SWRE Unit 13

SWRE Unit 13

University

10 Qs

quiz-placeholder

Similar activities

pretes 3.3 Menganalisis permasalahan jaringan nirkabel

pretes 3.3 Menganalisis permasalahan jaringan nirkabel

12th Grade - Professional Development

10 Qs

เครือข่ายแลนไร้สาย

เครือข่ายแลนไร้สาย

University

10 Qs

WLAN

WLAN

University

10 Qs

Wireless Network

Wireless Network

University

10 Qs

Quiz Jaringan Nirkabel

Quiz Jaringan Nirkabel

5th Grade - University

12 Qs

Hardware Supporting LAN

Hardware Supporting LAN

University

10 Qs

Communication & Networks 1.0

Communication & Networks 1.0

University

11 Qs

Wireless CCNA review

Wireless CCNA review

University

15 Qs

SWRE Unit 13

SWRE Unit 13

Assessment

Quiz

Computers

University

Hard

Created by

Bruce (BCollier)

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A WLAN engineer deploys a WLC and five wireless APs using the CAPWAP protocol with the DTLS feature to secure the control plane of the network devices. While testing the wireless network, the WLAN engineer notices that data traffic is being exchanged between the WLC and the APs in plain-text and is not being encrypted. What is the most likely reason for this?

  • DTLS only provides data security through authentication and does not provide encryption for data moving between a wireless LAN controller (WLC) and an access point (AP).

  • Although DTLS is enabled by default to secure the CAPWAP control channel, it is disabled by default for the data channel.

  • DTLS is a protocol that only provides security between the access point (AP) and the wireless client.

  • Data encryption requires a DTLS license to be installed on each access point (AP) prior to being enabled on the wireless LAN controller (WLC).

Answer explanation

DTLS is a protocol which provides security between the AP and the WLC. It allows them to communicate using encryption and prevents eavesdropping or tampering.
DTLS is enabled by default to secure the CAPWAP control channel but is disabled by default for the data channel. All CAPWAP management and control traffic exchanged between an AP and WLC is encrypted and secured by default to provide control plane privacy and prevent Man-In-the-Middle (MITM) attacks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless encryption method is the most secure?

  • WPA2 with AES

  • WPA2 with TKIP

  • WEP

  • WPA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is configuring a router for a small company with multiple WLANs and doesn’t need the complexity of a dynamic routing protocol. What should be done or checked?

  • Verify that there is not a default route in any of the edge router routing tables.

  • Create static routes to all internal networks and a default route to the internet.

  • Create extra static routes to the same location with an AD of 1.

  • Check the statistics on the default route for oversaturation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?

  • channels 1, 5, and 9

  • channels 1, 6, and 11

  • channels 1, 7, and 13

  • channels 2, 6, and 10

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN?

  • the company username and password through Active Directory service

  • a key that matches the key on the AP

  • a user passphrase

  • a username and password configured on the AP

Answer explanation

When a WLAN is configured with WPA2 PSK, wireless users must know the pre-shared key to associate and authenticate with the AP.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a WLAN is configured with WPA2 PSK, wireless users must know the pre-shared key to associate and authenticate with the AP.

  • Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.

  • The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.

  • The 5 GHz band has a greater range and is therefore likely to be interference-free.

  • The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.

Answer explanation

Wireless range is determined by the access point antenna and output power, not the frequency band that is used. In this scenario it is stated that all users have wireless NICs that comply with the latest standard, and so all can access the 5 GHz band. Although some users may find it inconvenient to switch to the 5 Ghz band to access streaming services, it is the greater number of channels, not just fewer users, that will improve network performance.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is configuring a WLAN. Why would the administrator use a WLAN controller?

  • to centralize management of multiple WLANs

  • to provide privacy and integrity to wireless traffic by using encryption

  • to facilitate group configuration and management of multiple WLANs through a WLC

  • to provide prioritized service for time-sensitive applications

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?