Chapter 9
docx
keyboard_arrow_up
School
Eastern Gateway Community College *
*We aren’t endorsed by this school
Course
133
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
25
Uploaded by DeaconGullMaster901
9.1.5
1 - Uses a narrow frequency band and hops data signals in a predictable sequence.
correct answer:
FHSS
Breaks data into pieces and sends the pieces across multiple frequencies in a defined range.
correct answer:
DSSS
Breaks data into very small data streams in order to send the information across long distances
correct answer:
OFDM
2 - An access point that conforms to the IEEE 802.11ac standard handles network traffic similarly to
which other networking device? HUB
3 - All of the 802.11 standards for wireless networking support which type of communication path
sharing technology? CSMA/CA
4 - Which IEEE standard describes wireless communication? 802.11
5 - You are designing a wireless network for a client. Your client would like to implement the
highest speed possible.
Which 802.11 standard will work best in this situation?
802.11ac
6
-A user on your network has moved to another office down the hall. After the move, she calls you to
complain that she has only occasional network access through her wireless connection. Which of the
following is most likely the cause of the problem?
The client system has moved too far away from the access point.
7 - Which of the following is true of a wireless network SSID?
Groups wireless devices together into the same logical network.
8 - Which wireless networking component is used to connect multiple APs together? DS
9 - Which of the following allows devices to find a specific access point within an extended service set
that has multiple access points? BSSID
10 - Which of the following is the backbone or local area network that connects multiple access points
(and basic service sets) together? DS
9.2.6
1 - Which IEEE wireless standards specify transmission speeds up to 54 Mbps? 802.11g AND 802.11a
2 - You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy
must support a frequency range of 5 GHz and provide the highest possible transmission speeds. –
802.11ac
3 - Which of the following are frequencies defined by 802.11 committees for wireless networking? – 2.4
GHz and 5.75 GHz
4 - Your organization uses an 802.11b wireless network. Recently, other tenants installed the
following equipment in your building:
A wireless television distribution system running at 2.4 GHz.
A wireless phone system running at 5.8 GHz.
A wireless phone system running at 900 MHz.
An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range.
An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range.
Since this equipment was installed, your wireless network has been experiencing significant
interference. Which system is to blame?
The wireless TV system
5 - How many total channels are available for 802.11a wireless networks? – 23
6 - Which technologies are used by the 802.11ac standard to increase network bandwidth? 160 MHz
bonded channels AND Eight MIMO radio streams
7 - You are troubleshooting a wireless connectivity issue in a small office. You determine that the
2.4GHz cordless phones used in the office are interfering with the wireless network
transmissions.
If the cordless phones are causing the interference, which of the following wireless standards
could the network be using? (Select two.)
802.11b AND Bluetooth
8 - Infrared operates in which of the following modes? LINE OF SIGHT AND DIFFUSE
9 - What is Channel bonding? - Combines two non-overlapping channels into a single channel, resulting
in slightly more than double the bandwidth.
10 - Which of the following modes are used for Near Field Communications? CARD EMULATION AND
PEER-TO-PEER AND Reader/Writer
9.3.4
In this lab, your task is to create a wireless network as follows:
Select a wireless access point that meets the following criteria:
o
Transmission speeds up to 600 Mbps.
o
Backwards compatible with other wireless standards that use 2.4GHz.
Install the wireless access point as follows:
o
Place the wireless access point on the computer desk.
o
Select the correct cable to connect the wireless access point to a free LAN port on
the existing router.
o
Connect power to the wireless access point through an outlet on the surge
protector or wall plate.
Configure the owner's new laptop to connect to the wireless network as follows:
o
Slide the wireless switch on the front of the laptop to the
On
position. This will
enable the integrated wireless network interface card on the laptop.
o
Use the default settings as you connect the laptop to the wireless network and
save the wireless profile with these settings.
Complete this lab as follows:
1.
Select and install a wireless access point on the Workspace.
a.
On the Shelf, expand
Wireless Access Points
.
b.
Read the device descriptions to identify the correct wireless access point.
c.
Drag the
Wireless Access Point, 802.11b/g/n
to the Workspace.
d.
Above the wireless access point, select
Back
to switch to the back view of the
wireless access point.
2.
Provide power to the wireless access point.
a.
On the Shelf, expand
Cables
.
b.
Select the
Power Adapter
.
c.
In the Selected Component window, drag the
DC Power Connector
to the port
on the wireless access point.
d.
In the Selected Component window, drag the
AC Power Adapter
end to an outlet
on the surge protector.
3.
Connect the wireless access point to the router.
a.
On the Shelf, select the
Cat6a cable
.
b.
In the Selected Component window, drag a
connector
to the Ethernet port on the
back of the wireless access point.
c.
Above the router, select
Back
to switch to the back of the router.
d.
In the Selected Component window, drag the other
connector
to one of the free
LAN ports on the router.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.
On the front of the laptop, click the
wireless switch
to enable the integrated wireless
network interface on the laptop. This will slide the switch to the ON position.
