Chapter 9

docx

School

Eastern Gateway Community College *

*We aren’t endorsed by this school

Course

133

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

25

Uploaded by DeaconGullMaster901

Report
9.1.5 1 - Uses a narrow frequency band and hops data signals in a predictable sequence. correct answer: FHSS Breaks data into pieces and sends the pieces across multiple frequencies in a defined range. correct answer: DSSS Breaks data into very small data streams in order to send the information across long distances correct answer: OFDM 2 - An access point that conforms to the IEEE 802.11ac standard handles network traffic similarly to which other networking device? HUB 3 - All of the 802.11 standards for wireless networking support which type of communication path sharing technology? CSMA/CA 4 - Which IEEE standard describes wireless communication? 802.11 5 - You are designing a wireless network for a client. Your client would like to implement the highest speed possible. Which 802.11 standard will work best in this situation? 802.11ac 6 -A user on your network has moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem? The client system has moved too far away from the access point. 7 - Which of the following is true of a wireless network SSID? Groups wireless devices together into the same logical network. 8 - Which wireless networking component is used to connect multiple APs together? DS 9 - Which of the following allows devices to find a specific access point within an extended service set that has multiple access points? BSSID
10 - Which of the following is the backbone or local area network that connects multiple access points (and basic service sets) together? DS 9.2.6 1 - Which IEEE wireless standards specify transmission speeds up to 54 Mbps? 802.11g AND 802.11a 2 - You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a frequency range of 5 GHz and provide the highest possible transmission speeds. – 802.11ac 3 - Which of the following are frequencies defined by 802.11 committees for wireless networking? – 2.4 GHz and 5.75 GHz 4 - Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: A wireless television distribution system running at 2.4 GHz. A wireless phone system running at 5.8 GHz. A wireless phone system running at 900 MHz. An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range. Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame? The wireless TV system 5 - How many total channels are available for 802.11a wireless networks? – 23 6 - Which technologies are used by the 802.11ac standard to increase network bandwidth? 160 MHz bonded channels AND Eight MIMO radio streams 7 - You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.) 802.11b AND Bluetooth 8 - Infrared operates in which of the following modes? LINE OF SIGHT AND DIFFUSE 9 - What is Channel bonding? - Combines two non-overlapping channels into a single channel, resulting in slightly more than double the bandwidth.
10 - Which of the following modes are used for Near Field Communications? CARD EMULATION AND PEER-TO-PEER AND Reader/Writer 9.3.4 In this lab, your task is to create a wireless network as follows: Select a wireless access point that meets the following criteria: o Transmission speeds up to 600 Mbps. o Backwards compatible with other wireless standards that use 2.4GHz. Install the wireless access point as follows: o Place the wireless access point on the computer desk. o Select the correct cable to connect the wireless access point to a free LAN port on the existing router. o Connect power to the wireless access point through an outlet on the surge protector or wall plate. Configure the owner's new laptop to connect to the wireless network as follows: o Slide the wireless switch on the front of the laptop to the On position. This will enable the integrated wireless network interface card on the laptop. o Use the default settings as you connect the laptop to the wireless network and save the wireless profile with these settings. Complete this lab as follows: 1. Select and install a wireless access point on the Workspace. a. On the Shelf, expand Wireless Access Points . b. Read the device descriptions to identify the correct wireless access point. c. Drag the Wireless Access Point, 802.11b/g/n to the Workspace. d. Above the wireless access point, select Back to switch to the back view of the wireless access point. 2. Provide power to the wireless access point. a. On the Shelf, expand Cables . b. Select the Power Adapter . c. In the Selected Component window, drag the DC Power Connector to the port on the wireless access point. d. In the Selected Component window, drag the AC Power Adapter end to an outlet on the surge protector. 3. Connect the wireless access point to the router. a. On the Shelf, select the Cat6a cable . b. In the Selected Component window, drag a connector to the Ethernet port on the back of the wireless access point. c. Above the router, select Back to switch to the back of the router. d. In the Selected Component window, drag the other connector to one of the free LAN ports on the router.