Module Ten TestOut Practice Questions

3 September 2022
4.7 (114 reviews)
12 test answers

Unlock all answers in this set

Unlock answers (8)
question
Which of the following features are supplied by WPA2 on a wireless network? - Encryption - A centralized access point for clients - Network identification - Traffic filtering based on packet characteristics - Client connection refusals based on MAC address
answer
- Encryption Wi-Fi protected access (WPA) provides encryption and user authentication for wireless networks. MAC address filtering allows or rejects client connections based on the hardware address. The SSID is the network name or identifier. A wireless access point (called an AP or WAP) is the central connection point for wireless clients. A firewall allows or rejects packets based on packet characteristics (such as address, port, or protocol type).
question
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? - WPA Personal and WPA2 Enterprise - WPA Enterprise and WPA2 Enterprise - WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise - WEP, WPA Personal, and WPA2 Personal
answer
- WEP, WPA Personal, and WPA2 Personal Shared key authentication can be used with WEP, WPA, and WPA2. Shared key authentication used with WPA and WPA2 is often called WPA Personal or WPA2 Personal. WPA Enterprise and WPA2 Enterprise use 802.1x for authentication. 802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
question
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? - In common or community work areas - Near a window - Above the third floor - In the center of the building
answer
- Near a window The least secure location for a wireless cell access point is against a perimeter wall. Placement near a window would be the worst option from this list of selections. For the best security, access points that use directional antennae would be a more appropriate choice for placement near an exterior wall. This placement reduces the likelihood that the wireless cell's access radius will extend outside of the physical borders of your environment. It is important to place wireless cell access points where they are needed, such as in a common or community work area.
question
Which of the following is true of a wireless network SSID? - Groups wireless devices together into the same logical network - Is used by STAs as they roam between APs - Allows devices to find a specific AP within an ESS - Is a 48-bit value that identifies an AP
answer
- Groups wireless devices together into the same logical network. The SID, also called the network name, groups wireless devices together into the same logical network. -All devices on the same network (within the BSS and ESS) must have the same SSID. -The SSID is a 32-bit value that is inserted into each frame. The SSID is case sensitive. -The SSID is sometimes called the ESSID (extended service set ID) or the BSSID (basic service set ID). In practice, each term means the same thing; however, SSIDs, ESSIDs, and BSSIDs are technically different.
question
Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.) - 700 MHz - 1.9 GHz - 2.4 GHz - 5.75 GHz - 10 GHz
answer
- 2.4 GHz - 5.75 GHz 802.11 specifications for wireless include standards for operating in the 2.4 GHz range (802.11b, 802.11g, and 802.11n) and the 5.75 GHz range (802.11a and dual-band devices using 802.11n)
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this? - Social Engineering - Man-in-the-Middle - Rogue Access Point - Phishing - Physical Security
answer
- Rogue Access Point A rogue access point is an unauthorized access point added to a network or an access point that is configured to mimic a valid access point. Examples include: - An attacker or an employee with access to the wired network installs a wireless access point on a free port. The access port then provides a method for remotely accessing the network. - An attacker near a valid wireless access point installs an access point with the same (or similar) SSID. The access point is configured to prompt for credentials, allowing the attacker to steal those credentials or use them in a man-in-the-middle attack to connect to the valid wireless access point. - An attacker configures a wireless access point in a public location, then monitors traffic of those who connect to the access point. A man-in-the-middle attack is used to intercept information passing between two communication partners. A rogue access point might be used to initiate a man-in-the-middle attack, but in this case the rogue access point was connected without malicious intent. Social engineering exploits human nature by convincing someone to reveal information or perform an activity. Phishing uses an email and a spoofed website to gain sensitive information.
question
You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must suppport a frequency rnage of 5GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend? - 802.11b - WEP - 802.11n - Bluetooth - 802.11a
answer