5.
Connect the laptop to the TrendNet-BGN wireless network and create a wireless network
profile.
a.
On the laptop's monitor, select
Click to view Windows 10
.
b.
In the notification area, select the
Network
icon.
c.
Select
TrendNet-BGN
.
d.
Make sure
Connect automatically
is selected.
e.
Select
Connect
.
f.
Select
Yes
to make the computer discoverable on the network.
9.3.5
In this lab, your task is to:
Change the settings on the wireless access point as follows:
o
Use
PoliceVan
for the SSID. The SSID name is case sensitive.
o
Use
WPA2-PSK
authentication with
AES
for encryption.
o
Configure
4WatchingU
as the pass phrase. The pass phrase is case sensitive.
Change the wireless access point's administrator authentication credentials from their
defaults as follows:
o
Username:
@dm1n
o
Password:
StayOut!
(O is the capital letter O)
Do not save the credentials in Chrome.
Configure the laptop to connect to the wireless network and save the wireless profile with
the settings as listed above.
Complete this lab as follows:
1.
Change the settings on the wireless access point.
a.
From the taskbar, open
Chrome
.
b.
In the URL field, type
192.168.0.254
and press
Enter
.
c.
In the Username field, enter
admin
.
d.
In the Password field, enter
password
.
e.
Make sure
Remember my credentials
is not selected.
f.
Select
OK
.
g.
Maximize the window for easier viewing.
h.
In the left menu, select
Wireless
.
i.
Select
Basic
.
j.
In the Wireless Name (SSID) field, enter
PoliceVan
.
k.
Select
Apply
.
l.
Make sure
admin
is entered in the Username field.
m.
Make sure
password
is entered in the Password field.
n.
Select
OK
.
o.
In the left menu under Wireless, select
Security
.
p.
From the Security Mode drop-down list, select
WPA2-PSK
.
q.
In the Pass Phrase field, enter
4WatchingU
as the pass phrase.
r.
Select
Apply
.
2.
Change the wireless access point's administrator authentication credentials from their
defaults.
a.
On the left, select
Administrator
.
b.
Select
Management
.
c.
In the Account field, enter
@dm1n
as the new username.
d.
In the Password field, enter
StayOut!
(O is the capital letter O).
e.
Select
Apply
.
f.
Close Chrome.
3.
Configure the Home-Laptop to connect to the wireless network and save the wireless
profile.
a.
From the top navigation tabs, select
Computer Desk
.
b.
On the monitor of Home-Laptop, select
Click to view Windows 10
.
c.
In the notification area, select the
Network
icon.
d.
Select
PoliceVan
.
e.
Make sure
Connect automatically
is selected.
f.
Select
Connect
.
g.
In the Security Key field, enter
4WatchingU
.
h.
Select
Next
.
i.
Select
Yes
to make your PC discoverable on the network.
j.
In the notification area, select the
Network
icon in the notification area or open
the Network & Internet settings to confirm the connection.
9.3.6
1 - You have a small wireless network that uses multiple access points. The network uses WPA
and broadcasts the SSID. WPA2 is not supported by the wireless access points.
You want to connect a laptop computer to the wireless network. Which of the following
parameters will you need to configure on the laptop?
TKIP ENCRYPTION AND PRESHARED KEY
2 - You are an administrator of a growing network. The network you have created is broadcasting, but
you cannot ping systems on different segments of your network. Which device should you use to fix this
issue? NETWORK BRIDGE
3 - You are configuring a wireless network with two wireless access points. Both access points
connect to the same wired network. You want wireless users to be able to connect to either access
point and have the ability to roam between the two access points.
How should you configure the access points?
SAME SSID, SAME CHANNEL
4 - You have configured a wireless access point to create a small network. You have configured
all necessary parameters.
Wireless clients seem to take a long time to find the wireless access point. You want to reduce
the time it takes for the clients to connect.
What should you do?
Decrease the beacon interval.
5 - You have configured a wireless access point to create a small network. For security, you have
disabled SSID broadcast.
From a client computer, you try to browse to find the access point. You see some other wireless
networks in the area, but you cannot see your network.
What should you do?
CONFIGURE A PROFILE ON THE WIRELESS CLIENT
6 - You are designing an update to your client's wireless network. The existing wireless network
uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the
network to run up to 600 Mbps.
Due to budget constraints, your client wants to upgrade only the wireless access points in the
network this year. Next year, she will upgrade the wireless network boards in her users'
workstations. She has also indicated that the system must continue to function during the
transition period.
Which 802.11 standard will work best in this situation?
802.11N
7 - You are an IT technician for your company. Your boss has asked you to set up and configure a
wireless network to service all of the conference rooms.
Which of the following features lets you allow or reject client connections by hardware address?
MAC ADDRESS FILTERING
8 - Which of the following wireless network protection methods prevents the broadcasting of the
wireless network name?