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4. On the front of the laptop, click the wireless switch to enable the integrated wireless network interface on the laptop. This will slide the switch to the ON position. 5. Connect the laptop to the TrendNet-BGN wireless network and create a wireless network profile. a. On the laptop's monitor, select Click to view Windows 10 . b. In the notification area, select the Network icon. c. Select TrendNet-BGN . d. Make sure Connect automatically is selected. e. Select Connect . f. Select Yes to make the computer discoverable on the network. 9.3.5 In this lab, your task is to: Change the settings on the wireless access point as follows: o Use PoliceVan for the SSID. The SSID name is case sensitive. o Use WPA2-PSK authentication with AES for encryption. o Configure 4WatchingU as the pass phrase. The pass phrase is case sensitive. Change the wireless access point's administrator authentication credentials from their defaults as follows: o Username: @dm1n o Password: StayOut! (O is the capital letter O) Do not save the credentials in Chrome. Configure the laptop to connect to the wireless network and save the wireless profile with the settings as listed above. Complete this lab as follows: 1. Change the settings on the wireless access point. a. From the taskbar, open Chrome . b. In the URL field, type 192.168.0.254 and press Enter . c. In the Username field, enter admin . d. In the Password field, enter password . e. Make sure Remember my credentials is not selected. f. Select OK . g. Maximize the window for easier viewing. h. In the left menu, select Wireless . i. Select Basic . j. In the Wireless Name (SSID) field, enter PoliceVan . k. Select Apply . l. Make sure admin is entered in the Username field. m. Make sure password is entered in the Password field. n. Select OK .
o. In the left menu under Wireless, select Security . p. From the Security Mode drop-down list, select WPA2-PSK . q. In the Pass Phrase field, enter 4WatchingU as the pass phrase. r. Select Apply . 2. Change the wireless access point's administrator authentication credentials from their defaults. a. On the left, select Administrator . b. Select Management . c. In the Account field, enter @dm1n as the new username. d. In the Password field, enter StayOut! (O is the capital letter O). e. Select Apply . f. Close Chrome. 3. Configure the Home-Laptop to connect to the wireless network and save the wireless profile. a. From the top navigation tabs, select Computer Desk . b. On the monitor of Home-Laptop, select Click to view Windows 10 . c. In the notification area, select the Network icon. d. Select PoliceVan . e. Make sure Connect automatically is selected. f. Select Connect . g. In the Security Key field, enter 4WatchingU . h. Select Next . i. Select Yes to make your PC discoverable on the network. j. In the notification area, select the Network icon in the notification area or open the Network & Internet settings to confirm the connection. 9.3.6 1 - You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? TKIP ENCRYPTION AND PRESHARED KEY 2 - You are an administrator of a growing network. The network you have created is broadcasting, but you cannot ping systems on different segments of your network. Which device should you use to fix this issue? NETWORK BRIDGE 3 - You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points?
SAME SSID, SAME CHANNEL 4 - You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do? Decrease the beacon interval. 5 - You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but you cannot see your network. What should you do? CONFIGURE A PROFILE ON THE WIRELESS CLIENT 6 - You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? 802.11N 7 - You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address? MAC ADDRESS FILTERING 8 - Which of the following wireless network protection methods prevents the broadcasting of the wireless network name? SSID BROADCAST
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9 - Which of the following is considered the strongest encryption method? AES 10 - Which of the following are features of Hotspot 2.0? Uses WPA2 Enterprise for authentication and encryption. AND Is enabled by default on Windows 10 9.4.7 In this lab, your task is to install the proper types of WAPs to provide adequate wireless coverage while also reducing signal emanation as much as possible. As you install each WAP, consider the following: Use the best antenna type for the specific placement location. There are two WAP antenna types available, directional and omnidirectional. Reduce signal emanation which is as important as adequate wireless coverage. Do not install more equipment than necessary. Only three WAPs are required to complete this lab. Complete this lab as follows: 1. On the Shelf, expand Wireless Access Points . 2. Drag the Wireless Access Point (Omnidirectional Antenna) to the wall behind the reception desk in the Lobby. 3. Drag one Wireless Access Point (Directional Antenna) to the installation area on the left wall of the IT Administration office. 