You are on page 1of 23

5: Quiz: Remote Connection Technologies Review of attempt 1

Started on Monday, 16 January 2012, 12:23 PM Completed on Monday, 16 January 2012, 12:53 PM Time taken 30 mins 12 secs Grade 163.33 out of a maximum of 240 (68%) Feedback Make sure you have completed all of your course materials before moving on Question 1 Marks: 10 Which of the following WAN technologies would a technician find dense wavelength division multiplexing (DWDM)? Choose one answer. a. E1 b. T1 c. ADSL d. SONET Correct Marks for this submission: 10/10. Question 2 Marks: 10 How many DS0s are used in a T1? Choose one answer. a. 24 b. 30 c. 23 d. 31 Correct Marks for this submission: 10/10. Question 3 Marks: 10 A network administrator has been receiving work orders about poor voice quality crossing a branch T1.The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality? Choose one answer. a. Install a content caching proxy at the branch to reduce inbound WAN traffic b. Configure traffic shaping to reduce the bandwidth available to the file sharing application c. Upgrade switches to provide higher bandwidth ports for workstations and IP phones d. Configure a separate VLAN for the IP phones Correct Marks for this submission: 10/10. Question 4 Marks: 10

How much bandwidth does an OC-12 provide? Choose one answer. a. 1.2 Gbps b. 12 Mbps c. 45 Mbps d. 622 Mbps Correct Marks for this submission: 10/10. Question 5 Marks: 10 Which three media and connectors do 10BASE2 networks use? (Choose THREE). Choose at least one answer. a. RG-58 cable b. RJ-11 connectors c. BNC terminators d. STP cable e. T-connectors f. UTP cable Thinnet or Thin Ethernet, also referred to as 10BASE2, is a thin coaxial cable. The 10BASE2 standard uses 50-ohm coaxial cable (RG-58) with maximum lengths of 185 meters. This cable is thinner and more flexible than that used for the 10BASE5 standard. The RG-58 cable is both less expensive and easier to place. Cables in the 10BASE2 system connect with BNC connectors. The Network Interface Card (NIC) in a computer requires a T-connector where you can attach two cables to adjacent computers. Any unused connection must have a 50-ohm terminator. UTP is short for Unshielded Twisted Pair, a popular type of cable that consists of two unshielded wires twisted around each other. Due to its low cost, UTP cabling is used extensively for local-area networks (LANs) and telephone connections. UTP cabling does not offer as high bandwidth or as good protection from interference as coaxial or fiber optic cables, but it is less expensive and easier to work with. Shielded twisted pair (STP) cable encases the signal-carrying wires in a conducting shield. Partially correct Marks for this submission: 3.33/10. Question 6 Marks: 10 When determining responsibility for repair and maintenance of a T1, up to which of the following points is the local exchange carrier responsible for? Choose one answer. a. The smart jack b. The router c. The point of demarcation d. The central office

The demarcation point of a network refers to the connection point between the ISP's part of the network and the customer's portion of the network. At that point, the exchange carrier (ISP) is no longer responsible for the status and condition of the network connection. A smart jack is a Network interface device that creates the connection between the carrier and ISP, if the smart jack needs to be moved, the ISP needs to be involved with providing and installing a demarcation extension. Correct Marks for this submission: 10/10. Question 7 Marks: 10 Which device can connect to the Internet using an analog signal on the Public Switched Telephone Network (PSTN)? Choose one answer. a. Gateway b. Modem c. Router d. ISDN (Integrated Services Digital Network) The Public Switched Telephone Network (PSTN) PSTN or otherwise known as the Plain Old Telephone System (POTS) connects two end points, a sender and a receiver, with a dedicated physical circuit. Each endpoint uses the dedicated circuit to send and receive data. The circuit is created and connected at the beginning of each call and disconnected at the end of the call. The PSTN supports both voice and data transmissions over analog phone lines. To allow digital computers to connect together over the analog lines, a modem is used. A modem gets its name from the function it performs. It MOdulates digital signals into analog signals and DEModulates analog signals into digital signals. Correct Marks for this submission: 10/10. Question 8 Marks: 10 Which of the following properties describes a rate at which bits are transmitted over a WAN link? Choose one answer. a. Frequency b. Transmission speed c. Baud rate d. Throughput Correct Marks for this submission: 10/10. Question 9 Marks: 10 The __________ protocol requires time and date synchronization. You might use a Network Time Protocol (NTP) server to synchronize the date and time on all network computers. Choose one answer. a. CHAP b. RADIUS