SSID BROADCAST
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9 - Which of the following is considered the strongest encryption method? AES
10 - Which of the following are features of Hotspot 2.0? Uses WPA2 Enterprise for authentication and
encryption. AND Is enabled by default on Windows 10
9.4.7
In this lab, your task is to install the proper types of WAPs to provide adequate wireless coverage
while also reducing signal emanation as much as possible. As you install each WAP, consider the
following:
Use the best antenna type for the specific placement location. There are two WAP antenna
types available, directional and omnidirectional.
Reduce signal emanation which is as important as adequate wireless coverage.
Do not install more equipment than necessary. Only three WAPs are required to complete
this lab.
Complete this lab as follows:
1.
On the Shelf, expand
Wireless Access Points
.
2.
Drag the
Wireless Access Point (Omnidirectional Antenna)
to the wall behind the
reception desk in the Lobby.
3.
Drag one
Wireless Access Point (Directional Antenna)
to the installation area on the
left wall of the IT Administration office.
4.
Drag another
Wireless Access Point (Directional Antenna)
to the installation area on
the right wall of the Networking Closet.
9.4.8
In this lab, your task is to complete the following:
Install the proper antenna on the roof of both buildings to provide a high-speed wireless
connection between them.
Install the appropriate WAP on the roof of each building.
Attach the antenna that will provide adequate coverage to only the problem area.
Complete this lab as follows:
1.
Install an antenna on each building's roof to provide a high-speed wireless connection.
a.
On the Shelf, expand
High-gain Antennas
.
b.
Drag the
High-gain Antenna (Directional)
to the installation area on Building
A's roof.
You use a high-gain directional antenna for the connection between the buildings
to provide a very strong, concentrated signal in only one direction. Using a high-
gain omnidirectional antenna will broadcast the signal in all directions for a very
long distance, introducing a security vulnerability.
c.
Drag the remaining
High-gain Antenna (Directional)
to the installation area on
Building B's roof.
2.
Install a WAP on each building's roof.
a.
On the Shelf, expand
Wireless Access Points
.
b.
Drag the
Wireless Access Point (Outdoor)
to the installation area on Building
A's roof.
Because you need to provide coverage to only the patio areas, the best antenna
choice is a directional antenna. Outdoor WAPs are designed to withstand outdoor
conditions, such as heat, cold, and rain.
c.
Drag the remaining
Wireless Access Point (Outdoor)
to the installation area on
Building B's roof.
3.
Attach both antennae to provide adequate coverage.
a.
On the Shelf, expand
WAP Antennas
.
b.
Drag the
WAP Antenna (Directional)
to one of the installed outdoor WAPs.
c.
Drag the remaining
WAP Antenna (Directional)
to the other installed outdoor
WAP.
9.4.9
1 - You are setting up a wireless hotspot in a local coffee shop. For best results, you want to
disperse the radio signals evenly throughout the coffee shop.
Which of the following antenna types would you use on the AP to provide a 360-degree
dispersed wave pattern?
OMNI DIRECTIONAL
2 - Your wireless network consists of multiple 802.11n access points that are configured as
follows:
SSID (hidden): CorpNet
Security: WPA2-PSK using AES
Frequency: 5.7 GHz
Bandwidth per channel: 20 MHz
This network is required to support an ever-increasing number of devices. To ensure there is
sufficient capacity, you want to maximize the available network bandwidth.
What should you do?
Double the bandwidth assigned per channel to 40 MHz.
3 - To optimize your network, you want to configure your wireless AP to use a channel that
meets the following criteria:
Non-overlapping
Low utilization
Low interference
You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in
the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the
highest point of each wave. For example, the four waves whose crests are over channel 11
belong to channel 11.)
Based on the results, which channel should you configure your wireless AP to use?
CHANNEL 1
4 - What purposes does a wireless site
survey fulfill? Identify the coverage area and preferred placement
of access points. AND Identify existing or potential sources of interference.
5 - You need to implement a wireless network link between two buildings on a college campus. A
wired network has already been implemented within each building. The buildings are 100 meters
apart.
Which type of wireless antennae should you use on each side of the link?
DIRECTIONAL AND HIGH-GAIN
6 - Which protocol is well known for its use in the the home security and home automation industry,
uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate? Z-WAVE
7 - What is the least
secure place to locate an access point with an omni-directional antenna when
creating a wireless cell? NEAR A WINDOW
8 - Which of the following best describes a site survey? A process of planning and designing a wireless
network.
9 - Which of the following best describe a spectrum analyzer? A tool used to determine the noise floor in
the desired frequency range.
10 - Which of the following should you include in your site survey test equipment? A TALL LADDER and A
SPECTRUM ANALYZER
9.5.4
In this lab, your task is to:
Create a WLAN using the following settings:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
o
Name:
CorpNet Wireless
o
ESSID:
CorpNet
o
Type:
Standard Usage
o
Authentication:
Open
o
Encryption:
WPA2
o
Encryption algorithm:
AES
o
Passphrase:
@CorpNetWeRSecure!
Connect the Exec-Laptop in the Executive office to the new wireless network.
