Chapter 8 Flashcards
Which of the following is used on a wireless network to identify the network name?
MAC address
SSID
IP address
Subnet mask
SSID
Which of the following is generated after a site survey and shows the Wi-Fi signal strength throughout the building?
Analyzer
Ad hoc
Diagram
Heat map
Heat Map
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart.
Which type of wireless antenna should you use on each side of the link? (Select two.)
Directional
Omni-directional
Parabolic
High-gain
Normal-gain
Parabolic
High-gain
The IT manager has tasked you with installing the new wireless LAN controller (WLC).
Where should you install the controller?
Network closet
Manager’s Office
Roof
Lobby
Network closet
Which type of wireless access point is generally used in a residential setting?
LWAP
Bridge
SOHO
WLC
SOHO
You need to implement a solution to manage multiple access points in your organization. Which of the following would you most likely use?
LWAP
Bridge
SOHO
WLC
WLC
Which of the following devices would you use to perform a site survey?
Wi-Fi analyzer
Wireless interface
Heat map
Wireless access point
Wi-Fi analyzer
Which of the following types of site surveys should be performed first?
Predictive
Passive
Ad hoc
Active
Passive
Which of the following is responsible for broadcasting information and data over radio waves?
Wireless bridge
Wireless access point
Wireless interface
Wireless LAN controller
Wireless access point
Which class of wireless access point (WAP) has everything necessary to manage clients and broadcast a network already built into its functionality?
Bridge
Ad hoc
Fat
Thin
Fat
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
Bluebugging
Bluejacking
Bluesnarfing
Slamming
Bluejacking
Which of the following best describes Bluesnarfing?
Sending anonymous electronic business cards
Viewing calendar, emails, and messages on a mobile device without authorization
Executing commands on a mobile device
Cloning a mobile device
Viewing calendar, emails, and messages on a mobile device without authorization
Which type of interference is caused by motors, heavy machinery, and fluorescent lights?
EMI
RFID
NFC
RFI
EMI
Which of the following best describes an evil twin?
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
A threat agent that marks the outside of buildings to indicate the presence of a wireless network.
An access point that is added to a network by an internal employee to provide unauthorized network access.
A Bluetooth device that receives mobile phone commands via bluebugging.
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
Listen to exam instructions
Which type of attack is WEP extremely vulnerable to?
Cloning
Evil twin
IV attack
Bluesnarfing
IV attack