c. MS-CHAP d. Kerberos The Kerberos protocol is used to authenticate user and computer connections to a Kerberos-based service. Kerberos relies on time sensitive Kerberos authentication tickets to perform the complex authentication. The system date and time on all Kerberos clients and servers must be synchronized with each other. If the date and time are not synchronized (to within a few minutes of each other) Kerberos authentication will fail. A Network Time Protocol (NTP) server, or some other time synchronization method, should be used to synchronize time on all computers in the network to ensure proper Kerberos authentication. Incorrect Marks for this submission: 0/10. Question 10 Marks: 10 You need to connect a Local Area Network (LAN) to a T-Carrier Level 1 (T1) link. Which device do you need to add to the network to make this connection? Choose one answer. a. Channel Service Unit/Data Service Unit (CSU/DSU) b. Switch c. Router d. Multistation Access Unit (MAU) A CSU/DSU is a device that serves as the demarcation (Demarc) point and interface used between LAN equipment (routers) and digital circuit, typically a T-Carrier Level 1 (T1) or Integrated Service Digital Network (ISDN) circuit. It is used to terminate telephone company equipment and prepare data for router interface. Although it does not modulate or demodulate like an analog modem, it can be thought of as a digital modem. It takes digital circuits such as T1 and ISDN and converts them to digital LAN communications. Incorrect Marks for this submission: 0/10. Question 11 Marks: 10 Which line would you recommend to a customer in need of a 1.5 megabits per second (Mbps) connection to the Internet? Choose one answer. a. 56 Kbps b. BRI ISDN c. DS0 d. T1 Correct Marks for this submission: 10/10. Question 12 Marks: 10 Which of the following WAN technologies uses thirty 64Kbps channels? Choose one answer. a. MPLS

b. ATM c. E-1 d. T-1 Correct Marks for this submission: 10/10. Question 13 Marks: 10 Which of the following is the standard data transmission rate for an OC-3 line? Choose one answer. a. 51.8 Mbps b. 622.08 Mbps c. 44.7 Mbps d. 155.52 Mbps Correct Marks for this submission: 10/10. Question 14 Marks: 10 Which of the following network devices is required to translate a synchronous serial connection to time division multiplexed connection? Choose one answer. a. A proxy server b. A router c. A CSU/DSU d. A content switch Incorrect Marks for this submission: 0/10. Question 15 Marks: 10 Which of the following WAN layer two protocols would be BEST suited for a full mesh topology? Choose one answer. a. MPLS b. ATM c. PPP d. Frame-relay MPLS is a fast packet data transport service that uses high speed switching architecture instead of the typical routers for most IP networks. Switching is faster than routing and can provide security based on the MPLS protocol. The advantages to using MPLS are: cost effective; faster than routed networks; more security because VPN can be built for your organization; relatively inexpensive in camparison to other private networks. Correct Marks for this submission: 10/10. Question 16 Marks: 10

Which of the following type of WAN technologies uses cell switching? Choose one answer. a. PSTN b. ATM c. T1 d. Frame relay Correct Marks for this submission: 10/10. Question 17 Marks: 10 You work at the help desk of an ISP. A customer calls to complain about the speed of his ISDN line. He is using a single BRI ISDN circuit switched B channel. What should his transmission rate be? Choose one answer. a. 64 Kbps b. 128 Kbps c. 258 Kbps d. 56 Kbps Incorrect Marks for this submission: 0/10. Question 18 Marks: 10 Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment? Choose one answer. a. E3 b. SONET c. OC-12 d. T3 Correct Marks for this submission: 10/10. Question 19 Marks: 10 A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need? (Select THREE) Choose at least one answer. a. ISDN b. ADSL c. MPLS d. ATM e. Frame-relay f. DOCSIS

