Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.) | |
802.11a suffers from a shorter range than 802.11g. | |
The 2.4 GHz frequency band is not as crowded as the 5 GHz band. | |
802.11a is more susceptible to RF interference from common commercial items. | |
802.11a uses a more expensive modulation technique than 802.11g. | |
802.11g is backward compatible with 802.11b, but 802.11a is not. |
Which two conditions or restrictions apply to Cisco wireless access points? (Choose two.) | |
Access points utilize WLC to mitigate the hidden node problem. | |
RF signal attenuation directly restricts the access point range. | |
Media access is controlled using a "distributed" mechanism. | |
An access point is a Layer 2 device that functions like an 802.3 Ethernet switch. | |
CSMA/CA uses a contention-free coordination function called point coordination function (PCF). |
To support the client association process, which two methods of authentication are specified in the 802.11 standard? (Choose two.) | |
Lightweight Extensible Authentication Protocol (LEAP) | |
shared key | |
Advanced Encryption Standard (AES) | |
Temporal Key Integrity Protocol (TKIP) | |
open authentication |
Which three statements concerning network security are accurate? (Choose three.) | |
Open authentication uses no client or AP verification. | |
The 802.11i protocol is functionally identical to WPA. | |
A wireless client first associates with an AP and then authenticates for network access. | |
802.11i incorporates a RADIUS server for enterprise authentication. | |
802.11i uses 3DES for encryption. | |
TKIP allows per packet key changes. |
Which two restrictions or additions concerning wireless security protocols are valid? (Choose two.) | |
When using 802.1x for wireless security, clients are allowed to associate with open authentication for RADIUS traffic. | |
WPA2 personal mode permits RADIUS use in | |
A AAA server is required for the RADIUS portion of the 802.1x protocol. | |
Pre-shared keys are not permitted for authentication with WPA2. | |
WPA introduced SSID hiding and MAC address filtering as security measures. | |
WPA2 improved on WPA by introducing 802.1x port authentication. |
Which two statements are true regarding configuring APs? (Choose two.) | |
APs should be configured with WPA only if they do not allow WEP for encryption. | |
Set the radio band to standard or 20 Mhz if are using Wireless-N, Wireless-B, and Wireless-G devices. | |
If wide, the 40 MHz channel is selected for the Radio Band setting, and the standard channel is a secondary channel for Wireless-N. | |
Disabling SSID broadcast prevents any unauthorized connections to the AP. | |
AES provides stronger security than TKIP. |
Which installation method will allow connectivity for a new wireless network? | |
set up WEP on the access point only | |
set up open access on both the access point and each device connected to it | |
set up full encryption on the access point while leaving each device connected to the network open | |
set up full encryption on each device of the WLAN while leaving the access point settings open |
Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others? | |
Network Mode | |
Network Name (SSID) | |
Radio Band | |
Wide Channel | |
Standard Channel |
Which two statements are true regarding wireless client configuration? (Choose two.) | |
Leaving the SSID as null on a Windows XP client causes it to broadcast a null SSID request and trigger an SSID broadcast from the AP. | |
MAC address filtering prevents a wireless network from displaying in the Network Connections, unless the specific MAC address is permitted at the AP. | |
Manually adding a network and setting the known SSID makes the network visible when using the Network Connections icon in the Windows XP client system tray, even if the SSID is not being broadcast. | |
A wireless network requires both the SSID and the network key to be visible as an available network. | |
Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections. |
Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem? | |
This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels. | |
The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points. | |
Install a new wireless access point in this center area to provide coverage. | |
Verify that the wireless access points have sufficient in-line power and connectivity to the wired network. |
Which three devices do many wireless routers incorporate? (Choose three.) | |
gateway for connecting to other network infrastructures | |
built-in Ethernet switch | |
network management station | |
VTP server | |
wireless access point | |
VPN concentrator |
A wireless access point is not working properly. It has been placed horizontally so that it is 6 inches (15.2 cm) from the person seated at the desk, and 2 feet (61 cm) from a metal obstruction. What are three reasons why the access point is not working properly? (Choose three.) | |
An access point should be at least 7.9 inches (20 cm) from people. | |
An access point should be mounted vertically. | |
An access point must always be mounted on a ceiling. | |
An access point should be mounted at a 45-degree angle for proper coverage. | |
An access point should be at least 3 feet (91.4 cm) from metal obstructions. | |
An access point should be at least 15.8 inches (40 cm) from people. |
Which access method does a wireless access point use to allow for multiple user connectivity and distributed access? | |
CSMA/CD | |
token passing | |
CSMA/CA | |
polling |
Which three statements are valid wireless security concerns? (Choose three.) | |
Rogue access points are commonly installed by employees inside the company. | |
With a WLAN, the risk for a man-in-the-middle connection is solved by using RF access points. | |
Flooding a BSS with CTS messages creates an effective DoS attack by defeating media access control. | |
Allowing a PC NIC to accept all traffic makes it operate as an access point. | |
Beaconing SSIDs are required to successfully implement WPA and WPA2. | |
Shared WEP keys are the most secure means to prevent man-in-the-middle and DoS attacks. |
Which two actions are associated with performing a man-in-the-middle attack? (Choose two.) | |
modifying wireless NICs to accept all traffic | |
implementing the Extensible Authentication Protocol (EAP) | |
flooding the BSS with clear-to-send (CTS) messages | |
spoofing an expected sequence number | |
generating a continuous series of disassociate commands on a wireless client |
Which two statements are valid planning considerations for WLAN deployments? (Choose two.) | |
The IEEE 802.11n draft standard is intended to improve WLAN data rates and range without requiring additional power or RF band allocation. | |
In North America, 802.11a channels should be restricted to 1, 6, and 11 to reduce channel overlaps. | |
An ESS generally includes a common SSID to allow roaming from access point to access point without requiring client configuration. | |
802.1q trunking across the network infrastructure allows an ESS to associate diverse access points as long as each access point has a unique SSID. | |
Cells in an ESS should have 10 to 15 percent overlap between them in an extended service area. | |
Access points can be quickly deployed as ad hoc installations to form an ESS. |