LabSim 6.14 Practice Questions – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
answer
Disable SSID broadcast
question
Which remote access authentication protocol allows for the use of smart cards for authentication?
answer
EAP
question
Which of the following do switches and wireless access points use to control access through the device?
answer
MAC Filtering
question
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
answer
On a RADIUS Server
question
You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the neccessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?
answer
The system is vulnerable because LEAP is susceptible to dictionary attacks.
question
You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. To do this, you need to configure a RADIUS Server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is part of the complete solution)
answer
Configure the RADIUS server with a server certificate and Configure all wireless access points with client certificates.
question
Which implementation is most secure?
answer
EAP-TLS
question
Which of the following features on a wireless network allows or rejects client connections based on the hardware address?
answer
MAC address filtering
question
You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from accessing the access point (AP) configuration utility?
answer
Change the administrative password on the AP.
question
You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?
answer
WPA2 and AES
question
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?
answer
Near a window
question
What purpose does a wireless site survey serve? (Choose two)
answer
To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.
question
You need to place a wireless access point in your two story building. While trying to avoid interference, which of the following is the best location for the access point?
answer
In the top floor
question
You are designing a wireless network implementation for a small business. the business deals with sensitive customer information, so data emanation must be reduces as much as possible. The floor plan of the office is shown below. Match each type of access point antenna with the appropriate location on the floorplan.
answer
Location = type A= Directional B= Directional C=Omnidirectional D= Directional E= Directional F= Directional G= Directional
question
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for guests. The owner has asked that you implement security controls such that only paying guests are allowed to use the wireless network. She wants guests to be presesnted with a loging page when they initially connect to the WLAN. After entering a code provided at check in, guests should then be allowed full access to the Internet. If a user does not provide the correct code, they should not be allowed access to the internet. What should you do?
answer
Implement a captive portal
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New