- 802.11n Of the technologies listed, only the IEEE 802.11n wireless standard addresses the desired requirements. Bluetooth operates at the 2.4GHz radio frequency range and is limited to theoretical speeds of 1 to 3 Mbps and transmission distances of 33 feet. The 802.11a wireless standard offers speeds of 54 Mbps but uses the 5 GHz frequency range. 802.11b uses the 2.4 GHz frequency range but supports only 11 Mbps transfer speeds.
question
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving? - Implement WPA2 Personal - Disable SSID broadcast - Change the default SSID - Use a form of authentication other than open authentication
answer
- Disable SSID broadcast Wireless access points are transceivers that transmit and receive information on a wireless network. Each access point has a service set ID (SSID) that identifies the wireless network. By default, access points broadcast the SSID to announce their presence and make it easy for clients to find and connect to the wireless network. Turn off the SSID broadcast to keep a wireless 802.11x network from being automatically discovered. When SSID broadcasting is turned off, users must know the SSID to connect to the wireless network. This helps to prevent casual attackers from connecting to the network, but any serious hacker with the right tools can still connect to the wireless network. Using authentication with WPA or WPA2 help prevent attackers from connecting to your wireless network, but does not hide the network. Changing the default SSID to a different value does not disable the SSID broadcast.
question
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? - Same SSID, same channel - Same SSID, different channel - Different SSID, same channel - Different SSID, different channel
answer
- Same SSID, different channel When you configure multiple access points as part of the same extended service set (ESS), configure both access points with the same service set identifier (SSID). The SSID is like a network name and groups wireless devices together into the same logical network. All devices, including wireless clients, use the same SSID. Wireless access points that are in the same area should use different channels. If the channels are the same or overlap, devices connected to one access point might interfere with devices connected to the other access point in locations where the signal overlaps.
question
You have configured a wireless access point to create a small network .For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do? - Enable the wireless card on the client - Set the channel on the client to match the channel used by the access point - Decrease the beacon interval on the access point - Configure a profile on the wireless client
answer
- Configure a profile on the wireless client When the SSID broadcast is turned off, you must manually configure a profile on the client computer to identify the SSID of the access point. If you disable the SSID broadcast, you must statically configure wireless devices with the SSID before they can connect because they will be unable to dynamically detect the SSID. A beacon is a frame that the access point sends out periodically. When you turn off SSID broadcast, you prevent the access point from including the SSID in the beacon. On the client, the channel is typically detected automatically and is configured to match the channel used by the access point. In this scenario, the wireless card on the client is already enabled because you can see other wireless networks in the area.
question
All of the 802.11 standards for wireless networking support which type of communication path sharing technology? - CSMA/CD - Token passing - Polling - CSMA/CA
answer
- CSMA/CA 802.11x standards for wireless networking all support the CSMA/CA (carrier sense multiple access with collision avoidance) type of communication path sharing technology. This CSMA/CA allows multiple baseband clients to share the same communication medium. CSMA/CA works as follows: 1. The system asks for permission to transmit. 2. A designated authority (such as a hub, router, or access point), grants access when the communication medium is free. 3. The system transmits data and waits for an ACK (acknowledgment). 4. If no ACK is received, the data is retransmitted. Polling is a mechanism where one system is labeled as the primary system. The primary system polls each secondary system in turn to inquire whether they have data to transmit. Token passing is a mechanism that uses a digital pass card. Only the system holding the token is allowed to communicate. CSMA/CD is the technology used by Ethernet. CSMA/CD works as follows: 1. The system listens for traffic. If the line is clear, the system begins transmitting. 2. During the transmission, the system listens for collisions. 3. If no collisions are detected, the communication succeeds. If collisions are detected, an interrupt jam signal is broadcast to stop all transmissions. Each system waits a random amount of time before starting over at step 1.
question
Which IEEE standard describes wireless communication? - 802.11b - 802.7b - 802.3 - 802.2 - 802.5
answer
- 802.11b One IEEE standard for wireless is 802.11b