Complete this lab as follows:
1.
From the taskbar, open
Chrome
.
2.
In the URL field, enter
192.168.0.6
and press
Enter
.
3.
Maximize the window for easier viewing.
4.
Log in to the wireless controller console.
a.
In the Admin field, enter
PowerUser
.
b.
In the Password field, enter
S3cur3!
as the password.
c.
Select
Login
.
5.
Select the
Configure
tab.
6.
From the left menu, select
WLANs
.
7.
Under WLANs, select
Create New
.
8.
In the Name field, enter the
network name
.
9.
In the ESSID field, enter the
ESSID
for the network.
10. Under Type, make sure
Standard Usage
is selected.
11. Under Authentication Options, make sure
Open
is selected.
12. Under Encryption Options, select
WPA2
.
13. Under Algorithm, make sure
AES
is selected.
14. In the Passphrase field, enter the
passphrase
for the network.
15. Select
OK
.
16. Using the navigation tabs at the top of the screen, select
Floor 1
.
17. Under Executive Office, select
Exec-Laptop
.
18. In the notification area, select the
wireless network
icon to view the available networks.
19. Select
CorpNet
.
20. Select
Connect
.
21. Enter
@CorpNetWeRSecure!
for the security key.
22. Select
Next
.
23. Select
Yes
to make the computer discoverable on the network.
9.5.5
1 - Match each wireless networking term or concept on the left with the appropriate description
on the right. Each term may be used once, more than once, or not at all.
Moving a wireless device between access points within the same wireless network.
correct answer:
Roaming
Used by Cisco wireless equipment to route frames back and forth between the wireless network
and the wired LAN.
correct answer:
LWAPP
Specifies the number of clients that utilize the wireless network.
correct answer:
Device density
Automatically partitions a single broadcast domain into multiple VLANs.
correct answer:
VLAN pooling
Connects two wired networks over a Wi-Fi network.
correct answer:
Wireless bridge
The number of useful bits delivered from sender to receiver within a specified amount of time.
correct answer:
Goodput
2 - Which of the following enterprise wireless deployment models uses access points with enough
intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private
traffic? Distributed wireless mesh infrastructure
3 - Which enterprise deployment has limited mobility and is difficult to manage? INDPENDENT ACCESS
POINTS
4 - What is a lightweight access point used for? To route frames between the wireless and wired
networks.
5 - As the user moves out of the range of one access point, their wireless device must re-associate with a
new access point as it comes within range. What is this process known as? ROAMING
6 - You need to add security for your wireless network. You would like to use the most secure
method.
Which method should you implement?
WPA2
7 - Independent access point infrastructure
correct answer:
Intelligent AP
Hub-and-spoke infrastructure
correct answer:
Lightweight AP
Distributed wireless mesh infrastructure
correct answer:
Intelligent AP
8 - To enable roaming, network administrators have to configure all access points in the network to
comply with which of the following criteria? To function on the same IP subnet. AND To have the same
SSID. AND To use the same channel.
9 - Which of the following best describes a hub-and-spoke infrastructure deployment model? A wireless
controller is connected to all access points through wired links. The individual APs contain very little
embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10 - For home or small business implementations, you typically use a consumer-grade access point that
combines many functions into a single device. What is the maximum number of clients that can be
supported at a time? 5-10 WIRELESS CLIENTS
9.6.7
In this lab. your task is to connect the components to make the internet connection.
Add the cable modem to the Workspace.
o
Connect the modem to the WAN connection.
o
Plug in the modem.
Add the wireless router to the Workspace.
o
Connect the internet port on the router to the cable modem.
o
Connect the computer to a Ethernet port on the wireless router.
o
Plug in the wireless router.
Complete this lab as follows:
1.
Connect the modem to the WAN connection.
a.
On the Shelf, expand
Routers
.
b.
Drag the
Cable Modem/Router
from the Shelf to the Workspace.
c.
Above the cable modem, select
Back
to switch to the back view of the cable
modem.
d.
On the Shelf, expand
Cables
.
e.
Select the
coaxial cable
.
f.
Under Selected Component, drag a
Coaxial Type F Connector
to the port on the
cable modem.
g.
Under Selected Component, drag the other
Coaxial Type F Connector
to the port
on the wall plate.
2.
Connect the wireless router to the cable modem.
a.
On the Shelf, expand
Routers
.
b.
Drag the
wireless router
from the Shelf to the Workspace.
c.
Above the wireless router, select
Back
to switch to the back view of the wireless
router.
d.
On the Shelf, expand
Cables
.
e.
Select the
Cat6a cable
.
f.
Under Selected Component, drag a
RJ45 Connector
to the Internet port on the
wireless router.
g.
Under Selected Component, drag the other
RJ45 Connector
to the port on the
cable modem.
3.
Connect the computer to the wireless router.
a.
Above the computer, select
Back
to switch to the back view of the computer.
b.
On the Shelf, select the
Cat6a cable
.
c.
