Section 6.12 – Flashcards
Unlock all answers in this set
Unlock answersquestion
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
answer
WEP, WPA Personal, and WPA2 Personal
question
Which of the following offers the weakest form of encryption for an 802.11 wireless network?
answer
WEP
question
Which of the following features are supplied by WPA2 on a wireless network?
answer
Encryption
question
You need to secure your wireless network. Which security protocol would be the best choice?
answer
WPA2
question
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)
answer
AES encryption & 802.1x
question
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)
answer
Near cordless phones & Near backup generators
question
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two.)
answer
High-gain & Parabolic
question
How does WPA2 differ from WPA?
answer
WPA2 uses AES for encryption; WPA uses TKIP
question
You need to configure the wireless network card to connect to your network at work. The connection should use a user name and password for authentication with AES encryption. What should you do?
answer
Configure the connection to use WPA2Enterprise
question
Match the wireless networking security standard on the left to its associated characteristics on the right. Each standard can be used more than once.
answer
Short initialization vector makes key vulnerable - WEP Uses AES for encryption - WPA2 Uses RC4 for encryption - WEP Uses TKIP for encryption - WPA Uses CBCMAC for data integrity - WPA2 Uses CCMP for key rotation - WPA2
question
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
answer
WPA2
question
Which of the following is used on a wireless network to identify the network name?
answer
SSID
question
Which of the following are true about WiFi Protected Access 2 (WPA2)? (Select two.)
answer
Uses AES for encryption and CBCMAC for data integrity & Upgrading from a network using WEP typically requires installing new hardware
question
WiMAX is an implementation of which IEEE committee?
answer
802.16
question
You want to connect a laptop computer running Windows 7 to a wireless network. The wireless network uses multiple access points and WPA2Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do?
answer
Configure the connection with a preshared key and AES encryption.