g. SONET Traditional WAN networks, based on a hub-and-spoke service architecture use Frame Relay or ATM. These technologies tend to impose bandwidth limitations. Another solution is to use an IP VPN. For an IP VPN, it depends on the network used, the type of transport protocol and the means of securing the traffic. This can use native IP for the transport and a CPE-based firewall and encryption for security. However, this has limited reach. A better solution uses MPLS to keep traffic private, which does not have the overhead of IPSec encryption and since it is a switched transport service that separate's customers' traffic is is inherintly as secure as Frame Relay and ATM. Correct Marks for this submission: 10/10. Question 20 Marks: 10 You have purchased a cable modem and a straight-through Category 5e patch cable from a local electronics store. You connect the cable modem to your computer via a hub which is already connected to your computer. However, your computer is not able to receive a DHCP address from the cable modem network DHCP server. What is the most likely cause of this problem? Choose one answer. a. The cable modem must use a Category 3 UTP cable to connect to a hub b. The cable modem must be directly connected to a computer c. The cable modem requires a crossover cable to connect to the hub d. The cable modem requires a RG-6 coaxial cable to connect to a hub Incorrect Marks for this submission: 0/10. Question 21 Marks: 10 How does the Password Authentication Protocol (PAP) authenticate Point to Point Protocol (PPP) remote sessions? Choose one answer. a. By adding a secret key to the password b. By adding a secret key to the username password c. By double hashing the username and password d. By passing a username and password in plaintext PAP is one of the first authentication protocols used to authenticate remote access connections. It works with the PPP. PAP remote connections are not considered secure. During authentication, the username and password are sent between the remote server and the remote client in clear text. Clear text means that it is not encrypted. Anyone with a packet analyzer can intercept the clear text data and reassemble it. This is a large security risk. PAP authentication is not recommended and is no longer widely used. Incorrect Marks for this submission: 0/10. Question 22 Marks: 10 Which of the following WAN technology types would MOST likely be used in a SOHO environment with a few network devices? Choose one answer. a. Frame relay b. Cable Modem

c. E1 / T1 d. ATM Correct Marks for this submission: 10/10. Question 23 Marks: 10 Which of the following protocols is used by several different operating systems to authenticate resources such as computers, users and printers? Choose one answer. a. TCP b. LDAP c. SMTP d. UDP Incorrect Marks for this submission: 0/10. Question 24 Marks: 10 Which protocol would you use to remotely control a computer over the network? Choose one answer. a. ACL b. RDP c. RSTL d. RPC Correct Marks for this submission: 10/10.

10: Quiz: Wireless Networking Review of attempt 1


Started on Monday, 16 January 2012, 12:57 PM Completed on Monday, 16 January 2012, 02:06 PM Time taken 1 hour 8 mins Grade 445 out of a maximum of 470 (95%) Feedback Congratulations! Move on to the next section Question 1 Marks: 10 Which of these antenna types are considered omni-directional? (Choose TWO) Choose at least one answer. a. Patch

b. Vertical c. Yagi d. Parabolic e. Dipole Vertical and dipole antennas are omni-directional. They produce radio signals 360 degrees from the antenna. On contrast, Yagi, parabolic and patch antennas are considered directional. They focus radio signals in one direction to improve the range of the signal in that general direction. Correct Marks for this submission: 10/10. Question 2 Marks: 10 A newly appointed trainee wants to know what the cause of the problem could be when you have an 802.11a/b/g access point installed with 802.11g clients which at times slows or stops working entirely. What would your reply be? Choose one answer. a. You should inform the trainee that a 2.4 GHz (Gigahertz) cordless telephone is used in the area