4. Drag another Wireless Access Point (Directional Antenna) to the installation area on the right wall of the Networking Closet. 9.4.8 In this lab, your task is to complete the following: Install the proper antenna on the roof of both buildings to provide a high-speed wireless connection between them. Install the appropriate WAP on the roof of each building. Attach the antenna that will provide adequate coverage to only the problem area. Complete this lab as follows: 1. Install an antenna on each building's roof to provide a high-speed wireless connection. a. On the Shelf, expand High-gain Antennas . b. Drag the High-gain Antenna (Directional) to the installation area on Building A's roof. You use a high-gain directional antenna for the connection between the buildings to provide a very strong, concentrated signal in only one direction. Using a high-
gain omnidirectional antenna will broadcast the signal in all directions for a very long distance, introducing a security vulnerability. c. Drag the remaining High-gain Antenna (Directional) to the installation area on Building B's roof. 2. Install a WAP on each building's roof. a. On the Shelf, expand Wireless Access Points . b. Drag the Wireless Access Point (Outdoor) to the installation area on Building A's roof. Because you need to provide coverage to only the patio areas, the best antenna choice is a directional antenna. Outdoor WAPs are designed to withstand outdoor conditions, such as heat, cold, and rain. c. Drag the remaining Wireless Access Point (Outdoor) to the installation area on Building B's roof. 3. Attach both antennae to provide adequate coverage. a. On the Shelf, expand WAP Antennas . b. Drag the WAP Antenna (Directional) to one of the installed outdoor WAPs. c. Drag the remaining WAP Antenna (Directional) to the other installed outdoor WAP. 9.4.9 1 - You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern? OMNI DIRECTIONAL 2 - Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.7 GHz Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do? Double the bandwidth assigned per channel to 40 MHz.
3 - To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: Non-overlapping Low utilization Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results, which channel should you configure your wireless AP to use? CHANNEL 1 4 - What purposes does a wireless site survey fulfill? Identify the coverage area and preferred placement of access points. AND Identify existing or potential sources of interference. 5 - You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antennae should you use on each side of the link? DIRECTIONAL AND HIGH-GAIN 6 - Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate? Z-WAVE 7 - What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? NEAR A WINDOW 8 - Which of the following best describes a site survey? A process of planning and designing a wireless network. 9 - Which of the following best describe a spectrum analyzer? A tool used to determine the noise floor in the desired frequency range. 10 - Which of the following should you include in your site survey test equipment? A TALL LADDER and A SPECTRUM ANALYZER 9.5.4 In this lab, your task is to: Create a WLAN using the following settings:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
o Name: CorpNet Wireless o ESSID: CorpNet o Type: Standard Usage o Authentication: Open o Encryption: WPA2 o Encryption algorithm: AES o Passphrase: @CorpNetWeRSecure! Connect the Exec-Laptop in the Executive office to the new wireless network. Complete this lab as follows: 1. From the taskbar, open Chrome . 2. In the URL field, enter 192.168.0.6 and press Enter . 3. Maximize the window for easier viewing. 4. Log in to the wireless controller console. a. In the Admin field, enter PowerUser . b. In the Password field, enter S3cur3! as the password. c. Select Login . 5. Select the Configure tab. 6. From the left menu, select WLANs . 7. Under WLANs, select Create New . 8. In the Name field, enter the network name . 9. In the ESSID field, enter the ESSID for the network. 10. Under Type, make sure Standard Usage is selected. 11. Under Authentication Options, make sure Open is selected. 12. Under Encryption Options, select WPA2 . 13. Under Algorithm, make sure AES is selected. 14. In the Passphrase field, enter the passphrase for the network. 15. Select OK . 16. Using the navigation tabs at the top of the screen, select Floor 1 . 17. Under Executive Office, select Exec-Laptop . 18. In the notification area, select the wireless network icon to view the available networks. 19. Select CorpNet . 20. Select Connect . 21. Enter @CorpNetWeRSecure! for the security key. 22. Select Next . 23. Select Yes to make the computer discoverable on the network. 9.5.5 1 - Match each wireless networking term or concept on the left with the appropriate description on the right. Each term may be used once, more than once, or not at all. Moving a wireless device between access points within the same wireless network.
