SlideShare a Scribd company logo
CCNA Exploration 3 LAN Switching
and Wireless–Chapter 7 Exam
01. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
  •    802.11a suffers from a shorter range than 802.11g.
  •    The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
  •    802.11a is more susceptible to RF interference from common commercial items.
  •    802.11a uses a more expensive modulation technique than 802.11g.
  •    802.11g is backward compatible with 802.11b, but 802.11a is not.
02. Which two statements concerning network security are accurate? (Choose two.)
  •    802.11i uses 3DES for encryption.
  •    Open authentication uses no client or AP verification.
  •    The 802.11i protocol is functionally identical to WPA.
  •    802.11i incorporates a RADIUS server for enterprise authentication.
  •    A wireless client first associates with an AP and then authenticates for network access.
03. Which installation method will allow connectivity for a new wireless network?
  •    set up WEP on the access point only
  •    set up open access on both the access point and each device connected to it
  •    set up full encryption on the access point while leaving each device connected to the network
     open
  •    set up full encryption on each device of the WLAN while leaving the access point settings open
04. Refer to the exhibit. When configuring the wireless access point, which setting does
the
network administrator use to configure the unique identifier that client devices use to
distinguish this wireless network from others?
   •    Network Mode
   •    Network Name (SSID)
   •    Radio Band
   •    Wide Channel
   •    Standard Channel
05. Which two statements are true regarding wireless security? (Choose two.)
   •    MAC address filtering prevents the contents of wireless frames from being viewable.
   •    Providing a wireless client with the network key allows an available network to be visible.
   •    Disabling an access point from broadcasting the SSID prevents the access point from being
      discovered.
   •    Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless
      connections.
   •    Manually adding a network and setting the known SSID on a wireless client makes the network
      visible even if the SSID is not being broadcast.
06. Wireless users on a network complain about poor performance within a small area of
a room. Moving away from this area in any direction improves performance dramatically.
What is the first step in designing a solution to this problem?
   •    This might be RF channel overlap, so the technician should verify the channels in use on each
      wireless access point and change to non-overlapping channels.
   •    The RF power settings might be set too low on the wireless access points servicing the room.
      Increase the RF output power on all wireless access points.
   •    Install a new wireless access point in this center area to provide coverage.
   •    Verify that the wireless access points have sufficient in-line power and connectivity to the wired
      network.
07. Which three devices do many wireless routers incorporate? (Choose three.)
   •    gateway for connecting to other network infrastructures
   •    built-in Ethernet switch
   •    network management station
   •    VTP server
   •    wireless access point
   •    VPN concentrator
08. Which access method does a wireless access point use to allow for multiple user
connectivity and distributed access?
   •    CSMA/CD
   •    token passing
   •    CSMA/CA
   •    Polling
09. Why is security so important in wireless networks?
   •    Wireless networks are typically slower than wired networks.
   •    Televisions and other devices can interfere with wireless signals.
   •    Wireless networks broadcast data over a medium that allows easy access.
   •    Environmental factors such as thunderstorms can affect wireless networks.
10. Which wireless technology standard provides the most compatibility with older
wireless standards, but has greater performance?
  •    802.11a
  •    802.11b
  •    802.11g
  •    802.11n
11. Which two statements characterize wireless network security? (Choose two.)
  •    A rogue access point represents a security risk for the local network.
  •    Wireless networks offer the same security features as wired networks.
  •    Using encryption prevents unauthorized clients from associating with an access point.
  •    An attacker needs physical access to at least one network device to launch an attack.
  •    With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.
12. Which network design process identifies where to place access points?
  •    site survey
  •    risk assessment
  •    scalability design
  •    network protocol analysis
13. What wireless security feature allows a network administrator to configure an access
point with wireless NIC unique identifiers so that only these NICs can connect to the
wireless network?
  •    authentication
  •    SSID broadcasting
  •    MAC address filtering
  •    EAP (Extensible Authentication Protocol)
  •    Radius (Remote Authentication Dial-In User Service)
14. What will a wireless client transmit to discover the available WLAN networks?
  •    beacon
  •    password
  •    probe request
  •    association request
15. In a WLAN network, why should wireless access points be implemented with each
access point using a different channel?
  •    to keep users segregated on separate subnets
  •    to control the amount of bandwidth that is utilized
  •    to keep signals from interfering with each other
  •    to keep traffic secure
16. What purpose does authentication serve in a WLAN?
  •    converts clear text data before transmission
  •    indicates which channel the data should flow on
  •    determines that the correct host is utilizing the network
  •    allows the host to choose which channel to use
17. What occurs when a rogue access point is added to a WLAN?
  •    Authorized access points can transmit excess traffic to rogue access points to help alleviate
      congestion.
  •    Unauthorized users can gain access to internal servers, thus causing a security hole.
•      All traffic that uses the same channel as the rogue access point will be encrypted.
  •      All traffic that uses the same channel as the rogue access point will be required to authenticate.
18.   What procedure can prevent man- in-the- middle attacks?
  •      Force all devices on a WLAN to authenticate and monitor for any unknown devices.
  •      Enable access points to send an SSID to each device wanting to use the network.
  •      Configure MAC filtering on all authorized access points.
  •      Disable SSID broadcasts.
19.   Which function is provided by a wireless access point?
  •      dynamically assigns an IP address to the host
  •      provides local DHCP services
  •      converts data from 802.11 to 802.3 frame encapsulation
  •      provides a gateway for connecting to other networks
20.   Which major problem does CSMA/CA overcome in wireless networks?
  •      bandwidth saturation
  •      privacy concerns
  •      media contention
  •      device interoperability
21.   What does a wireless access point use to allow WLAN clients to learn which networks
are   available in a given area?
  •      association response
  •      beacon
  •      key
  •      probe request