b. You should inform the trainee that a 3.2 GHz device is used in the area c. You should inform the trainee that an old microwave is used in the area d. You should inform the trainee that additional Wireless Access Points (WAP) are required Correct Marks for this submission: 10/10. Question 3 Marks: 10 A company guest is requesting to use their personal laptop on the company wireless network. DHCP is configured correctly for wireless and a temporary WEP key is assigned. The laptop cannot connect to the network because: Choose one answer. a. The laptop is enabled for both 802.11b and 802.11g b. The DNS server is not working properly c. The network is out of wireless connections d. MAC filtering is enabled on the WAP Correct Marks for this submission: 10/10. Question 4 Marks: 10 Your company recently installed a Wireless Access Point (WAP) to the corporate network. Members of the Sales Department use laptop computers, with wireless Network Interface Cards (NIC), and connect to the WAP. Two other businesses in your office building have WAPs. All of the WAPs have different Service Set Identifiers (SSIDs) but they all use the same wireless channel and 128-bit Wired Equivalent Privacy (WEP) encryption. The WAPs from the other offices appear to be causing interference on your wireless network. You need to make modifications to your Wireless LAN (WLAN) to reduce interference. What should you do? Choose one answer.

a. Change the WLAN WAP channel to a different channel than the other two WAPs b. Change the WEP encryption strength on the WLAN WAP to be different than that of the other two WAPs c. Change the WLAN WAP to the same SSID as the other two WAPs d. Change the WEP encryption strength to use 64-bit encryption DSSS devices send all data on multiple frequencies at the same time. DSSS uses more bandwidth than FHSS but it also allows greater data throughput than FHSS. FHSS devices send data on only one frequency at a time while constantly changing the frequency at which it sends data. The frequencies used at any given time are assigned by a specific frequency hopping sequence. These frequencies are aggregated into specific WAP channels. When you configure a WAP you configure a specific channel used by the WAP. On 802.11b and 802.11g wireless networks, in the U.S., there are 11 available channels. Each channel aggregates 22, 1 MHz frequencies from the 2.4 GHz range. When configuring channels on WAPs it is recommended to use WAP channels that do not overlap with other WAPs in the area. In the US, channel 1, channel 6 and channel 11 are non-overlapping channels of the 2.4GHz range. The channel used on a WAP is important to note. If two Wireless Access Points (WAPs), in close proximity, use the same wireless radio channel, it can cause signal interference. To reduce interference you should configure different, non-overlapping wireless channels on the WLAN WAPs so they do not use the same channel as the other WAPs. Correct Marks for this submission: 10/10. Question 5 Marks: 10 Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies? Choose one answer. a. 802.11g b. 802.11a c. 802.11b d. 802.11n Correct Marks for this submission: 10/10. Question 6 Marks: 10 A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords? Choose one answer. a. WPA EAP b. 64-bit WEP c. 128-bit WEP d. WPA TLS Correct Marks for this submission: 10/10. Question 7

Marks: 10 A trainee has asked you which devices would be able to interfere with the frequency of an 802.11b access point. What would your reply be? Choose one answer. a. The usage of a 802.11g access point would interfere b. The use of an infrared television remote control would interfere c. The ownership and usage of Bluetooth enabled cell phones would interfere d. The usage of 900 MHz (Megahertz) cordless phones would interfere Correct Marks for this submission: 10/10. Question 8 Marks: 10 A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem? Choose one answer. a. The user is connecting to the wrong SSID b. The SSID broadcast is disabled c. Wireless router is improperly configured d. The wireless NIC is defective Correct Marks for this submission: 10/10. Question 9 Marks: 10 A technician is dispatched to a house where the user reports intermittent problems with their wireless network. Which of the following is the MOST likely cause of drop-offs? Choose one answer. a. Cordless phones b. Cellular phones c. Lighting d. Poor cable connection Correct Marks for this submission: 10/10. Question 10 Marks: 10 A small office home office (SOHO) wireless user reports their new laptop is 802.11b and 802.11g capable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause of the problem? Choose one answer. a. The laptop wireless card is running on a different frequency b. The wireless router needs a firmware update c. The wireless router is 802.11b only d. The wireless router is defective Correct

