5.12.9 Practice Exam

10 September 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
Which of the following wireless network protection methods prevents the wireless network name from being broadcast?
answer
SSID broadcast
question
Which of the following do switches and wireless access points use to control access through the device?
answer
MAC address filtering
question
You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network. You have networking card in two laptops that run Windows. Neither laptop can find the network. You have come to the conclusion that you must manually configure the wireless access point (AP). come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP? Which of the following values uniquely identifies the network AP?
answer
SSID
question
You want to implement 802.1x authentication on your wireless network. Which of the following You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
answer
RADIUS
question
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. of pre-shared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the necessary Cisco client software on each RADIUS client. RADIUS server and installed the necessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?
answer
The system is vulnerable because LEAP is susceptible to dictionary attacks.
question
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. of pre-shared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)
answer
Configure the RADIUS server with a server certificate Configure all wireless access points with client certificates
question
While trying avoid You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point? interference, which of the following is the best location for the access point?
answer
On the top floor
question
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? wireless access for users within your company building?
answer
Place access points above where most clients are.
question
You are designing a wireless network implementation for a small business. The business deals You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible. with sensitive customer information, so data emanation must be reduced as much as possible. The floor plan of the office is shown below. Match each type of access point antenna on the left The floor plan of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. Each antenna type can be used once, with the appropriate location on the floor plan on the right. Each antenna type can be used once, more than once, or not at all. more than once, or not at all.
answer
A: Directional B: Directional C: Omnidirectional D: Directional E: Directional F: Directional G: Directional
question
The owner of a hotel has contracted with you to implement a wireless network to provide The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, they should not be allowed to access the internet. correct code, they should not be allowed to access the internet. What should you do?
answer
Implement a captive portal
question
You are replacing a wired business network with an 802.11g wireless network. You currently use You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.) you do to configure the wireless network? (Select two.)
answer
Configure devices to run in infrastructure mode Install a RADIUS server and use 802.1x authentication
question
Which of the following features on a wireless network allows or rejects client connections based Which of the following features on a wireless network allows or rejects client connections based on the hardware address
answer
MAC address filtering
question
A customer has called and indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed internet connection. Which of the following will resolve access point (AP) to use his high-speed internet connection. Which of the following will resolve this issue? (Select two.) this issue? (Select two.)
answer
Implement MAC address filters Disable SSID broadcast on the AP
question
You've just installed a wireless access point (AP) for your organization's network. You know that the radio signals used by the AP extend beyond your organization's building and are concerned the radio signals used by the AP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select two.) What can you do to protect the wireless network? (Select two.)
answer
Configure the AP to filter out unauthorized MAC addresses Disable DHCP on the AP
question
you are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing? implementations offers the best countermeasure to sniffing?
answer
WPA2 with AES