10.6.7 Practice Questions

Your page rank:

Total word count: 988
Pages: 4

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200m apart, as shown below. The objectives of the implementation are as follows:
• Create a secure wireless network that doesn’t emanate beyond each office space by implementing access points in locations A-D in each building.
• Connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F.
Drag the antenna type from the list on the left to the appropriate location on the right. Each antenna type can be used more than once or not at all.

A. Normal gain directional antenna aimed east B. Normal gain directional antenna aimed south C. Normal gain directional antenna aimed north D. Normal gain directional antenna aimed west E. High-gain directional antenna aimed east F. High-gain directional antenna aimed west

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WPA Personal and WPA2 Enterprise
WPA Enterprise and WPA2 Enterprise
WEP, WPA Personal, and WPA2 Personal
WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise

WEP, WPA Personal, and WPA2 Personal

What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?
In the center of the building
In common or community work areas
Near a window
Above the 3rd floor

Near a window

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
Change the default SSID
Disable SSID broadcast
Implement WPA2 Personal
Use a form of authentication other than open authentication

Disable SSID broadcast

Which of the following provides security for wireless networks?

Wi-Fi protected access (WPA).

Which of the following features are supplied by WPA2 on a wireless network?
A centralized access point for clients
Traffic filtering based on packet characteristics
Network identification
Client connection refusals based on MAC address


You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)
Open authentication
WEP encryption
TKIP encryption
Preshared keys
AES encryption

AES encryption 802.1x

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
On a certificate authority (CA)
On the wireless access point
On the wireless access point and each wireless device
On a RADIUS server

On a RADIUS server

You are the wireless network administrator for your organization. As the size of the organization has grown, you’ve decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a radius server and radius clients. You want the server and the clients to mutually authenticate with each other.
What should you do? (Select two. Each response is a part of the complete solution.)
Configure all wireless workstations with client certificates.
Configure all RADIUS clients with a preshared key.
Configure the RADIUS server with a server certificate.
Configure the RADIUS server with a preshared key.
Configure all wireless access points with client certificates.

Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.

You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible.
The floor plan of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. Each antenna type can be used once, more than once, or not at all.

A. Directional B. Directional C. Omni-Directional D. Directional E. Directional F. Directional G. Directional

You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart.
What type of wireless antennae should you use on each side of the link? (Select two.)

High-gain Directional

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network.
One day you find that an employee has connected a wireless access point to the network in his office.
What type of security risk is this?
Rogue access point
Social engineering
Physical security

Rogue access point

An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn’t break the encryption.
As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point.
Which attack techniques did the attacker use in this scenario? (Select two.)
Evil twin
Denial of service

Pharming Evil twin

You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off.
Which of the following must you configure manually on the client? (Select three.)
Preshared key
Username and password

Preshared key SSID AES

Which of the following protocols or mechanisms is used to provide security on a wireless network? (Select three.)

IPsec 802.1x WPA

Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message