Marks for this submission: 10/10. Question 11 Marks: 10 A wireless network is created for six computers. Five connect correctly? one machine sees the wireless network but will not connect. Which of the following should the technician do? Choose one answer. a. Remove the WEP key from the router b. Restart the wireless router c. Ensure the failed computer has the correct WEP key d. Change the WEP key on the router Correct Marks for this submission: 10/10. Question 12 Marks: 10 There are two networks sharing the same office space. One network already has an 802.11g access point. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other? Choose one answer. a. Channel b. Encryption Type c. Pre-shared key d. WEP Key Correct Marks for this submission: 10/10. Question 13 Marks: 10 A network technician is installing a series of three access points to cover the entire wing of a building. Each access point has a wired connection and 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points? Choose one answer. a. Channels 7-11-1 b. Channels 1-3-5 c. Channels 1-6-11 d. Channels 2-4-6 Correct Marks for this submission: 10/10. Question 14 Marks: 10 A user reports that when the phone rings in their house the wireless on their laptops becomes disconnected. Which of the following BEST describes the issue? Choose one answer. a. The cordless phones are plugged into the RJ-11 jack b. The cordless phones are plugged into same outlet as the router

c. The cordless phones are 5.8 GHz which interferes with wireless d. The cordless phones are 2.4 GHz which interferes with wireless Correct Marks for this submission: 10/10. Question 15 Marks: 10 A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem? Choose one answer. a. MAC Filtering b. Port forwarding c. Atenna Placement d. SSID Correct Marks for this submission: 10/10. Question 16 Marks: 10 A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) and have line of sight between the wireless transmitters in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used? Choose one answer. a. Serial b. Bluetooth c. Wi-Fi d. Infrared Infrared devices, need to be within ~ 3 feet (1 meter) and must have "line of sight" access between devices. This means that the devices which are transmitting must be able to transmit directly between the devices , without anything in between the infrared signal. This is much like most TV remotes which will not work if someone or something is between the remote and the infrared sensor on the TV. Correct Marks for this submission: 10/10. Question 17 Marks: 10 What is the maximum transmission speed supported by IEEE 802.11b? Choose one answer. a. 11 Mbps b. 54 Mbps c. 1 Mbps d. 2 Mbps The 802.11b has a maximum data rate of 11 Mbps. It is recommended to memorize the details in the following chart. Correct

Marks for this submission: 10/10. Question 18 Marks: 10 Which of the following frequency ranges does 802.11a operate at? Choose one answer. a. 4.9 GHz b. 2.4 GHz c. 54 GHz d. 5 GHz Correct Marks for this submission: 10/10. Question 19 Marks: 10 Which of the following data is included in a wireless access points beacon frame? Choose one answer. a. Channel and WEP Key b. SSID and WEP key c. IP and MAC address d. SSID and MAC Address Correct Marks for this submission: 10/10. Question 20 Marks: 10 Which of the following wireless network adapters can connect wirelessly to to an 802.11g Wireless Access Point (WAP)? Choose at least one answer. a. An 802.11b adapter b. An 802.11g adapter c. A 100BASETX adapter d. An 802.11a adapter 802.11g devices are backward compatible with 802.11b devices. This means that both 802.11b and 802.11g devices are interoperable with each other. 802.11a devices are not compatible with 802.11b or 802.11g devices. 100BASETX is a wired network standard and cannot transmit wirelessly. Partially correct Marks for this submission: 5/10. Question 21 Marks: 10 A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased? Choose one answer. a. Wi-Fi

b. Bluetooth c. 802.11a d. IEEE 1394 Correct Marks for this submission: 10/10. Question 22 Marks: 10 A client wants to extend the range of their wireless network without running wires throughout the small office. Which of the following could be implemented with the LEAST administrative effort? Choose one answer. a. Install a repeater at the end of the office b. Install a WAP in the middle of the office c. Install an additional router to help with congestion d. Install an 802.11n router and change all NICS to match Correct Marks for this submission: 10/10. Question 23 Marks: 10 Which of the following wireless standards allows for increased bandwidth by allowing channel bonding? Choose one answer. a. 802.11b b. 802.11n c. 802.11g d. 802.11a Correct Marks for this submission: 10/10. Question 24 Marks: 10 Which of the following are NOT valid WEP (Wired Equivalent Privacy) key lengths? Choose one answer. a. 32-bit b. 40-bit c. 64-bit d. 128-bit Incorrect Marks for this submission: 0/10. Question 25 Marks: 10 Which of the following items changes the encryption key on a users session after a set period of time? Choose one answer. a. TKIP

