Section 6.12

Which of the following wireless security methods uses a common shared key configured on the
wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal

Which of the following offers the weakest form of encryption for an 802.11 wireless network?
WEP

Which of the following features are supplied by WPA2 on a wireless network?
Encryption

You need to secure your wireless network. Which security protocol would be the best choice?
WPA2

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)
AES encryption & 802.1x

Which of the following locations will contribute the greatest amount of interference for a
wireless access point? (Select two.)
Near cordless phones & Near backup generators

You need to implement a wireless network link between two buildings on a college campus. A
wired network has already been implemented within each building. The buildings are 100
meters apart.
What type of wireless antennae should you use on each side of the link? (Select two.)
High-gain & Parabolic

How does WPA2 differ from WPA?
WPA2 uses AES for encryption; WPA uses TKIP

You need to configure the wireless network card to connect to your network at work. The
connection should use a user name and password for authentication with AES encryption.
What should you do?
Configure the connection to use WPA2Enterprise

Match the wireless networking security standard on the left to its associated characteristics on
the right. Each standard can be used more than once.
Short initialization vector makes key vulnerable – WEP

Uses AES for encryption – WPA2

Uses RC4 for encryption – WEP

Uses TKIP for encryption – WPA

Uses CBCMAC for data integrity – WPA2

Uses CCMP for key rotation – WPA2

You need to add security for your wireless network. You would like to use the most secure
method.
Which method should you implement?
WPA2

Which of the following is used on a wireless network to identify the network name?
SSID

Which of the following are true about WiFi Protected Access 2 (WPA2)? (Select two.)
Uses AES for encryption and CBCMAC for data integrity & Upgrading from a network using WEP typically requires installing new hardware

WiMAX is an implementation of which IEEE committee?
802.16

You want to connect a laptop computer running Windows 7 to a wireless network.
The wireless network uses multiple access points and WPA2Personal. You want to use the
strongest authentication and encryption possible. SSID broadcast has been disabled.
What should you do?
Configure the connection with a preshared key and AES encryption.

Get instant access to
all materials

Become a Member