10.6.7 Network Pro Practice Questions

9 September 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200m apart, as shown below. The objectives of the implementation are as follows: β€’ Create a secure wireless network that doesn't emanate beyond each office space by implementing access points in locations A-D in each building. β€’ Connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F. Drag the antenna type from the list on the left to the appropriate location on the right. Each antenna type can be used more than once or not at all.
answer
A. Normal gain directional antenna aimed east B. Normal gain directional antenna aimed south C. Normal gain directional antenna aimed north D. Normal gain directional antenna aimed west E. High-gain directional antenna aimed east F. High-gain directional antenna aimed west
question
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WPA Personal and WPA2 Enterprise WPA Enterprise and WPA2 Enterprise WEP, WPA Personal, and WPA2 Personal WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise
answer
WEP, WPA Personal, and WPA2 Personal
question
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? In the center of the building In common or community work areas Near a window Above the 3rd floor
answer
Near a window
question
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving? Change the default SSID Disable SSID broadcast Implement WPA2 Personal Use a form of authentication other than open authentication
answer
Disable SSID broadcast
question
Which of the following provides security for wireless networks? CSMA/CD 802.11a WPA WAP 802.3u
answer
Wi-Fi protected access (WPA).
question
Which of the following features are supplied by WPA2 on a wireless network? A centralized access point for clients Traffic filtering based on packet characteristics Encryption Network identification Client connection refusals based on MAC address
answer
Encryption
question
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.) Open authentication WEP encryption TKIP encryption Preshared keys AES encryption 802.1x
answer
AES encryption 802.1x
question
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication? On a certificate authority (CA) On the wireless access point On the wireless access point and each wireless device On a RADIUS server
answer
On a RADIUS server
question
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a radius server and radius clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.) Configure all wireless workstations with client certificates. Configure all RADIUS clients with a preshared key. Configure the RADIUS server with a server certificate. Configure the RADIUS server with a preshared key. Configure all wireless access points with client certificates.
answer
Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.
question
You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible. The floor plan of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. Each antenna type can be used once, more than once, or not at all.
answer
A. Directional B. Directional C. Omni-Directional D. Directional E. Directional F. Directional G. Directional
question
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two.) Bridge High-gain Directional Omni-directional Normal-gain
answer
High-gain Directional
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this? Rogue access point Man-in-the-middle Phishing Social engineering Physical security
answer
Rogue access point
question
An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. Which attack techniques did the attacker use in this scenario? (Select two.) Man-in-the-middle Smurf Pharming Evil twin Denial of service
answer
Pharming Evil twin
question
You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.) TKIP Preshared key SSID Channel Username and password AES
answer
Preshared key SSID AES
question
Which of the following protocols or mechanisms is used to provide security on a wireless network? (Select three.) IPsec RDP 802.1x WPA
answer
IPsec 802.1x WPA