CCNA Lan Chapter #7

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rodney.butler
R
Rodney.butler
Community Contributor
Quizzes Created: 21 | Total Attempts: 27,779
Questions: 21 | Attempts: 329

SettingsSettingsSettings
CCNA Lan Chapter #7 - Quiz

CCNA LAN Chapter #7: Wireless


Questions and Answers
  • 1. 

    Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)

    • A.

      802.11a suffers from a shorter range than 802.11g.

    • B.

      The 2.4 GHz frequency band is not as crowded as the 5 GHz band.

    • C.

      802.11a is more susceptible to RF interference from common commercial items.

    • D.

      802.11a uses a more expensive modulation technique than 802.11g.

    • E.

      802.11g is backward compatible with 802.11b, but 802.11a is not.

    Correct Answer(s)
    A. 802.11a suffers from a shorter range than 802.11g.
    E. 802.11g is backward compatible with 802.11b, but 802.11a is not.
    Explanation
    The adoption of 802.11g over 802.11a has been favored due to two main conditions. Firstly, 802.11a suffers from a shorter range compared to 802.11g, making it less practical for larger areas or outdoor environments. Secondly, 802.11g is backward compatible with 802.11b, allowing for seamless integration with older devices and networks. On the other hand, 802.11a is not backward compatible, limiting its compatibility and interoperability with existing infrastructure.

    Rate this question:

  • 2. 

    Which two statements concerning network security are accurate? (Choose two.)

    • A.

      802.11i uses 3DES for encryption.

    • B.

      Open authentication uses no client or AP verification.

    • C.

      The 802.11i protocol is functionally identical to WPA.

    • D.

      802.11i incorporates a RADIUS server for enterprise authentication.

    • E.

      A wireless client first associates with an AP and then authenticates for network access .

    Correct Answer(s)
    B. Open authentication uses no client or AP verification.
    D. 802.11i incorporates a RADIUS server for enterprise authentication.
    Explanation
    The first accurate statement is that open authentication uses no client or AP verification. This means that any client can connect to the network without providing any credentials or being verified by the access point.

    The second accurate statement is that 802.11i incorporates a RADIUS server for enterprise authentication. RADIUS (Remote Authentication Dial-In User Service) is a protocol that provides centralized authentication, authorization, and accounting for network access. In the case of 802.11i, a RADIUS server is used for authentication in enterprise environments.

    Rate this question:

  • 3. 

    Which installation method will allow connectivity for a new wireless network?

    • A.

      Set up WEP on the access point only

    • B.

      Set up open access on both the access point and each device connected to it

    • C.

      Set up full encryption on the access point while leaving each device connected to the network open

    • D.

      Set up full encryption on each device of the WLAN while leaving the access point settings open

    Correct Answer
    B. Set up open access on both the access point and each device connected to it
  • 4. 

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?

    • A.

      Network Mode

    • B.

      Network Name (SSID)

    • C.

      Radio Band

    • D.

      Wide Channel

    • E.

      Standard Channel

    Correct Answer
    B. Network Name (SSID)
    Explanation
    The network administrator uses the "Network Name (SSID)" setting to configure the unique identifier that client devices use to distinguish this wireless network from others. The SSID (Service Set Identifier) is a case-sensitive alphanumeric string that is assigned to the wireless network. Client devices use the SSID to identify and connect to a specific wireless network. By configuring the SSID, the network administrator can ensure that client devices can correctly identify and connect to the intended wireless network.

    Rate this question:

  • 5. 

    Which two statements are true regarding wireless security? (Choose two.)

    • A.

      MAC address filtering prevents the contents of wireless frames from being viewable.

    • B.

      Providing a wireless client with the network key allows an available network to be visible.

    • C.

      Disabling an access point from broadcasting the SSID prevents the access point from being discovered.

    • D.

      Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections.

    • E.

      Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.

    Correct Answer(s)
    D. Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections.
    E. Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.
    Explanation
    MAC address filtering prevents the contents of wireless frames from being viewable. Disabling an access point from broadcasting the SSID prevents the access point from being discovered. Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections. Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.

    Rate this question:

  • 6. 

    Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?

    • A.

      This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.

    • B.

      The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.

    • C.

      Install a new wireless access point in this center area to provide coverage.

    • D.

      Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.

    Correct Answer
    A. This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
    Explanation
    The poor performance within a small area of the room suggests that there may be RF channel overlap. To address this issue, the technician should first verify the channels in use on each wireless access point and then change them to non-overlapping channels. This will help improve performance by reducing interference between the access points.

    Rate this question:

  • 7. 

    Which three devices do many wireless routers incorporate? (Choose three.)

    • A.

      Gateway for connecting to other network infrastructures

    • B.

      Built-in Ethernet switch

    • C.

      Network management station

    • D.

      VTP server

    • E.