Under Selected Component, drag a
RJ45 Connector
to the network port on the
computer.
d.
Under Selected Component, drag the other
RJ45 Connector
to an Ethernet port
on the wireless router.
4.
Plug in the cable modem.
a.
On the Shelf, select the
Power Adapter
.
b.
Under Selected Component, drag the
DC Power Connector
to the port on the
cable modem.
c.
Under Selected Component, drag the
AC Power Adapter
to the power outlet.
5.
Plug in the wireless router.
a.
On the Shelf, select the
Power Adapter
.
b.
Under Selected Component, drag the
DC Power Connector
to the port on the
wireless router.
c.
Under Selected Component, drag the
AC Power Adapter
to the power outlet.
9.6.8
1 - A technician is installing a new SOHO wireless router.
Which of the following is the first thing the technician should do to secure the router?
Change the router's default password.
2 - A technician is installing a SOHO router at an after-school community center. The customer
would like to keep children from accessing inappropriate content while browsing the web.
Which of the following actions would help accomplish this goal?
ENABLE CONTENT FILTERING
3 - A technician receives notification from a SOHO router manufacturer of a specific
vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician
verifies the settings outlined in the notification.
Which of the following actions should the technician take next?
CHECK FOR AND APPLY FIRMWARE UPDATES
4 - A SOHO customer finds that their VoIP conversations frequently break up and become
unintelligible. This happens most often when one person in the office streams video from the
internet.
Which of the following configuration changes on the SOHO router is most likely to improve
VoIP performance?
Change QoS settings to give VoIP traffic more priority.
5 - A technician is replacing a SOHO router and has configured DHCP to assign private IP
addresses to hosts on the local network. These hosts can communicate with each other, but users
can't browse the internet.
Which of the following changes to the SOHO router is most likely to restore internet
connectivity?
Configure the SOHO router for NAT.
6 - Which of the following locations will contribute the greatest amount of interference for a wireless
access point? NEAR BACKUP GENERATORS AND NEAR CORDLESS PHONES
7 - A technician is installing a new SOHO wireless router in a home office. The customer wants
to secure the wireless network so only a smartphone, tablet, and laptop can connect.
Which of the following router settings should the technician change?
ENABLE MAC FILTERING
8 - Which of the following is used on a wireless network to identify the network name? SSID
9 - Which of the following is true when the DHCP setting is disabled in a wireless network? Wireless
clients must use a static IP address within the correct IP address range to connect to the network.
10 - Manages all of the APs that are connected to it.
Wireless controller
correct answer:
Supports 30 to 50 wireless clients per access point.
Wireless controller
correct answer:
Provides NAT routing and an Ethernet switch in one device.
Consumer-grade (SOHO) wireless router
correct answer:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Supports a maxiumum of 5-10 wireless clients.
Consumer-grade (SOHO) wireless router
correct answer:
Pushes wireless configuration settings to connected access points.
Wireless controller
correct answer:
9.7.6
In this lab, your task is to:
Change the admin username and password for the Zone Director controller to the
following:
o
Admin Name:
WxAdmin
o
Password:
ZDAdminsOnly!$
(O is the capital letter O)
Set up MAC address filtering (L2 Access Control) to create a whitelist called
Allowed
Devices
that includes the following wireless devices:
o
00:18:DE:01:34:67
o
00:18:DE:22:55:99
o
00:02:2D:23:56:89
o
00:02:2D:44:66:88
Implement a device access policy called
NoGames
that blocks gaming consoles from the
wireless network.
Complete this lab as follows:
1.
Change the admin username and password as follows:
a.
From the taskbar, open
Chrome
.
b.
Type
192.168.0.6
and press
Enter
.
c.
Maximize the window for easier viewing.
d.
In the Admin Name field, enter
admin
.
e.
In the Password field, enter
password
.
f.
Select
Login
.
g.
From the top, select the
Administer
tab.
h.
Make sure
Authenticate using the admin name and password
is selected.
i.
In the Admin Name field, enter the new
username
.
j.
In the Current Password field, enter the current
password
.
k.
In the New Password field, enter the new
password
.
l.
In the Confirm New Password field, enter the new
password
.
m.
On the right, select
Apply
.
2.
Enable MAC address filtering as follows:
a.
From the top, select the
Configure
tab.
b.
From the left menu, select
Access Control
.
c.
Expand
L2-L7 Access Control
.
d.
Under L2/MAC address Access Control, select
Create New
.
e.
In the Name field, enter
Allowed Devices
.
f.
Under Restriction, make sure
Only allow all stations listed below
is selected.
g.
Enter a
MAC address
.
h.
Select
Create New
.
i.
Repeat step 2g–2h for each MAC address you would like to add to the ACL.
j.
Select
OK
.
3.
Configure access controls as follows:
a.
Under Access Control, expand
Device Access Policy
.
b.
Select
Create New
.
c.
In the Name field, enter
NoGames
.
d.
Select
Create New
.
e.
In the Description field, enter
Games
.
f.
