Search Header Logo

169 9

Authored by Shaun Matthews

Instructional Technology

University

Used 2+ times

169 9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose three.)

If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used?

11

6

1

3

8

Answer explanation

Media Image

Channels 1, 6, and 11 are the only channels that don't overlap with each other in the 802.11b standard. They have a 5 MHz frequency separation between each other, which minimizes interference between access points operating on these channels.

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?

802.11a

802.11n

802.11b

802.11g

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which method of wireless authentication is currently considered to be the strongest?

WEP

WPA

WPA2

Shared Key

Open

4.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose two)

Which of the following authentication methods has the user enter a pre-shared password?

Open

WPA Personal

WPA Enterprise

WPA2 Personal

WPA2 Enterprise

5.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose two.)

What are the best ways to secure WLANs?

Authentication

SSID CLoaking

Encryption

MAC Address Filtering

Answer explanation

Authentication:

  1. Access Control: Authentication ensures that only authorized users and devices can connect to the WLAN, preventing unauthorized access and bolstering network security.

  2. User Accountability: Authentication mechanisms track and log user access, aiding in auditing and security incident investigations, and holding users accountable for their actions on the network.

Encryption:

  1. Data Confidentiality: Encryption scrambles data during transmission, preserving confidentiality by preventing unauthorized eavesdropping and safeguarding sensitive information.

  2. Data Integrity and Privacy: Encryption maintains data integrity and privacy, protecting against unauthorized data modification during transmission and providing a secure and private communication channel within the WLAN.

6.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose two.)

A laptop cannot connect to a wireless access point.

Which two troubleshooting steps should be taken first?

Ensure that the wireless NIC is enabled

Ensure that the wireless SSID is chosen

Ensure that the correct network media is selected

Ensure that the NIC is configured for the proper frequency

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Using NAT terminology, what is the address of the source host on a private network as seen from inside the network?

Outside local

Outside global

Inside local

Inside global

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?