b. RADIUS c. AES d. WEP Correct Marks for this submission: 10/10. Question 26 Marks: 10 What would the cause of the problem be when network users in the lunch room suffer intermittent random connections? Choose one answer. a. You should inform the trainee that interference might be caused by the old microwave oven being used in the lunch room b. You should inform the trainee that 900 MHz (Megahertz) cordless phones are being used by employees on lunch causing interference c. You should inform the trainee that there are too many people located too close to 900 MHz devices

d. You should inform the trainee that there are to much users using a single access point Correct Marks for this submission: 10/10. Question 27 Marks: 10 Which device can you install to connect an 802.11g wireless network to a cabled Ethernet network? Choose one answer. a. Proxy server b. Channel Service Unit / Data Service Unit (CSU / DSU) c. Analog modem d. Wireless Access Point (WAP) A WAP is a device that provides a transparent wireless connection to a wired network. Most WAPs have two interfaces. One is the wireless interface. This interface is a wireless antenna. The second interface is the wired interface. Most WAPs use Ethernet, but they can also be Universal Serial Bus (USB), token ring, fiber optic or some other wired connection. The WAP acts as a transceiver to translate between the wireless signal and the wired network media. Correct Marks for this submission: 10/10. Question 28 Marks: 10 Which of the following statements is TRUE regarding 802.11g and what 802.11g is compatible with? Choose one answer. a. The 100BASE-TX standard is compatible with the 802.11g standard b. The 802.11b standard is compatible with the 802.11g standard c. The 802.11g standard is compatible with the 802.11g standard d. The 1000BASE-TX standard is compatible with the 802.11g standard

The Institute of Electrical and Electronics Engineers (IEEE) and more specifically the 802 Working Group defines the specifications for each standard. The standards define the network topology, media used and the network access types for each 802.X specification. 802.11 Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Wireless LAN There are many different 802 specifications used for the current wireless technologies. They all fall under the 802.11 standard. The main wireless standards are 802.11a, 802.11b and 802.11g. All three of these wireless standards use the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) access method. Wireless devices are unable to detect collisions on the wireless connection because that cannot connect to it without first sending data packets. So instead of trying to detect collisions like on CSMA/CD (Ethernet) networks wireless devices employ collision avoidance measures. To avoid collisions CSMA/CA devices use special acknowledgement (ACK) packets and wait times to avoid two or more devices from sending packets on the network at the same time. Incorrect Marks for this submission: 0/10. Question 29 Marks: 10 A technician needs to connect a laptop via the small office, home office (SOHO) wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue? Choose one answer. a. The laptop is running on Windows Service Pack 1 b. The SSID is set to not broadcast c. The wireless router does not have adequate AC power d. The WEP key is not correct Correct Marks for this submission: 10/10. Question 30 Marks: 10 On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause? Choose one answer. a. The gateway is not configured on the router b. The wireless network card is not working c. The wireless router does not have DHCP enabled d. The wireless network card is out of range Correct Marks for this submission: 10/10. Question 31 Marks: 10 Which of the following wireless networks is configured without an access point? Choose one answer. a. Extended b. Mutliport repeating c. Ad-hoc

d. Local Correct Marks for this submission: 10/10. Question 32 Marks: 10 A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points? Choose one answer. a. Channels 7-11-1 b. Channels 1-3-5 c. Channels 5-5-5 d. Channels 6-6-6 Correct Marks for this submission: 10/10. Question 33 Marks: 10 A user reports their wireless 802.11g Internet connection is intermittently disrupted. Which of the following is the cause of the problem? Choose one answer. a. Infrared printer b. Cordless phones c. Incandescent light d. Cell phone Correct Marks for this submission: 10/10. Question 34 Marks: 10 Which of the following network devices would an administrator have to configure channels on? Choose one answer. a. Unmanaged switch b. Firewall c. Hub d. WAP Correct Marks for this submission: 10/10. Question 35 Marks: 10 Which of the following is the strongest type of wireless encryption? Choose one answer. a. AES b. TKIP