correct answer: Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN. correct answer: LWAPP Specifies the number of clients that utilize the wireless network. correct answer: Device density Automatically partitions a single broadcast domain into multiple VLANs. correct answer: VLAN pooling Connects two wired networks over a Wi-Fi network. correct answer: Wireless bridge The number of useful bits delivered from sender to receiver within a specified amount of time. correct answer: Goodput 2 - Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic? Distributed wireless mesh infrastructure
3 - Which enterprise deployment has limited mobility and is difficult to manage? INDPENDENT ACCESS POINTS 4 - What is a lightweight access point used for? To route frames between the wireless and wired networks. 5 - As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as? ROAMING 6 - You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? WPA2 7 - Independent access point infrastructure correct answer: Intelligent AP Hub-and-spoke infrastructure correct answer: Lightweight AP Distributed wireless mesh infrastructure correct answer: Intelligent AP 8 - To enable roaming, network administrators have to configure all access points in the network to comply with which of the following criteria? To function on the same IP subnet. AND To have the same SSID. AND To use the same channel. 9 - Which of the following best describes a hub-and-spoke infrastructure deployment model? A wireless controller is connected to all access points through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 - For home or small business implementations, you typically use a consumer-grade access point that combines many functions into a single device. What is the maximum number of clients that can be supported at a time? 5-10 WIRELESS CLIENTS 9.6.7 In this lab. your task is to connect the components to make the internet connection. Add the cable modem to the Workspace. o Connect the modem to the WAN connection. o Plug in the modem. Add the wireless router to the Workspace. o Connect the internet port on the router to the cable modem. o Connect the computer to a Ethernet port on the wireless router. o Plug in the wireless router. Complete this lab as follows: 1. Connect the modem to the WAN connection. a. On the Shelf, expand Routers . b. Drag the Cable Modem/Router from the Shelf to the Workspace. c. Above the cable modem, select Back to switch to the back view of the cable modem. d. On the Shelf, expand Cables . e. Select the coaxial cable . f. Under Selected Component, drag a Coaxial Type F Connector to the port on the cable modem. g. Under Selected Component, drag the other Coaxial Type F Connector to the port on the wall plate. 2. Connect the wireless router to the cable modem. a. On the Shelf, expand Routers . b. Drag the wireless router from the Shelf to the Workspace. c. Above the wireless router, select Back to switch to the back view of the wireless router. d. On the Shelf, expand Cables . e. Select the Cat6a cable . f. Under Selected Component, drag a RJ45 Connector to the Internet port on the wireless router. g. Under Selected Component, drag the other RJ45 Connector to the port on the cable modem. 3. Connect the computer to the wireless router. a. Above the computer, select Back to switch to the back view of the computer. b. On the Shelf, select the Cat6a cable . c. Under Selected Component, drag a RJ45 Connector to the network port on the computer.
d. Under Selected Component, drag the other RJ45 Connector to an Ethernet port on the wireless router. 4. Plug in the cable modem. a. On the Shelf, select the Power Adapter . b. Under Selected Component, drag the DC Power Connector to the port on the cable modem. c. Under Selected Component, drag the AC Power Adapter to the power outlet. 5. Plug in the wireless router. a. On the Shelf, select the Power Adapter . b. Under Selected Component, drag the DC Power Connector to the port on the wireless router. c. Under Selected Component, drag the AC Power Adapter to the power outlet. 9.6.8 1 - A technician is installing a new SOHO wireless router. Which of the following is the first thing the technician should do to secure the router? Change the router's default password. 2 - A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal? ENABLE CONTENT FILTERING 3 - A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take next? CHECK FOR AND APPLY FIRMWARE UPDATES 4 - A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is most likely to improve VoIP performance? Change QoS settings to give VoIP traffic more priority.
