WLAN Protocols, Security and Standards Exam 2

1. You work in a company where users only use the wireless network. Users download and upload large image files to the local server and require high bandwidth. Which of the following 802.11 standards would be suitable in this scenario?

2. You are designing a wireless network for a medium-sized company. Which of the following devices would provide 802.11 network with centralized authentication services along with ease in network administration?

 

3. You are setting up a wireless network for a company. One of the requirements is to run the network on the 5Ghz frequency. Which of the following technologies meet this requirement?

4. Which of the following is the best practice in configuring wireless access for guests users?

5. The wireless controller provides the ability to administer other access points and manage their configuration from a central location

6. Which policy from below refers to the users bringing their own laptop to the company in order to use the company's guest wifi network?

7. VPN concentrator and RADIUS server would help in lowering down the administration time to manage 802.11 network running the centralized authentication services

8. You have been assigned a task to secure your company's wireless network. Which of the following authentication protocols can be used to perform this task?

9. A wireless network engineer has been asked to secure the company's wireless network using certificate-based authentication. Which of the following technologies should the network engineer implement?

10. You have been asked to set up a wireless network for a small shop. There are few other shops in the surroundings where electric appliances like microwave ovens and cordless phones are repaired. These appliances can causes RF interference. Which of the following frequencies should the wireless network use to minimize interference?

11. MAC address filtering can be used to restrict unauthorized access to a wireless network

12. What are the few advantages of using WPA over WEP?

13. Which of the following are two sublayers defined under 802.11 standard?

14. In WLAN, how many alphanumeric characters an SSID name can have?

15. Discovering wireless network SSIDs by listening to beacons or sending probe requests, thereby, providing a launch point for further attacks is referred to as:

16. Which of the following is true for a replay attack?

17. Match the encryption protocol with its feature
WEP
Easy to break and hard to configure

Unselect

Uses AES and requires more processing power

Unselect

Temporary security enhancement for WEP though easy to break

Unselect

Ease of use and utilize 192-bit security suite

Unselect

WPA
Easy to break and hard to configure

Unselect

Uses AES and requires more processing power

Unselect

Temporary security enhancement for WEP though easy to break

Unselect

Ease of use and utilize 192-bit security suite

Unselect

WPA2
Easy to break and hard to configure

Unselect

Uses AES and requires more processing power

Unselect

Temporary security enhancement for WEP though easy to break

Unselect

Ease of use and utilize 192-bit security suite

Unselect

WPA3
Easy to break and hard to configure

Unselect

Uses AES and requires more processing power

Unselect

Temporary security enhancement for WEP though easy to break

Unselect

Ease of use and utilize 192-bit security suite

Unselect

18. Every access point has a unique identification ID called BSSID which is like a MAC address of the access point

19. A range of frequencies in the spectrum of electromagnetic waves reserved for wireless LAN is known as:

20. Unauthorized access to a network for the purpose of eavesdropping or traffic analysis, but not to modify its data is known as:

21. Which wireless encryption protocol uses counter mode to make pattern detection difficult?

22. Which setting can be changed if you experience a weak signal on your device caused by interference from other devices?

23. Channel bonding can't be used in a wireless network with wifi clients using 802.11b and 802.11g type adapters

24. What are the few problems with WEP's 24-bit initialization vector (IV)?

25. Both WPA and WEP use RC4 cipher but WPA adds a mechanism known as Temporal Key Integrity Protocol (TKIP)

26. WPA2 is fully compliant with the 802.11i WLAN security standard. Which of the following statements are true about WPA2?

27. When planning the placement of an access point, which of the following constraints you should consider?

28. What are some of the features of 802.11n network?

29. The attenuation of the signal increases as the signal moves further away from the source

30. As a wireless signal passes through different materials, the signal will slow down and change in frequency. Which term describes the phenomenon?

31. WPA2 uses AES as its encryption protocol and it supports 128-bit, 192-bit, and 256-bit encryption

32. In which type of attack, the hacker can monitor the wireless network for valid clients and then take over the session by spoofing the MAC address of the client?

33. Which of the following methods are used to crack wireless protocols such as WEP, WPA, WPA2 and WPS?

34. Which tool is used to scan a site and help identify the wireless topology and also to document radio frequency (RF) coverage, along with connection speeds, before actual implementation?

35. What kind of network can be created by having multiple wireless access points using the same SSID but different non-overlapping channels (such as 1, 6, 11)?

36. Which wireless standard can support devices running all previous standards, including 802.11n, 802.11g, 802.11b, and 802.11a?

37. What device enables two or more Wi-Fi-enabled devices to connect to each other and access a wired network?

38. Which technology enables the use of a wireless access point without directly connecting it to an AC power outlet?

39. A wireless network with more than one access point is called an Extended Basic Service Set

40. Changing the channel on the wireless network does not change the frequency

41. Implementing MAC address filtering makes the wireless network less vulnerable to which kind of attack?

42. Which encryption protocol allows you to assign login credentials to users that they must use to connect to the wireless network, an actual encryption key is not given to users?

43. WAPI is a wireless security standard defined by the government of China that is not used in the rest of the world

44. The wireless adaptor in the laptop should automatically detect the channel, the wireless network is using

45. Which type of attack involves using software to capture packets transmitted on the wireless network and crack the encrypted key?

46. You are designing a wireless solution for a campus network. The requirement is to install 100 access points. Which of the following device you should install to help manage this network?

47. You are troubleshooting a wireless network regarding poor voice quality reported by a few users, using the wireless phones. You ran wireless analyzer and found out that voice packets are arriving on the wifi phones with different delay times. Which of the following performance issues is related to this?

48. How many non-overlapping channels are provided by the IEEE 802.11g standard?

49. In which of the following wireless network mode, an access point is not required?

50. Wireless network uses carrier-sense multiple access with collision detection (CSMA/CD) as a media access control (MAC) method


 

Leave a comment