c. WEP d. RADIUS Correct Marks for this submission: 10/10. Question 36 Marks: 10 Which of the following access methods is used for wireless medium access? Choose one answer. a. FDD b. CSMA/CD c. CSMA/CA d. Token Ring The Institute of Electrical and Electronics Engineers (IEEE) and more specifically the 802 Working Group defines the specifications for each standard. The standards define the network topology, media used and the network access types for each 802.X specification. 802.11 Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Wireless LAN There are many different 802 specifications used for the current wireless technologies. They all fall under the 802.11 standard. The main wireless standards are 802.11a, 802.11b and 802.11g. All three of these wireless standards use the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) access method. Wireless devices are unable to detect collisions on the wireless connection because that cannot connect to it without first sending data packets. So instead of trying to detect collisions like on CSMA/CD (Ethernet) networks wireless devices employ collision avoidance measures. To avoid collisions CSMA/CA devices use special acknowledgement (ACK) packets and wait times to avoid two or more devices from sending packets on the network at the same time. Correct Marks for this submission: 10/10. Question 37 Marks: 10 Which of the following services does the Remote Authentication Dial-In User Service (RADIUS) provide to remote access clients? Choose one answer. a. Verification b. Addressing c. Routing d. Trunking The Remote Authentication Dial-In User Service (RADIUS) is a service that provides centralized Authentication, Authorization and Access control (AAA) of remote access clients. RADIUS verifies clients that attempt to connect to a remote access service. A RADIUS server is often used to verify dial-in, VPN and even wireless network connections. One central RADIUS server can perform RADIUS services for many remote access servers and connections on a network. Most server operating systems contain a RADIUS service/daemon. The Windows 2000 and Windows Server 2003 RADIUS service is called Internet Authentication Service (IAS). Linux/UNIX has many implementations of the RADIUS daemon. Correct

Marks for this submission: 10/10. Question 38 Marks: 10 A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this? Choose one answer. a. Four port wireless router b. Four port hub c. Four port WAP d. Four port switch Correct Marks for this submission: 10/10. Question 39 Marks: 10 Which of the following network devices direct packets over a wireless network? Choose one answer. a. CSU / DSU b. NIC c. WEP d. WAP Correct Marks for this submission: 10/10. Question 40 Marks: 10 A user states that they have decreased signal strength on their wireless connection. They have been using the wireless network previously without problems and the network configuration has not been changed. Which of the following is MOST likely the cause of the degraded signal? Choose one answer. a. Incorrect SSID b. Incorrect encrytion c. Environmental factors d. Standards mismatch Correct Marks for this submission: 10/10. Question 41 Marks: 10 Which of the following is the MOST secure wireless encryption? Choose one answer. a. 3DES b. WPA2 TKIP c. WEP d. WPA2 AES

Correct Marks for this submission: 10/10. Question 42 Marks: 10 A technician is trying to connect a new laptop computer to a secured wireless network. The Light Emitting Diode (LED) link light on the wireless card indicates it is connected. However, the computer cannot connect to any network resources or the Internet. What should the technician check FIRST? Choose one answer. a. The Fully Qualified Domain Name (FQDN) of the WAP b. The Wired Equivalent Privacy (WEP) key c. The SSID broadcast status on the WAP d. The Ad-hoc setting on the WAP In this scenario a laptop appears to be connected to a secured Wireless Access Point (WAP) based on the link light indicator. However, the device cannot connect to network resources. A wireless device can associate with a WAP and appear to be connected to the WAP but be unable to access network resources. This generally happens when you connect to a WAP but enter an incorrect Wired Equivalent Privacy (WEP) key or you do not enter a WEP key at all. To correct this you need to enter the correct WEP key to allow the device to participate on the secure network. Configuring a WEP key is very straightforward. Simply use the WAPs web administration page to select WEP security, choose encryption strength (64-bit, 128-bit and 256-bit) depending on your needs and assign a WEP key to the AP. Then you enable WEP on the host and configure the same WEP key used on the WAP. Now both the WAP and the host will use the "secret" key to encrypt packets that are sent. If you attempt to connect to a WEP-secured wireless network without the correct Wired Equivalent Privacy (WEP) key, you will not be able to connect to the wireless network. The WEP key is used to authenticate and encrypt network transmissions. Without the correct WEP key, you cannot authenticate, and you will not be able to connect to the network. Correct Marks for this submission: 10/10. Question 43 Marks: 10 A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength? Choose one answer. a. Broadcast the SSID b. Enable traffic shaping c. Change the encryption method d. Change the antenna placement Correct Marks for this submission: 10/10. Question 44 Marks: 10 How can the range of an 802.11a/b/g wireless access point be increased? Choose one answer. a. Lower the output power