5 - A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is most likely to restore internet connectivity? Configure the SOHO router for NAT. 6 - Which of the following locations will contribute the greatest amount of interference for a wireless access point? NEAR BACKUP GENERATORS AND NEAR CORDLESS PHONES 7 - A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change? ENABLE MAC FILTERING 8 - Which of the following is used on a wireless network to identify the network name? SSID 9 - Which of the following is true when the DHCP setting is disabled in a wireless network? Wireless clients must use a static IP address within the correct IP address range to connect to the network. 10 - Manages all of the APs that are connected to it. Wireless controller correct answer: Supports 30 to 50 wireless clients per access point. Wireless controller correct answer: Provides NAT routing and an Ethernet switch in one device. Consumer-grade (SOHO) wireless router correct answer:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Supports a maxiumum of 5-10 wireless clients. Consumer-grade (SOHO) wireless router correct answer: Pushes wireless configuration settings to connected access points. Wireless controller correct answer: 9.7.6 In this lab, your task is to: Change the admin username and password for the Zone Director controller to the following: o Admin Name: WxAdmin o Password: ZDAdminsOnly!$ (O is the capital letter O) Set up MAC address filtering (L2 Access Control) to create a whitelist called Allowed Devices that includes the following wireless devices: o 00:18:DE:01:34:67 o 00:18:DE:22:55:99 o 00:02:2D:23:56:89 o 00:02:2D:44:66:88 Implement a device access policy called NoGames that blocks gaming consoles from the wireless network. Complete this lab as follows: 1. Change the admin username and password as follows: a. From the taskbar, open Chrome . b. Type 192.168.0.6 and press Enter . c. Maximize the window for easier viewing. d. In the Admin Name field, enter admin . e. In the Password field, enter password . f. Select Login . g. From the top, select the Administer tab. h. Make sure Authenticate using the admin name and password is selected. i. In the Admin Name field, enter the new username .
j. In the Current Password field, enter the current password . k. In the New Password field, enter the new password . l. In the Confirm New Password field, enter the new password . m. On the right, select Apply . 2. Enable MAC address filtering as follows: a. From the top, select the Configure tab. b. From the left menu, select Access Control . c. Expand L2-L7 Access Control . d. Under L2/MAC address Access Control, select Create New . e. In the Name field, enter Allowed Devices . f. Under Restriction, make sure Only allow all stations listed below is selected. g. Enter a MAC address . h. Select Create New . i. Repeat step 2g–2h for each MAC address you would like to add to the ACL. j. Select OK . 3. Configure access controls as follows: a. Under Access Control, expand Device Access Policy . b. Select Create New . c. In the Name field, enter NoGames . d. Select Create New . e. In the Description field, enter Games . f. In the OS/Type drop-down list, select Gaming . g. In the Type field, select Deny . h. Under Uplink, make sure Disabled is selected. i. Under Downlink, make sure Disabled is selected. j. Select Save . k. Select OK . 9.7.7 1 - Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, and WPA2 Personal 2 - You want to implement 802.1x authentication on your wireless network. Which of the following will be required? RADIUS 3 - You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? 802.1x AND AES encryption 4 - Which of the following specifications identifies security that can be added to wireless networks? 802.11i AND 802.1x 5 - You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off.
Which of the following must you configure manually on the client? Preshared Key AND SSID AND AES 6 - You are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? Configure the RADIUS server with a server certificate. AND Configure all wireless access points with client certificates. 7 - You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? Check the MAC addresses of devices connected to your wired switch. AND Conduct a site survey. 8 - An attacker is trying to compromise a wireless network that has been secured using WPA2- PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page that asks them to enter the WPA2 passphrase. When they do, she uses the password to connect a wireless client to the real access point. Which attack techniques did the attacker use in this scenario? Pharming AND Evil Twin 9 - Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this? Rogue access point
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 - Which of the following measures makes your wireless network invisible to the casual attacker performing war driving? Disable SSID broadcast 9.8.5 In this lab, your task is to: Configure self healing on the wireless network. o Automatically adjust AP radio power to optimize coverage when interference is present. o Set 2.4GHz and 5GHz radio channels to use the Background Scanning method to adjust for interference. Configure the background scanning needed for rogue device detection, AP locationing, and self healing. Background scans should be performed on all radios every 30 seconds . Configure load balancing for all radios by adjusting the threshold to 40dB . Configure band balancing to allow no more than 30% of clients to use the 2.4GHz radios. Reduce the power levels to -3dB for three access points in Building A to reduce RF emanations. Complete this lab as follows: 1. Configure self healing. a. From the top, select the Configure tab. b. From the left menu, select Services . c. Select Automatically adjust AP radio power to optimize coverage when interference is present . d. Under Automatically adjust 2.4GHz channels using, select Background Scanning from the drop-down menu. e. Under Automatically adjust 5GHz channels using, select Background Scanning from the drop-down menu. f. On the right, select Apply . 2. Configure background scanning. a. Select Run a background scan on 2.4GHz radio . b. Enter 30 seconds. c. Select Run a background scan on 5GHz radio . d. Enter 30 seconds. e. On the right, select Apply . 3. Configure load balancing. a. Select Run load balancing on 2.4GHz radio . b. In the Adjacent radio threshold(dB) field, enter 40 . c. Select Run load balancing on 5GHz radio . d. In the Adjacent radio threshold(dB) field, enter 40 . e. On the right, select Apply . 4. Configure band balancing.
