2.0 Network Implementation Flashcards
You have decided to implement frame tagging in a port-based switching network. What does this technique ensure?
A) that the VLANs are implemented based on protocol
B) that the VLANs are implemented based on port
C) that the VLANs are implemented based on subnet
D) that a single VLAN can be distributed across multiple switches
Frame tagging in a port-based switching network will ensure that a single VLAN can be distributed across multiple switches.
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security to protect against wireless attack. However, you must provide support for older wireless clients. Which protocol should you choose?
A) WEP
B) WPA
C) WAP
D) WPA2
You should implement Wi-Fi Protected Access (WPA). WPA was created to fix core problems with WEP. WPA is designed to work with older wireless clients while implementing the 802.11i standard.
What is WAP?
Wireless Application Protocol (WAP) is the default protocol used by most wireless networks and devices. However, because WAP can access Web pages and scripts, there is great opportunity for malicious code to damage a system. WAP is considered the weakest wireless protocol.
Wi-Fi Protected Access 2 (WPA2) completely implements the 802.11i standard. Therefore, it does not support the use of older wireless cards. Identification and WPA2 are considered the best combination for securing a wireless network. WPA2 is much stronger than WPA. In addition, you can implement WPA2 with Temporal Key Integrity Protocol (TKIP), also referred to as TKIP-RC4, or Advanced Encryption Standard (AES), also referred to as AES-CCMP, to provide greater security. WPA2-AES is stronger than WPA2-TKIP.
What is WEP?
Wired Equivalent Privacy (WEP) is the security standard for wireless networks and devices that uses encryption to protect data. However, WEP does have weaknesses and is not as secure as WPA or WPA2. Wired Equivalent Privacy (WEP) should be avoided because even its highest level of encryption has been successfully broken.
What does an Evil Twin do in terms of hacking into wireless network?
Evil twin − occurs when a wireless access point that is not under your control is used to perform a hijacking attack. It is set up to look just like a valid network, including the same Set Service Identifier (SSID) and other settings.
What does an Rogue Access Point do in terms of hacking into wireless network?
Rogue access point (AP) − occurs when a wireless attack that is not under your control is connected to your network. With these devices, they are not set up to look just like your network. This attack preys on users’ failure to ensure that an access point is valid. You can perform a site survey to detect rogue APs.
What does an War Driving do in terms of hacking into wireless network?
War driving − occurs when attackers seek out a Wi-Fi network with a mobile device or laptop while driving a vehicle. You can lower the signal strength to help protect against this attack. You should also turn off the broadcasting of the SSID and use WPA or WPA2 authentication.
What does an War Chalking do in terms of hacking into wireless network?
War chalking − occurs when attackers place Wi-Fi network information on the outside walls of buildings. Keep an eye out for this type of information by periodically inspecting the outside of your facilities.
What does an BlueJacking do in terms of hacking into wireless network?
Bluejacking − the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices. Turning off Bluetooth when not in use is the best protection against this.
What does an BlueSnarfnig do in terms of hacking into wireless network?
Bluesnarfing − the unauthorized access of information from a wireless device through a Bluetooth connection. Once again, turning off Bluetooth when not in use is the best protection against this.
What does an WPA/WEP/WPS attacks do in terms of hacking into wireless network?
WPA/WEP/WPS attacks − Any attacks against wireless protocols can usually be prevented by using a higher level of encryption or incorporating RADIUS authentication. Wired Equivalent Privacy (WEP) should be avoided. Wi-Fi Protected Setup (WPS) allow users to easily secure a wireless home network but is susceptible to brute force attacks. Wi-Fi Protected Access (WPA) is more secure than WEP and WPS. WPA2 provides better security than WPA.
Which of these devices can perform router functions?
A) Proxy server
B) Multi-layer switch
C) Wireless controller
D) IDS
A multi-layer switch, in addition to working at the Data Link layer (Layer 2), also performs many Layer 3 router functions. When ports on a multi-layer switch are configured as Layer 2 ports, traffic will be routed based on the MAC address. When ports are configured as Layer 3 ports, traffic will be routed based on IP addresses. Multi-layer switches have the ability to route packets between virtual local area networks (VLANs).