In the OS/Type drop-down list, select
Gaming
.
g.
In the Type field, select
Deny
.
h.
Under Uplink, make sure
Disabled
is selected.
i.
Under Downlink, make sure
Disabled
is selected.
j.
Select
Save
.
k.
Select
OK
.
9.7.7
1 - Which of the following wireless security methods uses a common shared key configured on the
wireless access point and all wireless clients? WEP, WPA Personal, and WPA2 Personal
2 - You want to implement 802.1x authentication on your wireless network. Which of the following will
be required? RADIUS
3 - You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following
components will be part of your design? 802.1x AND AES encryption
4 - Which of the following specifications identifies security that can be added to wireless networks?
802.11i AND 802.1x
5 - You want to connect your client computer to a wireless access point that is connected to your
wired network at work. The network administrator tells you that the access point is configured to
use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off.
Which of the following must you configure manually on the client?
Preshared Key AND SSID AND AES
6 - You are the wireless network administrator for your organization. As the size of the
organization has grown, you've decided to upgrade your wireless network to use 802.1x
authentication instead of using preshared keys.
To do this, you need to configure a RADIUS server and RADIUS clients. You want the server
and the clients to mutually authenticate with each other.
What should you do?
Configure the RADIUS server with a server certificate. AND Configure all wireless access points with
client certificates.
7 - You are concerned that wireless access points may have been deployed within your
organization without authorization.
What should you do?
Check the MAC addresses of devices connected to your wired switch. AND Conduct a site survey.
8 - An attacker is trying to compromise a wireless network that has been secured using WPA2-
PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break
the encryption.
As an alternative, she used software to configure her laptop to function as an access point. She
configured the fake access point with the same SSID as the wireless network she is trying to
break into. When wireless clients connect to her access point, she presents them with a web
page that asks them to enter the WPA2 passphrase. When they do, she uses the password to
connect a wireless client to the real access point.
Which attack techniques did the attacker use in this scenario?
Pharming AND Evil Twin
9 - Your company security policy states that wireless networks are not to be used because of the
potential security risk they present to your network.
One day, you find that an employee has connected a wireless access point to the network in his
office.
What type of security risk is this?
Rogue access point
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10 - Which of the following measures makes your wireless network invisible to the casual attacker
performing war driving? Disable SSID broadcast
9.8.5
In this lab, your task is to:
Configure self healing on the wireless network.
o
Automatically adjust AP radio power to optimize coverage when interference is
present.
o
Set 2.4GHz and 5GHz radio channels to use the
Background Scanning
method
to adjust for interference.
Configure the background scanning needed for rogue device detection, AP locationing,
and self healing. Background scans should be performed on all radios every
30 seconds
.
Configure load balancing for all radios by adjusting the threshold to
40dB
.
Configure band balancing to allow no more than
30%
of clients to use the 2.4GHz
radios.
Reduce the power levels to
-3dB
for three access points in Building A to reduce RF
emanations.
Complete this lab as follows:
1.
Configure self healing.
a.
From the top, select the
Configure
tab.
b.
From the left menu, select
Services
.
c.
Select
Automatically adjust AP radio power to optimize coverage when
interference is present
.
d.
Under Automatically adjust 2.4GHz channels using, select
Background
Scanning
from the drop-down menu.
e.
Under Automatically adjust 5GHz channels using, select
Background Scanning
from the drop-down menu.
f.
On the right, select
Apply
.
2.
Configure background scanning.
a.
Select
Run a background scan on 2.4GHz radio
.
b.
Enter
30
seconds.
c.
Select
Run a background scan on 5GHz radio
.
d.
Enter
30
seconds.
e.
On the right, select
Apply
.
3.
Configure load balancing.
a.
Select
Run load balancing on 2.4GHz radio
.
b.
In the Adjacent radio threshold(dB) field, enter
40
.
c.
Select
Run load balancing on 5GHz radio
.
d.
In the Adjacent radio threshold(dB) field, enter
40
.
e.
On the right, select
Apply
.
4.
Configure band balancing.
a.
Select
Percent of clients on 2.4GHz radio
.
b.
Enter the
percentage
.
c.
On the right, select
Apply
.
5.
Adjust the AP power level.
a.
From the left menu, select
Access Points
.
b.
From the top right, select
Exhibit
to determine which access points to adjust.
c.
Select
Edit
next to the access point to be modified.
d.
Under Radio B/G/N(2.4G) next to TX Power, make sure
Override Group Config
is selected.
e.
From the TX Power drop-down list, select
-3dB (1/2)
.
f.
Under Radio A/N/AC(5G) next to TX Power, make sure
Override Group Config
is selected.
g.
From the TX Power drop-down list, select
-3dB (1/2)
.
h.
Select
OK
.
i.
Repeat steps 6b - 6f for additional access points.
9.8.6
Required Actions & Questions
On Gst-Lap, reconnect to the CorpNet wireless network
On Exec-Laptop, forget the HomeWireless network
On Exec-Lap, slide the wireless switch to ON and connect to the CorpNet wireless
networkShow Details
Q1What is the name of the corporate WLAN?