a. Select Percent of clients on 2.4GHz radio . b. Enter the percentage . c. On the right, select Apply . 5. Adjust the AP power level. a. From the left menu, select Access Points . b. From the top right, select Exhibit to determine which access points to adjust. c. Select Edit next to the access point to be modified. d. Under Radio B/G/N(2.4G) next to TX Power, make sure Override Group Config is selected. e. From the TX Power drop-down list, select -3dB (1/2) . f. Under Radio A/N/AC(5G) next to TX Power, make sure Override Group Config is selected. g. From the TX Power drop-down list, select -3dB (1/2) . h. Select OK . i. Repeat steps 6b - 6f for additional access points. 9.8.6 Required Actions & Questions On Gst-Lap, reconnect to the CorpNet wireless network On Exec-Laptop, forget the HomeWireless network On Exec-Lap, slide the wireless switch to ON and connect to the CorpNet wireless networkShow Details Q1What is the name of the corporate WLAN? Your answer: CorpNet.local Correct answer: CorpNet.local Q2What is the passphrase used for the WLAN security key? Your answer: @CorpNetWeRSecure!& Correct answer: @CorpNetWeRSecure!& Q3Which wireless networks are available to Gst-Lap? Your answer: CorpNet, Starsky, NetGearWireless Correct answer: CorpNet, Starsky, NetGearWireless Q4Which wireless network is Gst-Lap connected to? Your answer: None Correct answer: None Q5Which known networks are displayed? Your answer: CorpNet Correct answer: CorpNet Q6Why did Gst-Lap connect without you entering the security key? Your answer: Because the laptop connected to the network once before using the security key. Correct answer: Because the laptop connected to the network once before using the security key. Q7Which wireless networks are available to Exec-Laptop? Your answer: None
Correct answer: None Q8What is the position of the switch for the wireless network interface card? Your answer: Off Correct answer: Off Q9Which wireless networks are available to Exec-Laptop now? Your answer: CorpNet, Starsky, NetGearWireless Correct answer: CorpNet, Starsky, NetGearWireless Q10Which wireless network is Exec-Laptop connected to? Your answer: None Correct answer: None Q11Which know networks are displayed? Your answer: HomeWireless Correct answer: HomeWireless Explanation In this lab, your task is to explore, diagnose, and fix the wireless network configuration problems. Use the following troubleshooting tools: The Network and Sharing Center in the Windows 10 operating system on a laptop. The wireless controller interface accessed through Chrome at 192.168.0.6 with the username WxAdmin and password ZDAdminsOnly!$ (O is the letter o). Complete this lab as follows: 1. On ITAdmin, view the wireless controller's configuration interface using Chrome. a. Under IT Administration, select ITAdmin . b. From the taskbar, select Chrome . c. In the URL field, enter 192.168.0.6 and press Enter . d. Maximize the window for easier viewing. e. In the Admin Name field, enter WxAdmin . f. In the Password field, enter ZDAdminsOnly!$ (O is the letter o). g. Select Login . h. Select the Configure tab. i. From the left menu, select WLANs . j. Answer question 1. k. Under WLANs, select Edit in the table under Actions. l. Answer question 2. 2. Identify the wireless connections on Gst-Lap. a. From the navigation tabs at the top, select Floor 1 Overview to switch to Gst- Lap. b. Under Lobby, select Gst-Lap . c. In the notification area, select the wireless network icon. d. Answer questions 3-4. e. Select Start . f. Select Settings . g. Select Network & Internet .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
h. Select Wi-Fi . i. Under Wi-Fi, select Manage known networks . j. Answer question 5. k. In the notification area, select the wireless network icon. l. Select the CorpNet wireless network name. m. Select Connect . n. Answer question 6. 3. Identify the wireless connections on Exec-Laptop. a. From the navigation tabs at the top, select Floor 1 Overview to switch to Exec- Laptop. b. Under Executive Office, select Exec-Laptop . c. In the notification area, select the wireless network icon. d. Answer question 7. e. From the navigation tabs at the top, select Floor 1 Overview . f. Under Executive Office, select Hardware . g. Answer question 8. h. Slide the wireless switch to turn the wireless network interface card on. i. On the laptop monitor, select Click to view Windows 10 . j. On Exec-Laptop, select the wireless network icon in the notification area to view the available networks. k. Answer questions 9-10. 4. Manually connect to the CorpNet wireless network. a. Select Start . b. Select Settings . c. Select Network & Internet . d. Select Wi-Fi . e. Under Wi-Fi, select Manage known networks . f. Answer question 11. g. Select HomeWireless . h. Select Forget . i. Select the wireless network icon in the notification area to view the available networks. j. Select the CorpNet wireless network name. k. Select Connect . l. Enter the security key for the wireless network (the security key learned in Step 1l above). m. Select Next . n. Select Yes to make the PC discoverable. Exec-Laptop successfully connected to the CorpNet network. 9.8.7 In this lab, your task is to: Use the following troubleshooting tools to diagnose the problem in the wireless network:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