More Related Content

DOC
Ccna 3 chapter 7 v4.0 answers 2011
DOCX
LoRa application for detecting the harmful gases
PPT
Lecture 11 wifi security
PPTX
Wireless LAN Security
PPT
Managed IP solution
PPT
PPTX
Wireless network security
Ccna 3 chapter 7 v4.0 answers 2011
LoRa application for detecting the harmful gases
Lecture 11 wifi security
Wireless LAN Security
Managed IP solution
Wireless network security

What's hot (20)

PPTX
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
PPT
Configuring linksys wireless router
PPT
Zigbee based two way wireless chatting system
PPTX
Introduction to LoRa for developers
PPTX
R1x g12 wifi i
PPT
POLITEKNIK MALAYSIA
PPTX
Wireless lan security(10.8)
PPTX
PPT
Securing wireless network
PDF
Cellular lpwan paris nov 2015
PPTX
Practical Examples of LoRaWAN in Action
PPT
Wireless hacking septafiansyah
PPT
Wireless LAN security
PPTX
Internet of Things Protocol - Session 2
PPTX
Final presentation
PPTX
Bluetooth security
PPT
5169 wireless network_security_amine_k
PPT
zigbee technology
PPTX
Wireless Network Security
PPT
Shashank wireless lans security
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Configuring linksys wireless router
Zigbee based two way wireless chatting system
Introduction to LoRa for developers
R1x g12 wifi i
POLITEKNIK MALAYSIA
Wireless lan security(10.8)
Securing wireless network
Cellular lpwan paris nov 2015
Practical Examples of LoRaWAN in Action
Wireless hacking septafiansyah
Wireless LAN security
Internet of Things Protocol - Session 2
Final presentation
Bluetooth security
5169 wireless network_security_amine_k
zigbee technology
Wireless Network Security
Shashank wireless lans security
Ad

Viewers also liked (8)

DOC
Ch5 ccna exploration 3 lan swtching and wireless
DOC
Ch4 ccna exploration 3 lan switching and wireless
DOC
Ch3 ccna exploration 3 lan switching and wireless
DOCX
Ch6 ccna exploration 3 lan switching and wireless
DOC
Ch2 ccna exploration 3 lan switching and wireless
PPT
Chapter 2 switches
DOC
Prince 2, project managment Document Configuration item record
PPT
Waves
Ch5 ccna exploration 3 lan swtching and wireless
Ch4 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
Chapter 2 switches
Prince 2, project managment Document Configuration item record
Waves
Ad

Similar to Ch7 ccna exploration 3 lan switching and wireless (20)

PDF
wi-fi technology
PPT
Ids in wn
PPTX
Recent Trends in Wireless communication
PPTX
2nd lec wireless terminologies
PPTX
Wireless Network security
PPTX
Chapter 24 Wireless Network Security Systems
PDF
Cisco discovery d homesb module 7 - v.4 in english.
PDF
Cisco discovery d homesb module 7 - v.4 in english.
PPTX
Wireless and how safe are you
PPTX
Topic 4.0 wireless technology
PPTX
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
PDF
Ccna 1 7
PPTX
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
PPTX
Lorawan: What you need to know
PDF
Basic Network cisco depth of basic knowledge I. All technologies.pdf
PDF
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
PPTX
Build Small Wireless LAN -CISCO ppt.pptx
PPTX
CS 712 (Network Security and Management)-Question.pptx
PPT
Wireless router
PPTX
Wireless lan electronics and communication engineering
wi-fi technology
Ids in wn
Recent Trends in Wireless communication
2nd lec wireless terminologies
Wireless Network security
Chapter 24 Wireless Network Security Systems
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
Wireless and how safe are you
Topic 4.0 wireless technology
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
Ccna 1 7
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Lorawan: What you need to know
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Build Small Wireless LAN -CISCO ppt.pptx
CS 712 (Network Security and Management)-Question.pptx
Wireless router
Wireless lan electronics and communication engineering

More from kratos2424 (9)

