1. Which two statements concerning network security are
accurate? (Choose two.)
Open authentication uses no client or AP verification.
802.11i incorporates a RADIUS server for enterprise
authentication.
2. Which installation method will allow connectivity for a
new wireless network?
set up open access on both the access point and each device
connected to it
3. Which function is provided by a wireless access point?
converts data from 802.11 to 802.3 frame encapsulation
4. What procedure can prevent man-in-the-middle attacks?
Force all devices on a WLAN to authenticate and monitor for
any unknown devices.
5. What does a wireless access point use to allow WLAN
clients to learn which networks are available in a given area?
beacon
6. What wireless security feature allows a network
administrator to configure an access point with wireless NIC unique identifiers
so that only these NICs can connect to the wireless network?
MAC address filtering
7. Wireless users on a network complain about poor
performance within a small area of a room. Moving away from this area in any
direction improves performance dramatically. What is the first step in
designing a solution to this problem?
This might be RF channel overlap, so the technician should verify
the channels in use on each wireless access point and change to non-overlapping
channels.
8. Which two statements characterize wireless network
security? (Choose two.)
A rogue access point represents a security risk for the
local network.
With SSID broadcast disabled, an attacker must sniff the
SSID before being able to connect.
9. Which network design process identifies where to place
access points?
site survey
10. Refer to the exhibit. When configuring the wireless
access point, which setting does the network administrator use to configure the
unique identifier that client devices use to distinguish this wireless network
from others?
Network Name (SSID)
11. Which two conditions have favored adoption of 802.11g
over 802.11a? (Choose two.)
802.11a suffers from a shorter range than 802.11g.
802.11g is backward compatible with 802.11b, but 802.11a is
not.
12. What occurs when a rogue access point is added to a
WLAN?
Unauthorized users can gain access to internal servers, thus
causing a security hole.
13. In a WLAN network, why should wireless access points be
implemented with each access point using a different channel?
to keep signals from interfering with each other
14. Which two statements are true regarding wireless
security? (Choose two.)
Default SSIDs on specific manufacturer APs are generally
known and may permit hostile wireless connections.
Manually adding a network and setting the known SSID on a
wireless client makes the network visible even if the SSID is not being
broadcast.
15. Why is security so important in wireless networks?
Wireless networks broadcast data over a medium that allows
easy access.
16. Which wireless technology standard provides the most
compatibility with older wireless standards, but has greater performance?
802.11n
17. Which three devices do many wireless routers
incorporate? (Choose three.)
gateway for connecting to other network infrastructures
built-in Ethernet switch
wireless access point
18. What will a wireless client transmit to discover the available
WLAN networks?
probe request
19. Which major problem does CSMA/CA overcome in wireless
networks?
media contention
20. Which access method does a wireless access point use to
allow for multiple user connectivity and distributed access?
CSMA/CA
21. What purpose does authentication serve in a WLAN?
determines that the correct host is utilizing the network
CCNA 3 Chapter 7 Answers |
No comments:
Post a Comment