      Wireless access point

    Correct Answer(s)
    A. Gateway for connecting to other network infrastructures
    B. Built-in Ethernet switch
    E. Wireless access point
    Explanation
    Many wireless routers incorporate a gateway for connecting to other network infrastructures, allowing them to connect to other networks and access the internet. They also have a built-in Ethernet switch, which allows wired devices to connect to the router and communicate with each other. Additionally, wireless routers have a wireless access point, which enables devices to connect to the network wirelessly and access the internet.

    Rate this question:

  • 8. 

    Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?

    • A.

      CSMA/CD

    • B.

      Token passing

    • C.

      CSMA/CA

    • D.

      Polling

    Correct Answer
    C. CSMA/CA
    Explanation
    A wireless access point uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) access method to allow for multiple user connectivity and distributed access. CSMA/CA is a protocol used in wireless networks to avoid collisions between data packets by employing a "listen before talk" approach. It ensures that a device checks for the presence of other devices transmitting on the same channel before transmitting its own data, thus minimizing the chances of collisions and optimizing network efficiency.

    Rate this question:

  • 9. 

    Why is security so important in wireless networks?

    • A.

      Wireless networks are typically slower than wired networks.

    • B.

      Televisions and other devices can interfere with wireless signals.

    • C.

      Wireless networks broadcast data over a medium that allows easy access.

    • D.

      Environmental factors such as thunderstorms can affect wireless networks.

    Correct Answer
    C. Wireless networks broadcast data over a medium that allows easy access.
    Explanation
    Wireless networks broadcast data over a medium that allows easy access, which makes security important. Since wireless signals can be intercepted by anyone within range, it is crucial to ensure that the data being transmitted is protected from unauthorized access. Without proper security measures, sensitive information can be easily intercepted and compromised, leading to potential data breaches and privacy violations. Therefore, implementing strong security protocols in wireless networks is essential to safeguard the integrity and confidentiality of the transmitted data.

    Rate this question:

  • 10. 

    Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    D. 802.11n
    Explanation
    802.11n is the correct answer because it provides the most compatibility with older wireless standards while offering greater performance. It is backward compatible with previous standards (802.11a, 802.11b, and 802.11g) and can operate on both the 2.4GHz and 5GHz frequency bands. It also supports multiple-input multiple-output (MIMO) technology, which improves data transfer rates and overall network performance.

    Rate this question:

  • 11. 

    Which two statements characterize wireless network security? (Choose two.)

    • A.

      A rogue access point represents a security risk for the local network.

    • B.

      Wireless networks offer the same security features as wired networks.

    • C.

      Using encryption prevents unauthorized clients from associating with an access point.

    • D.

      An attacker needs physical access to at least one network device to launch an attack.

    • E.

      With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.

    Correct Answer(s)
    A. A rogue access point represents a security risk for the local network.
    E. With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.
    Explanation
    A rogue access point represents a security risk for the local network because it is an unauthorized access point that can be used by attackers to gain access to the network and intercept sensitive information. With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect, which adds an extra layer of security as it makes it more difficult for attackers to identify and connect to the network.

    Rate this question:

  • 12. 

    Which network design process identifies where to place access points?

    • A.

      Site survey

    • B.

      Risk assessment

    • C.

      Scalability design

    • D.

      Network protocol analysis

    Correct Answer
    A. Site survey
    Explanation
    The network design process that identifies where to place access points is called a site survey. This involves conducting a thorough analysis of the physical location to determine the optimal placement of access points for maximum coverage and performance. A site survey takes into consideration factors such as building layout, obstacles, signal interference, and user requirements to ensure a well-designed and efficient wireless network.

    Rate this question:

  • 13. 

    What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?

    • A.

      Authentication

    • B.

      SSID broadcasting

    • C.

      MAC address filtering

    • D.

      EAP (Extensible Authentication Protocol)

    • E.

      Radius (Remote Authentication Dial-In User Service)

    Correct Answer
    C. MAC address filtering
    Explanation
    MAC address filtering is a wireless security feature that allows a network administrator to configure an access point with wireless NIC unique identifiers. By enabling MAC address filtering, only the wireless NICs with these specific identifiers will be allowed to connect to the wireless network. This provides an additional layer of security by preventing unauthorized devices from accessing the network, even if they have the correct authentication credentials or knowledge of the SSID.

    Rate this question:

  • 14. 

    What will a wireless client transmit to discover the available WLAN networks?

    • A.

      Beacon

    • B.

      Password

    • C.

      Probe request

    • D.

      Association request

    Correct Answer
    C. Probe request
    Explanation
    A wireless client will transmit a probe request to discover the available WLAN networks. This is a message sent by the client device to search for nearby access points. The probe request contains information about the client and its capabilities, and it is broadcasted to all nearby access points. The access points then respond with a probe response, providing details about their network and allowing the client to choose the most suitable network to connect to.

    Rate this question:

  • 15. 

