Sunteți pe pagina 1din 6

http://Ccna-4.blogspot.

com

http://360.yahoo.com/quocvuong_it

Close Window

Assessment System

Take Assessment - ESwitching Chapter 7 - CCNA Exploration: LAN Switching and Wireless
(Version 4.0)

Refer to the exhibit. When configuring the wireless access point, which setting does the network
administrator use to configure the unique identifier that client devices use to distinguish this wireless
network from others?
Network Mode
Network Name (SSID)
Radio Band
Wide Channel
http://Ccna-4.blogspot.com

http://360.yahoo.com/quocvuong_it

Standard Channel

2 Which access method does the wireless access point use to allow for multiple user connectivity and
distributed access?
CSMA/CD
token passing
CSMA/CA
RTS/CTS

3 Which two statements are true regarding configuring APs? (Choose two.)
APs should be configured with WPA only if they do not allow WEP for encryption.
Set the radio band to standard or 20 Mhz if are using Wireless-N, Wireless-B, and Wireless-G devices.
If wide, the 40 MHz channel is selected for the Radio Band setting, and the standard channel is a
secondary channel for Wireless-N.
Disabling SSID broadcast prevents any unauthorized connections to the AP.
AES provides stronger security than TKIP.

4 Wireless users on a network complain about poor performance within a small area of a room. Moving
away from this area in any direction improves performance dramatically. What is the first step in designing
a solution to this problem?
This might be RF channel overlap, so the technician should verify the channels in use on each wireless
access point and change to non-overlapping channels.
The RF power settings might be set too low on the wireless access points servicing the room. Increase
the RF output power on all wireless access points.
Install a new wireless access point in this center area to provide coverage.
Verify that the wireless access points have sufficient in-line power and connectivity to the wired
network.

5 Which installation method will allow connectivity for a new wireless network?
set up WEP on the access point only
set up open access on both the access point and each device connected to it
set up full encryption on the access point while leaving each device connected to the network open
set up full encryption on each device of the WLAN while leaving the access point settings open

6 Which three statements are valid wireless security concerns? (Choose three.)
http://Ccna-4.blogspot.com

http://360.yahoo.com/quocvuong_it

Rogue access points are commonly installed by employees inside the company.
With a WLAN, the risk for a "man in the middle" connection is solved by using RF access points.
Flooding a BSS with CTS messages creates an effective DoS by defeating media access control.
Allowing a PC NIC to accept all traffic effectively turns it into an access point.
Administrators can guard against DoS attacks by implementing EAP.
TCP session hijacking is a common DoS attack.

7 Which two actions are associated with a man-in-the-middle attack? (Choose two.)
TCP session hijacking
use of the Extensible Authentication Protocol (EAP)
flooding the BSS with clear-to-send (CTS) messages
spoofing an expected sequence number
generating a continuous series of disassociate commands

8 Which two restrictions or additions concerning wireless security protocols are valid? (Choose two.)
When using 802.1x for wireless security, clients are allowed to associate with open authentication for
RADIUS traffic.
WPA2 personal mode permits RADIUS use in SOHO environments.
A AAA server is required for the RADIUS portion of the 802.1x protocol.
Pre-shared keys are not permitted for authentication with WPA2.
WPA introduced SSID hiding and MAC address filtering as security measures.
WPA2 improved on WPA by introducing 802.1x port authentication.

9 Which two properties can be changed to improve the wait time WLAN clients are experiencing while
roaming between access points and attempting to authenticate with a new access point? (Choose two.)
Increase how often beacons are sent by the access point.
Increase the scan interval of the client.
Increase the number of IP addresses available in the server pool of the DHCP.
Change ad hoc channels on the client to the same channels used by the access points.
Change the authentication type on the client to OPEN.

10 Which three statements concerning network security are accurate? (Choose three.)
Open authentication uses no client or AP verification.
http://Ccna-4.blogspot.com

http://360.yahoo.com/quocvuong_it

The 802.11i protocol is functionally identical to WPA.


A wireless client first associates with an AP and then authenticates for network access.
802.11i incorporates a RADIUS server for enterprise authentication.
802.11i uses 3DES for encryption.
TKIP allows per packet key changes.

11 Which two devices centralize the administration of large WLANs that employ hundreds of access points?
(Choose two.)
managed wireless NICs
wireless LAN controller
lightweight access points
wireless network operating system
wireless antenna

12Which three rules about placing wireless access points may have been broken when an operational access
point is found on top of a computer at a user’s desk? (Choose three.)
An access point should be at least 7.9 inches (20 cm) from people.
An access point should be mounted vertically.
An access point should not be mounted on a perimeter wall.
An access point should be mounted at a 45-degree angle for proper coverage in corners.
An access point should be at least 3 feet (91.4 cm) from metal obstructions.
An access point should not be mounted outside of buildings.

13 Which two statements are valid planning considerations for WLAN deployments? (Choose two.)
Each access point requires a unique SSID to distinguish it across a common ESS.
In North America, 802.11a channels should be restricted to 1, 6, and 11 to reduce channel overlaps.
An ESS generally includes a common SSID to allow roaming from access point to access point
without requiring client configuration.
802.1q trunking across the network infrastructure allows an ESS to associate diverse access points as
long as each access point has a unique SSID.
Cells in an ESS should have 10 to 15 percent overlap between them in an extended service area.
Access points can be quickly deployed as ad hoc installations to form an ESS.

14To support the client association process, which two methods of authentication are specified in the 802.11
standard? (Choose two.)
Lightweight Extensible Authentication Protocol (LEAP)
http://Ccna-4.blogspot.com

http://360.yahoo.com/quocvuong_it

shared key
Advanced Encryption Standard (AES)
Temporal Key Integrity Protocol (TKIP)
open authentication

15 Which two statements are true regarding wireless client configuration? (Choose two.)
Leaving the SSID as null on a Windows XP client causes it to broadcast a null SSID request and
trigger an SSID broadcast from the AP.
MAC address filtering prevents a wireless network from displaying in the Network Connections,
unless the specific MAC address is permitted at the AP.
Manually adding a network and setting the known SSID makes the network visible when using the
Network Connections icon in the Windows XP client system tray, even if the SSID is not being
broadcast.
A wireless network requires both the SSID and the network key to be visible as an available network.
Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless
connections.

16 Which two conditions or restrictions apply to Cisco wireless access points? (Choose two.)
Access points utilize WLC to mitigate the hidden node problem.
RF signal attenuation directly restricts the access point range.
Media access is controlled using a "distributed" mechanism.
An access point is a Layer 2 device that functions like an 802.3 Ethernet switch.
CSMA/CA uses a contention-free coordination function called point coordination function (PCF).

17Which three services do wireless routers offer besides wireless access? (Choose three.)
network address translation
firewall
serial connection
IEEE 802.5
backward compatibility to 802.11a/b/g
dynamic SSIDs

18 What is the preferred method of identifying RF interference when wireless access points are deployed in a
crowded environment?
http://Ccna-4.blogspot.com

http://360.yahoo.com/quocvuong_it

Perform a manual site survey, remove all interfering devices, and then install the access points.
Install the access points and then change the RF channels until the best signal is found.
Perform a utility-assisted site survey and then install the access points based on the findings.
Set up all the access points on tripods and then using a laptop, test connectivity at all locations within
the area.
Perform a manual site survey, followed by an assisted site survey.

19Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
802.11a suffers from a shorter range than 802.11g.
The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
802.11a is more susceptible to RF interference from common commercial items.
802.11a uses a more expensive modulation technique than 802.11g.
802.11g is backward compatible with 802.11b, but 802.11a is not.

S-ar putea să vă placă și