Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200m apart, as shown below. The objectives of the implementation are as follows: |
A. Normal gain directional antenna aimed east B. Normal gain directional antenna aimed south C. Normal gain directional antenna aimed north D. Normal gain directional antenna aimed west E. High-gain directional antenna aimed east F. High-gain directional antenna aimed west |
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? |
WEP, WPA Personal, and WPA2 Personal |
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? |
Near a window |
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving? |
Disable SSID broadcast |
Which of the following provides security for wireless networks? |
Wi-Fi protected access (WPA). |
Which of the following features are supplied by WPA2 on a wireless network? |
Encryption |
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.) |
AES encryption 802.1x |
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication? |
On a RADIUS server |
You are the wireless network administrator for your organization. As the size of the organization has grown, you’ve decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a radius server and radius clients. You want the server and the clients to mutually authenticate with each other. |
Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates. |
You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible. |
A. Directional B. Directional C. Omni-Directional D. Directional E. Directional F. Directional G. Directional |
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. |
High-gain Directional |
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. |
Rogue access point |
An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn’t break the encryption. |
Pharming Evil twin |
You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. |
Preshared key SSID AES |
Which of the following protocols or mechanisms is used to provide security on a wireless network? (Select three.) |
IPsec 802.1x WPA |
10.6.7 Practice Questions
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price