Your answer: CorpNet.local
Correct answer: CorpNet.local
Q2What is the passphrase used for the WLAN security key?
Your answer: @CorpNetWeRSecure!&
Correct answer: @CorpNetWeRSecure!&
Q3Which wireless networks are available to Gst-Lap?
Your answer: CorpNet, Starsky, NetGearWireless
Correct answer: CorpNet, Starsky, NetGearWireless
Q4Which wireless network is Gst-Lap connected to?
Your answer: None
Correct answer: None
Q5Which known networks are displayed?
Your answer: CorpNet
Correct answer: CorpNet
Q6Why did Gst-Lap connect without you entering the security key?
Your answer: Because the laptop connected to the network once before using the security key.
Correct answer: Because the laptop connected to the network once before using the security key.
Q7Which wireless networks are available to Exec-Laptop?
Your answer: None
Correct answer: None
Q8What is the position of the switch for the wireless network interface card?
Your answer: Off
Correct answer: Off
Q9Which wireless networks are available to Exec-Laptop now?
Your answer: CorpNet, Starsky, NetGearWireless
Correct answer: CorpNet, Starsky, NetGearWireless
Q10Which wireless network is Exec-Laptop connected to?
Your answer: None
Correct answer: None
Q11Which know networks are displayed?
Your answer: HomeWireless
Correct answer: HomeWireless
Explanation
In this lab, your task is to explore, diagnose, and fix the wireless network configuration
problems. Use the following troubleshooting tools:
The Network and Sharing Center in the Windows 10 operating system on a laptop.
The wireless controller interface accessed through Chrome at
192.168.0.6
with the
username
WxAdmin
and password
ZDAdminsOnly!$
(O is the letter o).
Complete this lab as follows:
1.
On ITAdmin, view the wireless controller's configuration interface using Chrome.
a.
Under IT Administration, select
ITAdmin
.
b.
From the taskbar, select
Chrome
.
c.
In the URL field, enter
192.168.0.6
and press
Enter
.
d.
Maximize the window for easier viewing.
e.
In the Admin Name field, enter
WxAdmin
.
f.
In the Password field, enter
ZDAdminsOnly!$
(O is the letter o).
g.
Select
Login
.
h.
Select the
Configure
tab.
i.
From the left menu, select
WLANs
.
j.
Answer question 1.
k.
Under WLANs, select
Edit
in the table under Actions.
l.
Answer question 2.
2.
Identify the wireless connections on Gst-Lap.
a.
From the navigation tabs at the top, select
Floor 1 Overview
to switch to Gst-
Lap.
b.
Under Lobby, select
Gst-Lap
.
c.
In the notification area, select the
wireless network
icon.
d.
Answer questions 3-4.
e.
Select
Start
.
f.
Select
Settings
.
g.
Select
Network & Internet
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
h.
Select
Wi-Fi
.
i.
Under Wi-Fi, select
Manage known networks
.
j.
Answer question 5.
k.
In the notification area, select the
wireless network
icon.
l.
Select the
CorpNet
wireless network name.
m. Select
Connect
.
n.
Answer question 6.
3.
Identify the wireless connections on Exec-Laptop.
a.
From the navigation tabs at the top, select
Floor 1 Overview
to switch to Exec-
Laptop.
b.
Under Executive Office, select
Exec-Laptop
.
c.
In the notification area, select the
wireless network
icon.
d.
Answer question 7.
e.
From the navigation tabs at the top, select
Floor 1 Overview
.
f.
Under Executive Office, select
Hardware
.
g.
Answer question 8.
h.
Slide the
wireless switch
to turn the wireless network interface card on.
i.
On the laptop monitor, select
Click to view Windows 10
.
j.
On Exec-Laptop, select the
wireless network
icon in the notification area to view
the available networks.
k.
Answer questions 9-10.
4.
Manually connect to the CorpNet wireless network.
a.
Select
Start
.
b.
Select
Settings
.
c.
Select
Network & Internet
.
d.
Select
Wi-Fi
.
e.
Under Wi-Fi, select
Manage known networks
.
f.
Answer question 11.
g.
Select
HomeWireless
.
h.
Select
Forget
.
i.
Select the
wireless network
icon in the notification area to view the available
networks.
j.
Select the
CorpNet
wireless network name.
k.
Select
Connect
.
l.
Enter the
security key
for the wireless network (the security key learned in Step 1l
above).
m. Select
Next
.
n.
Select
Yes
to make the PC discoverable.
Exec-Laptop successfully connected to the CorpNet network.
9.8.7
In this lab, your task is to:
Use the following troubleshooting tools to diagnose the problem in the wireless network:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
o
Use the Gst-Lap in the Lobby to verify that the wireless access point is working.
o
Use the wireless controller management interface:
Browser:
Chrome
IP address:
192.168.0.6
Username:
WxAdmin
Password:
ZDAdminsOnly!$
o
Use the Network and Sharing Center in the Windows operating system.
