SlideShare une entreprise Scribd logo
1  sur  4
CCNA Exploration 3 LAN Switching
and Wireless–Chapter 7 Exam
01. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
  •    802.11a suffers from a shorter range than 802.11g.
  •    The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
  •    802.11a is more susceptible to RF interference from common commercial items.
  •    802.11a uses a more expensive modulation technique than 802.11g.
  •    802.11g is backward compatible with 802.11b, but 802.11a is not.
02. Which two statements concerning network security are accurate? (Choose two.)
  •    802.11i uses 3DES for encryption.
  •    Open authentication uses no client or AP verification.
  •    The 802.11i protocol is functionally identical to WPA.
  •    802.11i incorporates a RADIUS server for enterprise authentication.
  •    A wireless client first associates with an AP and then authenticates for network access.
03. Which installation method will allow connectivity for a new wireless network?
  •    set up WEP on the access point only
  •    set up open access on both the access point and each device connected to it
  •    set up full encryption on the access point while leaving each device connected to the network
     open
  •    set up full encryption on each device of the WLAN while leaving the access point settings open
04. Refer to the exhibit. When configuring the wireless access point, which setting does
the
network administrator use to configure the unique identifier that client devices use to
distinguish this wireless network from others?
   •    Network Mode
   •    Network Name (SSID)
   •    Radio Band
   •    Wide Channel
   •    Standard Channel
05. Which two statements are true regarding wireless security? (Choose two.)
   •    MAC address filtering prevents the contents of wireless frames from being viewable.
   •    Providing a wireless client with the network key allows an available network to be visible.
   •    Disabling an access point from broadcasting the SSID prevents the access point from being
      discovered.
   •    Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless
      connections.
   •    Manually adding a network and setting the known SSID on a wireless client makes the network
      visible even if the SSID is not being broadcast.
06. Wireless users on a network complain about poor performance within a small area of
a room. Moving away from this area in any direction improves performance dramatically.
What is the first step in designing a solution to this problem?
   •    This might be RF channel overlap, so the technician should verify the channels in use on each
      wireless access point and change to non-overlapping channels.
   •    The RF power settings might be set too low on the wireless access points servicing the room.
      Increase the RF output power on all wireless access points.
   •    Install a new wireless access point in this center area to provide coverage.
   •    Verify that the wireless access points have sufficient in-line power and connectivity to the wired
      network.
07. Which three devices do many wireless routers incorporate? (Choose three.)
   •    gateway for connecting to other network infrastructures
   •    built-in Ethernet switch
   •    network management station
   •    VTP server
   •    wireless access point
   •    VPN concentrator
08. Which access method does a wireless access point use to allow for multiple user
connectivity and distributed access?
   •    CSMA/CD
   •    token passing
   •    CSMA/CA
   •    Polling
09. Why is security so important in wireless networks?
   •    Wireless networks are typically slower than wired networks.
   •    Televisions and other devices can interfere with wireless signals.
   •    Wireless networks broadcast data over a medium that allows easy access.
   •    Environmental factors such as thunderstorms can affect wireless networks.
10. Which wireless technology standard provides the most compatibility with older
wireless standards, but has greater performance?
  •    802.11a
  •    802.11b
  •    802.11g
  •    802.11n
11. Which two statements characterize wireless network security? (Choose two.)
  •    A rogue access point represents a security risk for the local network.
  •    Wireless networks offer the same security features as wired networks.
  •    Using encryption prevents unauthorized clients from associating with an access point.
  •    An attacker needs physical access to at least one network device to launch an attack.
  •    With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.
12. Which network design process identifies where to place access points?
  •    site survey
  •    risk assessment
  •    scalability design
  •    network protocol analysis
13. What wireless security feature allows a network administrator to configure an access
point with wireless NIC unique identifiers so that only these NICs can connect to the
wireless network?
  •    authentication
  •    SSID broadcasting
  •    MAC address filtering
  •    EAP (Extensible Authentication Protocol)
  •    Radius (Remote Authentication Dial-In User Service)
14. What will a wireless client transmit to discover the available WLAN networks?
  •    beacon
  •    password
  •    probe request
  •    association request
15. In a WLAN network, why should wireless access points be implemented with each
access point using a different channel?
  •    to keep users segregated on separate subnets
  •    to control the amount of bandwidth that is utilized
  •    to keep signals from interfering with each other
  •    to keep traffic secure
16. What purpose does authentication serve in a WLAN?
  •    converts clear text data before transmission
  •    indicates which channel the data should flow on
  •    determines that the correct host is utilizing the network
  •    allows the host to choose which channel to use
17. What occurs when a rogue access point is added to a WLAN?
  •    Authorized access points can transmit excess traffic to rogue access points to help alleviate
      congestion.
  •    Unauthorized users can gain access to internal servers, thus causing a security hole.
•      All traffic that uses the same channel as the rogue access point will be encrypted.
  •      All traffic that uses the same channel as the rogue access point will be required to authenticate.
18.   What procedure can prevent man- in-the- middle attacks?
  •      Force all devices on a WLAN to authenticate and monitor for any unknown devices.
  •      Enable access points to send an SSID to each device wanting to use the network.
  •      Configure MAC filtering on all authorized access points.
  •      Disable SSID broadcasts.
19.   Which function is provided by a wireless access point?
  •      dynamically assigns an IP address to the host
  •      provides local DHCP services
  •      converts data from 802.11 to 802.3 frame encapsulation
  •      provides a gateway for connecting to other networks
20.   Which major problem does CSMA/CA overcome in wireless networks?
  •      bandwidth saturation
  •      privacy concerns
  •      media contention
  •      device interoperability
21.   What does a wireless access point use to allow WLAN clients to learn which networks
are   available in a given area?
  •      association response
  •      beacon
  •      key
  •      probe request

