10-IT2600 Remote Connectivity Practice Quiz Flashcards
Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
Enable an SNMP agent
An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation?
PoE
Fred, a vendor, walks into a customer’s site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site’s wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem?
The wireless router at the customer’s site is configured with MAC filtering.
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?
WAP placement
A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need?
802.11ac with 2 spatial streams and an 80MHz bandwidth
A network administrator needs to deploy seven equally spaced WAPs along an underground tunnel. Which of the following is the BEST channel design to avoid interference?
11, 1, 6, 11, 1, 6, 11
Jennifer, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?
Set up encryption on the WAP and clients
A user’s laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured?
WAP radio power
In RF communications when wavelength increases, frequency ____.
decreases
Jennifer, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
Decreasing radio strength
Which of the following wireless standards provide speeds up to 150Mbps?
802.11n
Users are contacting the internal helpdesk, stating that they are having difficulty staying connected to the wireless network. When the technician investigates, it is discovered that the users are having a problem using the wireless network in the company break rooms. Which of the following should the technician do FIRST?
Unplug appliances (e.g. microwaves) to see if they are causing interference.
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
Dictionary file
What type of server supports EAP-encrypted passwords in accordance with the 802.1X standard?
RADIUS server
Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue?
Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue?
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be consulted?
TEMPEST
A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step?
Establish a plan of action
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?
Jamming
Which of the following wireless security measures, although widely implemented, does not provide strong security?
MAC address filtering
A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?
MAC filtering
Users in a coffee shop may connect to the shops’s hotspot named “CoffeeshopWiFi”. Another patron has initialized a virtual AP with an identical SSID with the goal of stealing customer’s logon credentials. Which of the following is occurring in this scenario?
Evil twin
Which of the following 802.11 standards can operate at both 2.4Ghz and 5.0Ghz?
n
__________ is a line-of-sight type of wireless media.
microwave
A network technician has a RADIUS server IP address that must be included as part of the security settings for a WAP. Which of the following encryption types should the technician select?
WPA enterprise