b. Install an external antenna c. Remove any external antennas and use the internal one d. Change the transmitting frequency to the 5 GHz (Gigahertz) range To increase the range of a Wireless Access Point (WAP) you can add an external antenna. This antenna could be a dipole/omni-directional antenna to transmit the wireless signal 360 degrees or a directional antenna to focus the wireless signal in one direction. Most WAPs have modular connectors for replacing or adding external antennas. While there are many wireless antenna types there are only two main ones that you need to consider. They are Omni-directional and Directional. Omni-directional The prefix Omni means "All", so an omni-directional antenna sends a signal 360 degrees from the center point. As a visual example, an omni-directional antenna sends out a signal much like a candle. The light/signal closest to the candle/antenna is bright but as you move away from it the light/signal loses strength. Omni-directional antennas are generally placed in the center of the wireless coverage area. These antennas are good for both point-to-point and point-to-multi-point applications. Omni-directional antennas are best suited for open office areas and provide the greatest signal coverage in wide open outdoor spaces. The three main types of omni-directional antennas that you will encounter are the vertical, dipole and the dome antennas. Most commercial home/office WAPs contain one or more vertical or dipole antennas. These are generally about 4-6 long black or grey poles. You can see an example by looking at the previous picture of the Linksys Wireless Access Point. Dome antennas are generally the shape and size of a fire detector. You install these antennas in the center of a room on the ceiling. Directional Directional antennas, unlike omni-directional antennas, only send their wireless radio signal in one direction. As a visual example, directional antenna signals emanate from the antennas much like the light from a flashlight. Some directional antennas can focus the wireless signal, much like some flashlights. Since directional antennas can focus the wireless signal in one general direction they are generally used in applications that need to send a signal down a long, narrow area. They are also good for directing a signal over a long distance, such as between two buildings. The three main types of directional antennas are the Patch used for wider directed signal coverage, and Panel and Yagi-Uda antennae for narrow beam coverage. Correct Marks for this submission: 10/10. Question 45 Marks: 10 A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points? Choose one answer. a. 3DES b. CHAP c. AES d. TKIP Correct Marks for this submission: 10/10. Question 46

Marks: 10 Which of the following is a client-server based authentication software system which maintains user profiles in a central database? Choose one answer. a. MS-CHAP b. RADIUS c. EAP d. CHAP The Remote Authentication Dial-In User Service (RADIUS) is a service that provides centralized Authentication, Authorization and Access control (AAA) of remote access clients. RADIUS verifies clients that attempt to connect to a remote access service. A RADIUS server is often used to verify dial-in, VPN and even wireless network connections. One central RADIUS server can perform RADIUS services for many remote access servers and connections on a network. Most server operating systems contain a RADIUS service/daemon. The Windows 2000 and Windows Server 2003 RADIUS service is called Internet Authentication Service (IAS). Linux/UNIX has many implementations of the RADIUS daemon. Correct Marks for this submission: 10/10. Question 47 Marks: 10 An office has just added an employee kitchen area. The work area and equipment has stayed the same. Which of the following is the MOST likely reason why they are now having wireless connectivity problems? Choose one answer. a. Antenna placement b. Distance c. Interference d. Encryption Correct Marks for this submission: 10/10.

You might also like