Contenu connexe

Tendances

Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless routeranku3
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemShashidhar Reddy
 
Introduction to LoRa for developers
Introduction to LoRa for developersIntroduction to LoRa for developers
Introduction to LoRa for developersRobin Harris
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Cellular lpwan paris nov 2015
Cellular  lpwan   paris nov 2015Cellular  lpwan   paris nov 2015
Cellular lpwan paris nov 2015robert huynh
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionRobin Harris
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 

Tendances (20)

Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting system
 
Introduction to LoRa for developers
Introduction to LoRa for developersIntroduction to LoRa for developers
Introduction to LoRa for developers
 
R1x g12 wifi i
R1x g12 wifi iR1x g12 wifi i
R1x g12 wifi i
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Zigbee
ZigbeeZigbee
Zigbee
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Cellular lpwan paris nov 2015
Cellular  lpwan   paris nov 2015Cellular  lpwan   paris nov 2015
Cellular lpwan paris nov 2015
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 

En vedette

Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelesskratos2424
 
Ch4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wirelessCh4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wirelesskratos2424
 
Ch3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wirelessCh3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wirelesskratos2424
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelesskratos2424
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelesskratos2424
 
Chapter 2 switches
Chapter 2   switchesChapter 2   switches
Chapter 2 switcheskratos2424
 

En vedette (8)

Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
 
Ch4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wirelessCh4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wireless
 
Ch3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wirelessCh3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wireless
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
 
Chapter 2 switches
Chapter 2   switchesChapter 2   switches
Chapter 2 switches
 
Prince 2, project managment Document Configuration item record
Prince 2, project managment Document Configuration item recordPrince 2, project managment Document Configuration item record
Prince 2, project managment Document Configuration item record
 
Waves
WavesWaves
Waves
 

Similaire à Ch7 ccna exploration 3 lan switching and wireless

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to knowPaul Coomans
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersĐồng Quốc Vương
 
Wireless router
Wireless routerWireless router
Wireless routerroza921
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB WirelessCampus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB WirelessAniruddh Rao Kabbinale
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.pptxdarlord
 

Similaire à Ch7 ccna exploration 3 lan switching and wireless (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Ids in wn
Ids in wnIds in wn
Ids in wn
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Ccna 1 7
Ccna 1  7Ccna 1  7
Ccna 1 7
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to know
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Wireless router
Wireless routerWireless router
Wireless router
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB WirelessCampus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB Wireless
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 

Plus de kratos2424

Final exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelessFinal exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelesskratos2424
 
Ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelessCcna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelesskratos2424
 
Switches module 2
Switches module 2Switches module 2
Switches module 2kratos2424
 
Chapter 7 wireless
Chapter 7   wirelessChapter 7   wireless
Chapter 7 wirelesskratos2424
 
Chapter 6 intervlanrouting
Chapter 6   intervlanroutingChapter 6   intervlanrouting
Chapter 6 intervlanroutingkratos2424
 
Chapter 1 landesign
Chapter 1   landesignChapter 1   landesign
Chapter 1 landesignkratos2424
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlanskratos2424
 

Plus de kratos2424 (9)

Final exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelessFinal exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wireless
 
Ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelessCcna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wireless
 
Switches module 2
Switches module 2Switches module 2
Switches module 2
 
Chapter 7 wireless
Chapter 7   wirelessChapter 7   wireless
Chapter 7 wireless
 
Chapter 6 intervlanrouting
Chapter 6   intervlanroutingChapter 6   intervlanrouting
Chapter 6 intervlanrouting
 