    In a WLAN network, why should wireless access points be implemented with each access point using a different channel?

    • A.

      To keep users segregated on separate subnets

    • B.

      To control the amount of bandwidth that is utilized

    • C.

      To keep signals from interfering with each other

    • D.

      To keep traffic secure

    Correct Answer
    C. To keep signals from interfering with each other
    Explanation
    Wireless access points should be implemented with each access point using a different channel in order to keep signals from interfering with each other. When multiple access points use the same channel, their signals can overlap and cause interference, resulting in reduced network performance and connectivity issues. By using different channels, access points can operate on separate frequencies, minimizing signal interference and improving overall network stability and performance.

    Rate this question:

  • 16. 

    What purpose does authentication serve in a WLAN?

    • A.

      Converts clear text data before transmission

    • B.

      Indicates which channel the data should flow on

    • C.

      Determines that the correct host is utilizing the network

    • D.

      Allows the host to choose which channel to use

    Correct Answer
    C. Determines that the correct host is utilizing the network
    Explanation
    Authentication serves the purpose of determining that the correct host is utilizing the network. This means that it verifies the identity of the host before granting access to the WLAN. By doing so, it ensures that only authorized users can connect to the network and prevents unauthorized access or misuse of the network resources.

    Rate this question:

  • 17. 

    What occurs when a rogue access point is added to a WLAN?

    • A.

      Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion.

    • B.

      Unauthorized users can gain access to internal servers, thus causing a security hole.

    • C.

      All traffic that uses the same channel as the rogue access point will be encrypted.

    • D.

      All traffic that uses the same channel as the rogue access point will be required to authenticate.

    Correct Answer
    B. Unauthorized users can gain access to internal servers, thus causing a security hole.
    Explanation
    When a rogue access point is added to a WLAN, unauthorized users can gain access to internal servers, causing a security hole. This means that individuals who are not authorized to use the network can infiltrate the system and potentially compromise sensitive information or disrupt network operations. This poses a significant risk to the security and integrity of the WLAN.

    Rate this question:

  • 18. 

    What procedure can prevent man-in-the-middle attacks?

    • A.

      Force all devices on a WLAN to authenticate and monitor for any unknown devices.

    • B.

      Enable access points to send an SSID to each device wanting to use the network.

    • C.

      Configure MAC filtering on all authorized access points.

    • D.

      Disable SSID broadcasts.

    Correct Answer
    A. Force all devices on a WLAN to authenticate and monitor for any unknown devices.
    Explanation
    By forcing all devices on a WLAN to authenticate and monitoring for any unknown devices, it ensures that only authorized devices can access the network. This procedure prevents man-in-the-middle attacks where an attacker intercepts communication between two parties, posing as one of them. By authenticating all devices and monitoring for unknown devices, any unauthorized device attempting to perform a man-in-the-middle attack will be detected and blocked, ensuring the security of the network.

    Rate this question:

  • 19. 

    Which function is provided by a wireless access point?

    • A.

      Dynamically assigns an IP address to the host

    • B.

      Provides local DHCP services

    • C.

      Converts data from 802.11 to 802.3 frame encapsulation

    • D.

      Provides a gateway for connecting to other networks

    Correct Answer
    C. Converts data from 802.11 to 802.3 frame encapsulation
    Explanation
    A wireless access point is responsible for converting data from the 802.11 wireless protocol to the 802.3 Ethernet protocol. This conversion allows devices connected to the wireless access point to communicate with devices on a wired network. By encapsulating the data into the appropriate frame format, the wireless access point enables seamless transmission of data between wireless and wired networks.

    Rate this question:

  • 20. 

    Which major problem does CSMA/CA overcome in wireless networks?

    • A.

      Bandwidth saturation

    • B.

      Privacy concerns

    • C.

      Media contention

    • D.

      Device interoperability

    Correct Answer
    C. Media contention
    Explanation
    CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is a protocol used in wireless networks to avoid media contention. Media contention occurs when multiple devices try to access the wireless medium simultaneously, leading to collisions and degraded network performance. CSMA/CA solves this problem by implementing a mechanism where devices listen for ongoing transmissions before transmitting, reducing the likelihood of collisions. Therefore, the correct answer is media contention.

    Rate this question:

  • 21. 

    What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?

    • A.

      Association response

    • B.

      Beacon

    • C.

      Key

    • D.

      Probe request

    Correct Answer
    B. Beacon
    Explanation
    A wireless access point uses beacons to allow WLAN clients to learn which networks are available in a given area. Beacons are broadcasted by the access point at regular intervals and contain information about the network, such as the network name (SSID) and supported capabilities. When a WLAN client receives a beacon, it can use the information to determine if it wants to connect to that network. Beacons are an essential part of the WLAN discovery process and help clients identify and connect to available networks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 26, 2010
    Quiz Created by
    Rodney.butler
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.