o Use the Gst-Lap in the Lobby to verify that the wireless access point is working. o Use the wireless controller management interface: Browser: Chrome IP address: 192.168.0.6 Username: WxAdmin Password: ZDAdminsOnly!$ o Use the Network and Sharing Center in the Windows operating system. Use the troubleshooting tools to confirm the resolution of the problem. Fix the problem on Exec-Laptop, the wireless controller interface, or both as necessary. Connect to the CorpNet wireless network. Complete this lab as follows: 1. Under Lobby, select Gst-Lap . 2. In the notification area, select the wireless network icon to view the available networks to verify the problem found on the laptop in the Executive Office. The CorpNet wireless network is displayed in the list of available networks. 3. Select the CorpNet wireless network. 4. Select Connect . 5. Enter @CorpNetWeRSecure!& for the security key and select Next . 6. Select Yes . Gst-Lap is now connected to the CorpNet wireless network. Because Gst-Lap can connect to the wireless network, the problem may be limited to only the Exec-Laptop laptop in the Executive Office. 7. From the top navigation tabs, select Floor 1 Overview to switch to Exec-Laptop. 8. Under Executive Office, select Exec-Laptop . 9. In the notification area, select the wireless network icon to view the available networks. There are no wireless networks shown as available for this laptop. Possible causes for this include: o The wireless network interface card is not turned on (the wireless switch on the exterior of the laptop is in the off position). Since no wireless networks are shown in the list, you must take additional steps. o The wireless network's SSID is not broadcasted. From step 1, you know that the wireless access point is broadcasting the SSID. o The wireless access point is not powered on. From step 1, you know that the wireless access point is powered on. 10. From the top navigation tabs, select Executive Office . 11. On the front of the Exec-Laptop, confirm that the switch for the wireless network interface card is in the On position. The switch is in the off position. 12. Slide the wireless switch to the On position to turn the wireless network interface card on. 13. On the laptop monitor, select Click to view Windows 10 . 14. In the notification area, select the wireless network icon to view the available networks. The CorpNet wireless network is now displayed in the list of available networks. 15. Select the CorpNet wireless network. 16. Select Connect .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
17. Enter @CorpNetWeRSecure!& for the security key and select Next . 18. Select Yes . Exec-Laptop is now connected to the CorpNet wireless network. 9.8.8 1 - You need to place a wireless access point in your two-story building. While trying to avoid interference, which of the following is the best location for the access point? ON THE TOP FLOOR 2 - You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have concluded that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP? SSID 3 - Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do? IMPLEMENT ANTENNA DIVERSITY 4 - You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength? Replace the omni-directional antenna with a directional antenna.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5 - While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks? USE A DIFFERENT CHANNEL ID 6 - You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings remain configured to the default with the exception of SSIDs. Which of the following might you suspect as the cause of the connectivity problems? OVERLAPPING CHANNELS 7 - Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? Place access points above where most clients are. 8 - A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem? The user is out of the effective range of the wireless access point on her floor. 9 - After installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? 802.11g AND 802.11b 10 - You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptop's wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem? A MISMATCHED SSID
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help