What does Wireless controllers provide in AP?
Wireless controllers provide centralized management of wireless access points. Without wireless controllers, each access point must be configured individually.
What is the difference between IDS/IPS ?
An intrusion detection system (IDS) contrasts with an intrusion prevention system (IPS). When comparing IDS/IPS, IDS is essentially a warning system that provides notification of an intrusion, while IPS is more active and can stop an attack while it is taking place. An IDS does not route traffic.
What can a Proxy Server provide in terms of efficiency on the server?
A proxy server can provide caching services to reduce the amount of internet traffic from the gateway.
You need to connect wireless devices to a wired local area network. Which device should you implement?
A) CSU/DSU
B) Wireless NIC
C) Access Point
D) Gateway
An access point is either a software or hardware component that acts as a transceiver for wireless devices, connecting them to a wired local area network (LAN). It serves a similar function as a distribution center sending and receiving signals to and from computers on the network. Stations, or computers, placed too far from the access point will be unable to communicate with the network. A wireless network that employs access points is said to be operating in infrastructure mode. However, wireless networks can also be set up with just a few stations and wireless network cards. This is known as ad-hoc mode. Ad-hoc mode networks can be set up quickly; however, all of the stations must be within a 300-foot radius to communicate. A mesh network may use a combination of wireless access points while allowing some devices to connect using ad-hoc mode. Organizational wireless access points usually provide more connections and a wider range of transmission than small office/home office wireless routers.
What is a gateway?
A gateway is used to connect networks that use different protocols.
What is CSU/DSU funtion?
A Channel Service Unit/Digital Service Unit (CSU/DSU) is a device typically required by leased lines, such as T1 lines, to terminate their media connection to your LAN.
What is NIC used for?
A wireless network interface card (NIC) is designed specifically for wireless networks. It is the piece of hardware that enables wireless communication for a computer.
Why is placement for WAP important?
Keep in mind that wireless access point (WAP) placement is very important. WAP placement varies based on the environment in which the WAP is placed. WAPs should be centrally placed to ensure that the maximum number of devices can use it. Also, you should consider the other devices in the area, such as cordless telephones, that can cause interference. Placement is particularly important if more than one WAP is implemented in the same area. It may be necessary to configure WAPs that are in close proximity to use different channels.
Key features of Wireless controller?
A wireless controller is a centralized device that can be used to manage multiple wireless access points. You need to understand VLAN pooling and Light Weight Access Point Protocol (LWAPP). VLAN pooling assigns IP addresses to wireless clients from a pool of IP subnets and their associated VLANs. The protocols used to communicate between an access point and a wireless control is either the older Lightweight Access Point Protocol (LWAPP) or the more current Control And Provisioning of Wireless Access Points (CAPWAP).
What do you use to allow wireless devices to connect to a wired network?
A wireless bridge is a wireless access point that allows wireless devices to connect to a wired network.
MU-MIMO is a technology that uses?
Multi-user MIMO (MU-MIMO) is a set of advanced multiple in, multiple out (MIMO) technologies where the available antennas are spread over a multitude of independent access points and independent radio terminals. Each has one or multiple antennas. In contrast, single-user MIMO considers a single multi-antenna transmitter communicating with a single multi-antenna receiver. MIMO is used in 802.11n to allow the wireless network to reach higher speeds.
For a branch office network deployment, you have been asked to select network switches for the wiring center in your office building. You need a solution that does not rely on the availability of wall outlets to plug in IP-attached surveillance cameras, IP phones, and wireless access points near the RJ-45 wall jacks where those devices will be attached to the network. Which of the following options within a switch will solve this problem?
A) Configuration files for most common devices
B) QoS Support
C) Web-based UI for setup and configuration
D) Green, energy efficient fanless chassis
E) PoE
Power over Ethernet (PoE), also known as in-line power, allows a network switch to provide power to network-attached devices, including video surveillance cameras, IP phones, and wireless access points (WAPs), through the wall jack that delivers an Ethernet connection. This relieves network designers of the need to ensure adequate power outlets where they wish to stage network devices.