169 9

169 9

University

7 Qs

quiz-placeholder

Similar activities

Chapter 11.5

Chapter 11.5

11th Grade - University

5 Qs

Equipe do Módulo 2 - Robô Wireless

Equipe do Módulo 2 - Robô Wireless

6th Grade - University

10 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

Ciberseguridad

Ciberseguridad

University

8 Qs

Telefonía celular

Telefonía celular

University

10 Qs

tecnologia de la informacion y comunicaciones

tecnologia de la informacion y comunicaciones

University

10 Qs

CCNA - SRWE - 12.4.6

CCNA - SRWE - 12.4.6

University

7 Qs

tecnologías de información  y comunicaciones

tecnologías de información y comunicaciones

University

10 Qs

169 9

169 9

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Shaun Matthews

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose three.)

If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used?

11

6

1

3

8

Answer explanation

Media Image

Channels 1, 6, and 11 are the only channels that don't overlap with each other in the 802.11b standard. They have a 5 MHz frequency separation between each other, which minimizes interference between access points operating on these channels.

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?

802.11a

802.11n

802.11b

802.11g

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which method of wireless authentication is currently considered to be the strongest?

WEP

WPA

WPA2

Shared Key

Open

4.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose two)

Which of the following authentication methods has the user enter a pre-shared password?

Open

WPA Personal

WPA Enterprise

WPA2 Personal

WPA2 Enterprise

5.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose two.)

What are the best ways to secure WLANs?

Authentication

SSID CLoaking

Encryption

MAC Address Filtering

Answer explanation

Authentication:

  1. Access Control: Authentication ensures that only authorized users and devices can connect to the WLAN, preventing unauthorized access and bolstering network security.

  2. User Accountability: Authentication mechanisms track and log user access, aiding in auditing and security incident investigations, and holding users accountable for their actions on the network.

Encryption:

  1. Data Confidentiality: Encryption scrambles data during transmission, preserving confidentiality by preventing unauthorized eavesdropping and safeguarding sensitive information.

  2. Data Integrity and Privacy: Encryption maintains data integrity and privacy, protecting against unauthorized data modification during transmission and providing a secure and private communication channel within the WLAN.

6.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

(Choose two.)

A laptop cannot connect to a wireless access point.

Which two troubleshooting steps should be taken first?

Ensure that the wireless NIC is enabled

Ensure that the wireless SSID is chosen

Ensure that the correct network media is selected

Ensure that the NIC is configured for the proper frequency

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Using NAT terminology, what is the address of the source host on a private network as seen from inside the network?

Outside local

Outside global

Inside local

Inside global