WLAN Protocols, Security and Standards Exam 1

1. Which multiple access technique is used for IEEE802.11 standard for WLAN?

2. Which of the following WLAN standard have the same frequency range?

3. WLAN controller does not manage wireless network access points that allow wireless devices to connect to the network

4. What are the some of the benefits of using WLAN over the wired network?

5. Few users report an unstable wireless 802.11g network connectivity and after careful examination, you realize that 2.4GHz wireless phones and Bluetooth devices are interfering with the wifi signal. What solution would you suggest?

6. What is the purpose of PIN at the back of the wireless router?

7. What are some of the risks associated with using wireless hotspot at public places?

8. While reviewing your wireless router logs, you notice high wireless network usage by unfamiliar hosts. How can you control which hosts connect to your wireless network?

9. Match the following IEEE802.11 family of standards with operating frequencies
802.11a
2.4 GHz

Unselect

2.4 GHz and 5 GHz

Unselect

2.4 GHz

Unselect

5 GHz

Unselect

802.11b
2.4 GHz

Unselect

2.4 GHz and 5 GHz

Unselect

2.4 GHz

Unselect

5 GHz

Unselect

802.11g
2.4 GHz

Unselect

2.4 GHz and 5 GHz

Unselect

2.4 GHz

Unselect

5 GHz

Unselect

802.11n
2.4 GHz

Unselect

2.4 GHz and 5 GHz

Unselect

2.4 GHz

Unselect

5 GHz

Unselect

10. You have configured Wired Equivalency Privacy (WEP) protocol to secure your home Wifi network. What type of attack might your network be susceptible to?

11. In a wireless local area network, which three entities are involved in the authentication process?

12. Put the wireless security methods in the order from strong to weak
  • Open Network
  • WPA2 + AES
  • WPA +TKIP
  • WPA3
  • WEP

13. TKIP utilizes the RC4 stream cipher encryption with 128-bit keys and 64-bit keys for authentication

14. It is possible to operate multiple SSIDs on one wireless access point and each SSID can offer different security methods.=

15. Match the wireless standard with its transfer rate
802.11a
54 Mbps

Unselect

Up to 600 Mbps

Unselect

11 Mbps

Unselect

54 Mbps

Unselect

802.11b
54 Mbps

Unselect

Up to 600 Mbps

Unselect

11 Mbps

Unselect

54 Mbps

Unselect

802.11g
54 Mbps

Unselect

Up to 600 Mbps

Unselect

11 Mbps

Unselect

54 Mbps

Unselect

802.11n
54 Mbps

Unselect

Up to 600 Mbps

Unselect

11 Mbps

Unselect

54 Mbps

Unselect

16. Which WPA mode is also known as WPA-802.1x and uses a central authentication server such as a RADIUS server for authentication and auditing features?

17. Which wireless security protocol supports the Transport Layer Security (TLS) and the Tunneled Transport Layer Security (TTLS) protocols through the use of the Extensible Authentication Protocol (EAP)?

18. You want to connect two laptops directly to one another wirelessly. Which wireless mode would accomplish it?

19. 802.11b/g/n are all part of the Wi-Fi standard but not compatible with one another

20. Which of the wireless security protocol changes the key using the Temporal Key Integrity Protocol (TKIP) encryption protocol?

21. You have received a new wireless router and want to assign a name to your wireless network. Which of the following do you need to configure?

22. The wireless standards 802.11b, 802.11g, and 802.11n are all compatible because they all run at the 5 GHz frequency range

23. Match the wireless technology with its definition
WPA personal
Wireless network that can run at 1 Gbps

Unselect

Wireless standard that runs at 54 Mbps

Unselect

WPA mode that requires the use of preshared key

Unselect

WPA mode that requires the use of RADIUS server

Unselect

WPA enterprise
Wireless network that can run at 1 Gbps

Unselect

Wireless standard that runs at 54 Mbps

Unselect

WPA mode that requires the use of preshared key

Unselect

WPA mode that requires the use of RADIUS server

Unselect

802.11ac
Wireless network that can run at 1 Gbps

Unselect

Wireless standard that runs at 54 Mbps

Unselect

WPA mode that requires the use of preshared key

Unselect

WPA mode that requires the use of RADIUS server

Unselect

802.11g
Wireless network that can run at 1 Gbps

Unselect

Wireless standard that runs at 54 Mbps

Unselect

WPA mode that requires the use of preshared key

Unselect

WPA mode that requires the use of RADIUS server

Unselect

24. In a 64-bit WEP security protocol,  24-bit initialization vector with a 40-bit key for encryption is used

25. You have been assigned a task to set up a wireless network for your company. The requirement is to ensure that network is as secure as possible. Which of the two practices you can follow?

26. Under the ideal conditions, which wireless networking standard provides the shortest range?

27. Which exploit occurs when someone sets up a wireless access point using the same SSID as a legitimate wireless network, tricking users into connecting to it instead of reak SSID?

28. 802.11a devices are incompatible with 802.11b devices because 802.11a standard operates at the frequency of 5 GHz

29. You are configuring a wireless network that extends to multiple access points. The requirement is to cover a wider area and support users roaming from one area to another.  How will you configure the wireless access points?

30. You have discovered that neighbouring shops are using channels 1, 6 and 9 for their 802.11x wireless networks. Due to frequency overlap between channels within the 2.4 GHz range, which channel you should use to avoid interference in the wireless network?

31. WPA-PSK is vulnerable to dictionary attacks should the access point be set up with weak passphrases

32. Which wireless standard is incapable of running at the common wireless frequency of 2.4 GHz?

33. Hackers can crack WEP encryption and compromise wireless data, Which component of WEP is vulnerable to this kind of attack?

34. Which encryption protocol provides dynamic key generation and rotation, ensuring each packet gets a unique encryption key?

35. High latency in a wireless network can be caused by a wireless access point that is set to use the same channel as another 2.4 GHz device or network nearby

 

36. Which of the following factors could cause the laptop and other wireless devices to fail to connect to the wireless network?

37. You want to secure your home wireless network. Which of the following technologies you can use to secure your wifi network?

38. You have an old wireless router and you found out that it runs at 11 Mbps. What wireless standard this device is using?

39. Data emanation refers to the leaking of our wireless network signal beyond your physical location

40. Which wireless anomaly can cause the signal strength to drop significantly if the surrounding is made of wood and drywall?

41. You have been asked to set up a wireless network in your office. Which layer 2 security policy you can use to secure the network?

42. A wireless engineer is setting up a guest wireless network. The requirement is to present the users with a webpage to log in before connecting to the network. Which authentication method should be configured?

43. Which of the following is hard to implement because you need to install a certificate on your server and also on all your clients?

44. If you are running 802.11b/g standard in your wireless network, then you can receive interference from which of the following devices?

45. Which wireless standard allows to use channel bonding of both the 2.4 GHz range and the 5 GHz range to get increased bandwidth of over 100 Mbps?

46. How many non-overlapping channels are provided by IEEE 802.11a?

47. What is the strongest encryption provided by WPA2?

48. If you disable SSID broadcasting, then you must configure the SSID name on the clients that need to connect to the access point

49. The goal of the secure wireless network is to provide which of the features?

50. In infrastructure mode, wireless devices communicate with an access point instead of directly with each other as they do when they are in ad-hoc mode.


 

Leave a comment