Chapter 5 stp
Chapter 5   stpChapter 5   stp
Chapter 5 stp
 
Chapter 4 vtp
Chapter 4   vtpChapter 4   vtp
Chapter 4 vtp
 
Chapter 1 landesign
Chapter 1   landesignChapter 1   landesign
Chapter 1 landesign
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlans
 

Ch7 ccna exploration 3 lan switching and wireless

  • 1. CCNA Exploration 3 LAN Switching and Wireless–Chapter 7 Exam 01. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.) • 802.11a suffers from a shorter range than 802.11g. • The 2.4 GHz frequency band is not as crowded as the 5 GHz band. • 802.11a is more susceptible to RF interference from common commercial items. • 802.11a uses a more expensive modulation technique than 802.11g. • 802.11g is backward compatible with 802.11b, but 802.11a is not. 02. Which two statements concerning network security are accurate? (Choose two.) • 802.11i uses 3DES for encryption. • Open authentication uses no client or AP verification. • The 802.11i protocol is functionally identical to WPA. • 802.11i incorporates a RADIUS server for enterprise authentication. • A wireless client first associates with an AP and then authenticates for network access. 03. Which installation method will allow connectivity for a new wireless network? • set up WEP on the access point only • set up open access on both the access point and each device connected to it • set up full encryption on the access point while leaving each device connected to the network open • set up full encryption on each device of the WLAN while leaving the access point settings open 04. Refer to the exhibit. When configuring the wireless access point, which setting does the
  • 2. network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others? • Network Mode • Network Name (SSID) • Radio Band • Wide Channel • Standard Channel 05. Which two statements are true regarding wireless security? (Choose two.) • MAC address filtering prevents the contents of wireless frames from being viewable. • Providing a wireless client with the network key allows an available network to be visible. • Disabling an access point from broadcasting the SSID prevents the access point from being discovered. • Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections. • Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast. 06. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem? • This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels. • The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points. • Install a new wireless access point in this center area to provide coverage. • Verify that the wireless access points have sufficient in-line power and connectivity to the wired network. 07. Which three devices do many wireless routers incorporate? (Choose three.) • gateway for connecting to other network infrastructures • built-in Ethernet switch • network management station • VTP server • wireless access point • VPN concentrator 08. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access? • CSMA/CD • token passing • CSMA/CA • Polling 09. Why is security so important in wireless networks? • Wireless networks are typically slower than wired networks. • Televisions and other devices can interfere with wireless signals. • Wireless networks broadcast data over a medium that allows easy access. • Environmental factors such as thunderstorms can affect wireless networks.
  • 3. 10. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance? • 802.11a • 802.11b • 802.11g • 802.11n 11. Which two statements characterize wireless network security? (Choose two.) • A rogue access point represents a security risk for the local network. • Wireless networks offer the same security features as wired networks. • Using encryption prevents unauthorized clients from associating with an access point. • An attacker needs physical access to at least one network device to launch an attack. • With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect. 12. Which network design process identifies where to place access points? • site survey • risk assessment • scalability design • network protocol analysis 13. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network? • authentication • SSID broadcasting • MAC address filtering • EAP (Extensible Authentication Protocol) • Radius (Remote Authentication Dial-In User Service) 14. What will a wireless client transmit to discover the available WLAN networks? • beacon • password • probe request • association request 15. In a WLAN network, why should wireless access points be implemented with each access point using a different channel? • to keep users segregated on separate subnets • to control the amount of bandwidth that is utilized • to keep signals from interfering with each other • to keep traffic secure 16. What purpose does authentication serve in a WLAN? • converts clear text data before transmission • indicates which channel the data should flow on • determines that the correct host is utilizing the network • allows the host to choose which channel to use 17. What occurs when a rogue access point is added to a WLAN? • Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion. • Unauthorized users can gain access to internal servers, thus causing a security hole.
  • 4. All traffic that uses the same channel as the rogue access point will be encrypted. • All traffic that uses the same channel as the rogue access point will be required to authenticate. 18. What procedure can prevent man- in-the- middle attacks? • Force all devices on a WLAN to authenticate and monitor for any unknown devices. • Enable access points to send an SSID to each device wanting to use the network. • Configure MAC filtering on all authorized access points. • Disable SSID broadcasts. 19. Which function is provided by a wireless access point? • dynamically assigns an IP address to the host • provides local DHCP services • converts data from 802.11 to 802.3 frame encapsulation • provides a gateway for connecting to other networks 20. Which major problem does CSMA/CA overcome in wireless networks? • bandwidth saturation • privacy concerns • media contention • device interoperability 21. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area? • association response • beacon • key • probe request