Ch 6 Flashcards

1
Q

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

A

Sequence Control

Indicates how a large packet is fragmented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the frequency range for Bluetooth communication?

A

2.4 GHz - 2.4835 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?

A

EAP-TLS

EAP-TLS > is similar to how HTTPS uses SSl/TLS encryption to secure HTTP transmissions, it uses TLS encryption to protect communications. It also uses PKI (Public-Key Infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server through mutual authentication. Certificates can be a challenge to set up, the resulting authentication strength is often worth the trade in convenience. an addition of a CA (Certificate Authority) to the network to help manage the certificates needed by EAP-TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following security threats involves an interception of the network keys communicated between clients and access points?

A

WPA Attack (Wi-Fi Protected Access) Attack or (WPA Cracking).

WPA > is a wireless security method that dynamically assigns every transmission its own key. Uses stronger encryption methods called TKIP (Temporal Key Integrity Protocol) then WEP.

WPA2 > developed to provide even stronger security than WPA by using AES (Advanced Encryption Standard). Can handle a brute force attack. Federal government uses it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

A

Wireless Range Extender

A device that extends the reach of a wireless signal by repeating the signal from a closer broadcast point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters?

A

Four Hops

Z-Wave transmissions offer a range of up to 100m per hop, and they can tolerate up to four hops through repeaters. Z-wave-controlled devices can serve as repeaters on a Z-Wave mesh network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances.

A

Use the EAP-TLS encryption to protect communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees’ performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.

A

Interference Seems To Be The Cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?

A

-80 dBm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which wireless technology is used to track fitness activity levels and geographic movement?

A

ANT+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tim has been contracted to install a wireless connection at the head office of Travis Roadways. The head office is located in between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI (received signal strength indicator) level required for Tim to establish the connection functional as per the requirements.

A

The RSSI level should at least be -50 dBm.

RSSI (Received Signal Strength Indicator) > is the measure in dBm (decibels relative to one milliwatt) of the power of a transmitted signal at the point of the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can’t find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

A

Wrong SSID

SSID (Service Set Identifier) > is a character string used to identify an access point on an 802.11 network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

A

2.4 GHz - 2.4835 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?

A

Smart Thermostat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?

A

OFDMA (Orthogonal Frequency Division Multiple Access)

In the context of 802.11 wireless technology, a technique that supports more efficient multi-user functionality by allowing an AP to subdivide each channel into smaller frequency allocations for each client, such as 2 MHz or 4 MHz of each 20 MHz channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band?

A

802.11ax

The IEEE standard for a wireless networking technique that operates in both the 2.4-GHz and 5-GHz bands and improves on earlier standards through the implementation of modulation and multi-user technologies. Also called WI-Fi 6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

A

Site Survey

In the context of wireless networking, an assessment of client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.

18
Q

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

A

802.11b

The IEEE standard for a wireless networking technique that uses DSSS (Direct-Sequence Spread Spectrum) signaling in the 2.4-GHz frequency range and provides a theoretical maximum throughput of 11 Mbps.

19
Q

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue.

A

5.925 GHz - 7.125 GHz

20
Q

Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver’s end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client’s device’s RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario.

A

Mark the rating as NOT GOOD

21
Q

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

A

RADIUS (Remote Authentication Dial-In User Service)

A popular protocol for providing centralized AAA services for multiple users.

22
Q

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal’s passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

A

Fading

A variation in a wireless signal strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter.

23
Q

Victor has been recently added to the network engineers’ team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

A

MAC Filtering

A security measure that prevents an AP or a switch from authenticating any device whose MAC address is not listed by the network administrator as an approved device.

24
Q

Mr. Haywire has just bought a set of wireless security cameras for his backyard. Howard, a network professional, has been sent by the store to set up the security cameras. While configuring and setting up the cameras, Howard notices that he is unable to configure the in-house Wi-Fi network with the cameras because of some frequency issues. Analyze what Howard should do in this situation.

A

He should set up an AP that offers a Wi-Fi standard on the band.

25
Q

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

A

Insufficient Wireless Coverage

26
Q

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

A

Wi-Fi Analyzer

Software that can evaluate Wi-Fi network availability as well as help optimize Wi-Fi network availability

27
Q

JW Communications has hired you to install a Wi-Fi network on its floor. To provide a seamless network connection, you have decided to install a centralized wireless controller to manage AP redundancy by directing wireless traffic to alternate APs when an AP fails. Which of the following protocols will you apply in order to direct all the wireless frames to the controller?

A

LWAPP (Lightweight Access Point Protocol)

Centralized wireless management is made possible by a lightweight wireless protocol, such as Cisco’s proprietary LWAPP or Cisco’s newer CAPWAP (Control and Provisioning of Wireless Access Points), both of which direct all wireless frames to the controller by adding extra headers to the frames. The wireless controller can provide centralized authentication for wireless clients, load balancing, and channel management so that neighboring APs don’t try to use overlapping channels.

28
Q

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

A

Captive Portal

The first page displayed by a client’s browser when the client connects to a guest network. This page usually requires the user to agree to a set of terms and conditions before gaining further access to the guest network.

29
Q

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

A

Spectrum Analyzer

A software tool that assesses the characteristics (for example, frequency, amplitude, and the effects of interference) of wireless signals.

30
Q

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

A

Use Geofencing security technique

Geofencing > is an authentication restriction that determines a client’s geographic location to enforce a virtual security perimeter.

31
Q

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

A

Diffraction

32
Q

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

A

A more negative RSSI value indicates a higher quality of signal.

33
Q

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

A

Trailer

Frame Check Sequence (6 bytes) uses a cyclical code to check for errors in the transmission.

34
Q

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

A

NFC (Near-Field Communication)

A form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less). Fixed frequency (13.56 MHz)

35
Q

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation?

A

802.11 ax

The IEEE standard for a wireless networking technique that operates in both the 2.4-GHz and 5-GHz bands and improves on earlier standards through the implementation of modulation and multi-user technologies. Also called WI-Fi 6.

36
Q

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

A

IBSS (Independent Basic Server Set)

A small number of nodes closely positioned to transmit directly to each other without an intervening connectivity device.

37
Q

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

A

WPS Attack (Wi-Fi Protected Setup)

is user friendly-but not very secure-security setting available on some consumer-grade APs. “Push Button Method” to connect devices to the internet (lil button on devices). Part of the security involves requiring a PIN to access the AP’s settings or to associate a new device with the network. The problem is that the PIN can be easily cracked through “Brute Force Attack”, which means simply trying numerous possible character combinations to find the correct combination. This gives the attacker access to the network’s WPA2 key. The PIN feature in WPS should be disabled if possible.

38
Q

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

A

PEAP (Protected EAP)

while EAP-TLS is certificate-based, PEAP and EAP-FAST are tunnel based. PEAP creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. It is called the outer method. Then another form of EAP is used for the inner method, which is the process that occurs inside the protected tunnel.

39
Q

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe’s public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?

A

He should check whether Captive Portal user reminders have been set up.

Captive Portal > is the 1st page displayed by a client’s browser when the client connects to a guest network. This page usually requires the user to agree to a set of terms and conditions before gaining any further access to the guest network.

40
Q

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

A

IBSS (Independent Basic Server Set)

is a small number of nodes closely positioned to transmit directly to each other without an intervening. connectivity device.