CIST Section 10.1 - 10.7 PQ

1 / 54
An access point that conforms to the IEEE 802.11b standard behaves similarly to what other networking device?
Click the card to flip 👆
Terms in this set (54)
Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)2.4 GHz 5.75 GHzWhich IEEE standard describes wireless communication?802.11bWhich data transmission rate is defined by the IEEE 802.11b wireless standard?11 MbpsYou are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?802.11aYou are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?802.11nWhich IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)802.11a 802.11gYou have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a frequency range of 5 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?802.11nWhich technologies are used by the 802.11ac standard to increase network bandwidth? (Select two.)Eight MIMO radio streams 160 MHz bonded channelsYou are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue?Network bridgeYou are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points?Same SSID, different channelYou have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?Decrease the beacon interval.You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do?Configure a profile on the wireless client.You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)TKIP encryption Pre-shared keyWhat is the risk associated with smart technology used in networked devices such as smart refrigerators, environmental controls, or industrial equipment?They are vulnerable to exploits due to weaker security.Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?Z-WaveYou have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)How many devices will need to be supported? What type of data will be transmitted on the network? Is the size of the business expected to grow in the future?What purposes does a wireless site survey fulfill? (Choose two.)To identify the coverage area and preferred placement of access points. To identify existing or potential sources of interference.Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic?Distributed wireless mesh infrastructureWhich of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?WEP, WPA Personal, and WPA2 PersonalWhat is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?Near a windowWhich of the following measures will make your wireless network invisible to the casual attacker performing war driving?Disable SSID broadcastWhich of the following provides security for wireless networks?WPAWhich of the following features are supplied by WPA2 on a wireless network?EncryptionYou need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)AES encryption 802.1xYou want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?On a RADIUS serverYou are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using pre-shared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)Configure all wireless access points with client certificates. Configure the RADIUS server with a server certificate.You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two.)High-gain DirectionalYour company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?Rogue access pointAn attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. Which attack techniques did the attacker use in this scenario? (Select two.)Evil twin PharmingYou want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)AES SSID Pre-shared keyWhich of the following protocols or mechanisms is used to provide security on a wireless network? (Select three.)802.1x WPA IPsecWhich of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?Place access points above where most clients are.Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?Implement antenna diversity.You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP?SSIDYou need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point?On the top floorYou are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern?Omni-directionalYou are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)802.11b BluetoothYou are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?Replace the omni-directional antenna with a directional antenna.A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?The client system has moved too far away from the access point.You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?Overlapping channels.You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptops wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem?A mismatched SSIDAfter installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? (Select two.)802.11b 802.11gA user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?The user is out of the effective range of the wireless access point on her floor.While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?Use a different channel ID.