Use the troubleshooting tools to confirm the resolution of the problem.
Fix the problem on Exec-Laptop, the wireless controller interface, or both as necessary.
Connect to the CorpNet wireless network.
Complete this lab as follows:
1.
Under Lobby, select
Gst-Lap
.
2.
In the notification area, select the
wireless network
icon to view the available networks
to verify the problem found on the laptop in the Executive Office. The CorpNet wireless
network is displayed in the list of available networks.
3.
Select the
CorpNet
wireless network.
4.
Select
Connect
.
5.
Enter
@CorpNetWeRSecure!&
for the security key and select
Next
.
6.
Select
Yes
.
Gst-Lap is now connected to the CorpNet wireless network. Because Gst-Lap can
connect to the wireless network, the problem may be limited to only the Exec-Laptop
laptop in the Executive Office.
7.
From the top navigation tabs, select
Floor 1 Overview
to switch to Exec-Laptop.
8.
Under Executive Office, select
Exec-Laptop
.
9.
In the notification area, select the
wireless network
icon to view the available networks.
There are no wireless networks shown as available for this laptop. Possible causes for this
include:
o
The wireless network interface card is not turned on (the wireless switch on the
exterior of the laptop is in the off position). Since no wireless networks are shown
in the list, you must take additional steps.
o
The wireless network's SSID is not broadcasted. From step 1, you know that the
wireless access point is broadcasting the SSID.
o
The wireless access point is not powered on. From step 1, you know that the
wireless access point is powered on.
10. From the top navigation tabs, select
Executive Office
.
11. On the front of the Exec-Laptop, confirm that the
switch
for the wireless network
interface card is in the On position. The switch is in the off position.
12. Slide the wireless switch to the
On
position to turn the wireless network interface card
on.
13. On the laptop monitor, select
Click to view Windows 10
.
14. In the notification area, select the
wireless network icon
to view the available networks.
The CorpNet wireless network is now displayed in the list of available networks.
15. Select the
CorpNet
wireless network.
16. Select
Connect
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
17. Enter
@CorpNetWeRSecure!&
for the security key and select
Next
.
18. Select
Yes
.
Exec-Laptop is now connected to the CorpNet wireless network.
9.8.8
1 - You need to place a wireless access point in your two-story building. While trying to avoid
interference, which of the following is the best location for the access point? ON THE TOP FLOOR
2 - You have physically added a wireless access point to your network and installed a wireless
networking card in two laptops running Windows. Neither laptop can find the network, and you
have concluded that you must manually configure the wireless access point (AP).
Which of the following values uniquely identifies the network AP?
SSID
3 - Your wireless network consists of multiple 802.11n access points that are configured as
follows:
SSID (hidden): CorpNet
Security: WPA2-PSK using AES
Frequency: 5.75 GHz
Bandwidth per channel: 40 MHz
Because of the unique construction of your organization's facility, there are many locations that
do not have a clear line of sight between network clients and access points. As a result, radio
signals are reflected along multiple paths before finally being received. The result is distorted
signals that interfere with each other.
What should you do?
IMPLEMENT ANTENNA DIVERSITY
4 - You are implementing a wireless network inside a local office. You require a wireless link to
connect a laptop in the administrator's office directly to a system in the sales department. In the
default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation,
the signal between the two systems is weak, as many obstacles interfere with the signal.
Which of the following strategies could you try to increase signal strength?
Replace the omni-directional antenna with a directional antenna.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5 - While configuring a new 802.11g wireless network, you discover another wireless network within
range that uses the same channel ID that you intend to use. Which of the following strategies are you
most likely to adopt in order to avoid a conflict between the networks? USE A DIFFERENT CHANNEL ID
6 - You have been hired to troubleshoot a wireless connectivity issue for two separate networks
located within a close proximity. Both networks use a WAP from the same manufacturer, and all
settings remain configured to the default with the exception of SSIDs.
Which of the following might you suspect as the cause of the connectivity problems?
OVERLAPPING CHANNELS
7 - Which of the following recommendations should you follow when placing access points to provide
wireless access for users within your company building? Place access points above where most clients
are.
8 - A user calls to report that she is experiencing intermittent problems while accessing the
wireless network from her laptop computer. While talking to her, you discover that she is trying
to work from the coffee room two floors above the floor where she normally works.
What is the most likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point on her floor.
9 - After installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network
performance is adversely affected. Which of the following wireless networking standards are you most
likely using? 802.11g AND 802.11b
10 - You have decided to conduct a business meeting at a local coffee shop. The coffee shop you
chose has a wireless hotspot for customers who want internet access.
You decide to check your email before the meeting begins. When you open the browser, you
cannot gain internet access. Other customers are using the internet without problems. You are
sure your laptop's wireless adapter works because you use a wireless connection at work.
What is the likely cause of the problem?
A MISMATCHED SSID
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Recommended textbooks for you

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Recommended textbooks for you
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks ColeSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L