Ch 6 Flashcards
As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?
Sequence Control
Indicates how a large packet is fragmented.
What is the frequency range for Bluetooth communication?
2.4 GHz - 2.4835 GHz
Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?
EAP-TLS
EAP-TLS > is similar to how HTTPS uses SSl/TLS encryption to secure HTTP transmissions, it uses TLS encryption to protect communications. It also uses PKI (Public-Key Infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server through mutual authentication. Certificates can be a challenge to set up, the resulting authentication strength is often worth the trade in convenience. an addition of a CA (Certificate Authority) to the network to help manage the certificates needed by EAP-TLS.
Which of the following security threats involves an interception of the network keys communicated between clients and access points?
WPA Attack (Wi-Fi Protected Access) Attack or (WPA Cracking).
WPA > is a wireless security method that dynamically assigns every transmission its own key. Uses stronger encryption methods called TKIP (Temporal Key Integrity Protocol) then WEP.
WPA2 > developed to provide even stronger security than WPA by using AES (Advanced Encryption Standard). Can handle a brute force attack. Federal government uses it.
Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?
Wireless Range Extender
A device that extends the reach of a wireless signal by repeating the signal from a closer broadcast point.
Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters?
Four Hops
Z-Wave transmissions offer a range of up to 100m per hop, and they can tolerate up to four hops through repeaters. Z-wave-controlled devices can serve as repeaters on a Z-Wave mesh network.
Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances.
Use the EAP-TLS encryption to protect communications
Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees’ performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.
Interference Seems To Be The Cause.
A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?
-80 dBm
Which wireless technology is used to track fitness activity levels and geographic movement?
ANT+
Tim has been contracted to install a wireless connection at the head office of Travis Roadways. The head office is located in between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI (received signal strength indicator) level required for Tim to establish the connection functional as per the requirements.
The RSSI level should at least be -50 dBm.
RSSI (Received Signal Strength Indicator) > is the measure in dBm (decibels relative to one milliwatt) of the power of a transmitted signal at the point of the receiver.
Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can’t find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.
Wrong SSID
SSID (Service Set Identifier) > is a character string used to identify an access point on an 802.11 network.
Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?
2.4 GHz - 2.4835 GHz
Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?
Smart Thermostat
Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?
OFDMA (Orthogonal Frequency Division Multiple Access)
In the context of 802.11 wireless technology, a technique that supports more efficient multi-user functionality by allowing an AP to subdivide each channel into smaller frequency allocations for each client, such as 2 MHz or 4 MHz of each 20 MHz channel.
Which of the following 802.11 wireless standards operates in the 6-GHz frequency band?
802.11ax
The IEEE standard for a wireless networking technique that operates in both the 2.4-GHz and 5-GHz bands and improves on earlier standards through the implementation of modulation and multi-user technologies. Also called WI-Fi 6.