DOC
Final exam ccna exploration 3 lan switching and wireless
DOC
Ccna exploration 3 lan switching and wireless
PPT
Switches module 2
PPT
Chapter 7 wireless
PPT
Chapter 6 intervlanrouting
PPT
Chapter 5 stp
PPT
Chapter 4 vtp
PPT
Chapter 1 landesign
PPT
Chapter 3 vlans
Final exam ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wireless
Switches module 2
Chapter 7 wireless
Chapter 6 intervlanrouting
Chapter 5 stp
Chapter 4 vtp
Chapter 1 landesign
Chapter 3 vlans

Ch7 ccna exploration 3 lan switching and wireless

  • 1. CCNA Exploration 3 LAN Switching and Wireless–Chapter 7 Exam 01. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.) • 802.11a suffers from a shorter range than 802.11g. • The 2.4 GHz frequency band is not as crowded as the 5 GHz band. • 802.11a is more susceptible to RF interference from common commercial items. • 802.11a uses a more expensive modulation technique than 802.11g. • 802.11g is backward compatible with 802.11b, but 802.11a is not. 02. Which two statements concerning network security are accurate? (Choose two.) • 802.11i uses 3DES for encryption. • Open authentication uses no client or AP verification. • The 802.11i protocol is functionally identical to WPA. • 802.11i incorporates a RADIUS server for enterprise authentication. • A wireless client first associates with an AP and then authenticates for network access. 03. Which installation method will allow connectivity for a new wireless network? • set up WEP on the access point only • set up open access on both the access point and each device connected to it • set up full encryption on the access point while leaving each device connected to the network open • set up full encryption on each device of the WLAN while leaving the access point settings open 04. Refer to the exhibit. When configuring the wireless access point, which setting does the
  • 2. network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others? • Network Mode • Network Name (SSID) • Radio Band • Wide Channel • Standard Channel 05. Which two statements are true regarding wireless security? (Choose two.) • MAC address filtering prevents the contents of wireless frames from being viewable. • Providing a wireless client with the network key allows an available network to be visible. • Disabling an access point from broadcasting the SSID prevents the access point from being discovered. • Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections. • Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast. 06. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem? • This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels. • The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points. • Install a new wireless access point in this center area to provide coverage. • Verify that the wireless access points have sufficient in-line power and connectivity to the wired network. 07. Which three devices do many wireless routers incorporate? (Choose three.) • gateway for connecting to other network infrastructures • built-in Ethernet switch • network management station • VTP server • wireless access point • VPN concentrator 08. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access? • CSMA/CD • token passing • CSMA/CA • Polling 09. Why is security so important in wireless networks? • Wireless networks are typically slower than wired networks. • Televisions and other devices can interfere with wireless signals. • Wireless networks broadcast data over a medium that allows easy access. • Environmental factors such as thunderstorms can affect wireless networks.
  • 3. 10. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance? • 802.11a • 802.11b • 802.11g • 802.11n 11. Which two statements characterize wireless network security? (Choose two.) • A rogue access point represents a security risk for the local network. • Wireless networks offer the same security features as wired networks. • Using encryption prevents unauthorized clients from associating with an access point. • An attacker needs physical access to at least one network device to launch an attack. • With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect. 12. Which network design process identifies where to place access points? • site survey • risk assessment • scalability design • network protocol analysis 13. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network? • authentication • SSID broadcasting • MAC address filtering • EAP (Extensible Authentication Protocol) • Radius (Remote Authentication Dial-In User Service) 14. What will a wireless client transmit to discover the available WLAN networks? • beacon • password • probe request • association request 15. In a WLAN network, why should wireless access points be implemented with each access point using a different channel? • to keep users segregated on separate subnets • to control the amount of bandwidth that is utilized • to keep signals from interfering with each other • to keep traffic secure 16. What purpose does authentication serve in a WLAN? • converts clear text data before transmission • indicates which channel the data should flow on • determines that the correct host is utilizing the network • allows the host to choose which channel to use 17. What occurs when a rogue access point is added to a WLAN? • Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion. • Unauthorized users can gain access to internal servers, thus causing a security hole.
  • 4. All traffic that uses the same channel as the rogue access point will be encrypted. • All traffic that uses the same channel as the rogue access point will be required to authenticate. 18. What procedure can prevent man- in-the- middle attacks? • Force all devices on a WLAN to authenticate and monitor for any unknown devices. • Enable access points to send an SSID to each device wanting to use the network. • Configure MAC filtering on all authorized access points. • Disable SSID broadcasts. 19. Which function is provided by a wireless access point? • dynamically assigns an IP address to the host • provides local DHCP services • converts data from 802.11 to 802.3 frame encapsulation • provides a gateway for connecting to other networks 20. Which major problem does CSMA/CA overcome in wireless networks? • bandwidth saturation • privacy concerns • media contention • device interoperability 21. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area? • association response • beacon • key • probe request