 mod01
Ccna1v31 mod01Ccna1v31 mod01
Ccna1v31 mod01
 
Ccna1v3 mod09
Ccna1v3 mod09Ccna1v3 mod09
Ccna1v3 mod09
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 

Cisco discovery d homesb module 7 - v.4 in english.

  • 1. Cisco Discovery - DHomesb Module 7 - V.4 in english. Q.1 Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology? transmits at much lower frequencies has higher power output transmits at much higher frequencies uses better encryption methods Q.2 What are three advantages of wireless over wired technology? (Choose three.) more secure longer range anytime, anywhere connectivity easy and inexpensive to install ease of using licensed air space ease of adding additional devices Q.3 What are two benefits of wireless networking over wired networking? (Choose two.) speed security mobility reduced installation time allows users to share more resources not susceptible to interference from other devices Q.4 A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
  • 2. the size of the building the number of solid interior walls in the building the presence of microwave ovens in several offices the encryption method used on the wireless network the use of both Windows and Appletalk operating systems the use of shortwave or infrared on the AP Q.5 Why is security so important in wireless networks? Wireless networks are typically slower than wired networks. Televisions and other devices can interfere with wireless signals. Wireless networks broadcast data over a medium that allows easy access. Environmental factors such as thunderstorms can affect wireless networks. Q.6 What does the Wi-Fi logo indicate about a wireless device? IEEE has approved the device. The device is interoperable with all other wireless standards. The device is interoperable with other devices of the same standard that also display the Wi-Fi logo. The device is backwards compatible with all previous wireless standards. Q.7 Which statement is true concerning wireless bridges? connects two networks with a wireless link stationary device that connects to a wireless LAN allows wireless clients to connect to a wired network increases the strength of a wireless signal
  • 3. Q.8 Which WLAN component is commonly referred to as an STA? cell antenna access point wireless bridge wireless client Q.9 Which statement is true concerning an ad-hoc wireless network? created by connecting wireless clients in a peer-to-peer network created by connecting wireless clients to a single, centralized AP created by connecting multiple wireless basic service sets through a distribution system created by connecting wireless clients to a wired network using an ISR Q.10 Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean? The router supports encryption and authentication. The router supports both wired and wireless connections. The router supports 802.11b, 802.11g, and 802.11n devices. The router supports connectivity through infrared and radio frequencies.
  • 4. Q.11 Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients? Network Mode Network Name (SSID) Radio Band Wide Channel Standard Channel SSID Broadcast Q.12 Which two statements about a service set identifier (SSID) are true? (Choose two.) tells a wireless device to which WLAN it belongs consists of a 32-character string and is not case sensitive responsible for determining the signal strength all wireless devices on the same WLAN must have the same SSID used to encrypt data sent across the wireless network Q.13 Which two statements characterize wireless network security? (Choose two.)
  • 5. Wireless networks offer the same security features as wired networks. Wardriving enhances security of wireless networks. With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. An attacker needs physical access to at least one network device to launch an attack. Q.14 What type of authentication does an access point use by default? Open PSK WEP EAP Q.15 Which statement is true about open authentication when it is enabled on an access point? requires no authentication uses a 64-bit encryption algorithm requires the use of an authentication server requires a mutually agreed upon password Q.16 What are two authentication methods that an access point could use? (Choose two.) WEP WPA EAP ASCII pre-shared keys Q.17 What is the difference between using open authentication and pre-shared keys?
  • 6. Open authentication requires a password. Pre-shared keys do not require a password. Open authentication is used with wireless networks. Pre-shared keys are used with wired networks. Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word. Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming. Q.18 What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker? address filtering authentication broadcasting encryption passphrase encoding Q.19 What access-point feature allows a network administrator to define what type of data can enter the wireless network? encryption hacking block traffic filtering MAC address filtering authentication Q.20 What are the two WEP key lengths? (Choose two.) 8 bit 16 bit
  • 7. 32 bit 64 bit 128 bit Q.21 Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks. encrypt; authenticate users on filter traffic; select the operating frequency for identify the wireless network; compress data on create the smallest wireless network; limit the number of users on