ICND Part 1 Vol 1 Module 3 Review

19 Questions | Total Attempts: 70

SettingsSettingsSettings
ICND Quizzes & Trivia

Module 3 Review


Questions and Answers
  • 1. 
    What is the most tangible benefit of wireless implementation? (Source: Exploring -Fireless Networking)
    • A. 

  • 2. 
    What method does a WLAN use to control transmissions? (Source: Exploring Wireless Networking)
    • A. 

  • 3. 
    Which regulatory agency controls the 801.11 standard that governs WLANs? (Source: Exploring Wireless Networking)
    • A. 

      Wi-Fi Alliance

    • B. 

      IEEE

    • C. 

      EMA

    • D. 

      WISC

  • 4. 
    Which organization offers certification for interoperability between vendors of 802.11 products? (Source: Exploring Wireless Networking)
    • A. 

  • 5. 
    Which three are the unlicensed bands used by WLANs? (Choose three.) (Source: Exploring Wireless Networking)
    • A. 

      2.4-MHz band

    • B. 

      900- MHz band

    • C. 

      2.4-GHz band

    • D. 

      5-GHz band

    • E. 

      900-GHz band

  • 6. 
    Which two of the 802.11 standards have the highest possible data rates? (Choose two.) (Source: Exploring Wireless Networking)
    • A. 

      802.11

    • B. 

      802.11a

    • C. 

      802.11b

    • D. 

      802.11d

    • E. 

      802.11g

  • 7. 
    Which 802.11 standard transmits using the 5-GHz band? (Source: Exploring Wireless Networking)
    • A. 

      802.11

    • B. 

      802.11a

    • C. 

      802.11b

    • D. 

      802.11d

    • E. 

      802.11g

  • 8. 
    Which statement is true about the Wi-Fi Alliance? (Source: Exploring Wireless Networking)
    • A. 

      It is a global standards organization that controls the compatibility of Wi-Fi products.

    • B. 

      It operates only in the United States and ensures the compatibility ofWi-Fi products

    • C. 

      It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LAN s.

    • D. 

      It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations.

  • 9. 
    What is a rogue access point? (Source: Understanding WLAN Security) A)         
    • A. 

      An access point that has an open WEP key

    • B. 

      An access point that is broadcasting its SSID

    • C. 

      An unsecured access point that has been placed on a WLAN

    • D. 

      An access point that has had a hardware failure that causes it to endlessly broadcast its SSID

  • 10. 
    Which three are the steps to secure a WLAN? (Choose three.) (Source: Understanding WLAN Security)
    • A. 

      encryption for providing privacy and confidentiality

    • B. 

      Authentication to ensure that legitimate clients and users access the network via trusted access points

    • C. 

      Controls to transmit power to limit the access point access range to the property boundaries of the parent organization

    • D. 

      Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs

  • 11. 
    Which standard provides the strongest level of WLAN security? (Source: Understanding WLAN Security)
    • A. 

      EAP

    • B. 

      WEP

    • C. 

      WPA

    • D. 

      802.11i/WPA2

  • 12. 
    What factor determines which access point a client will associate with? (Source: Understanding WLAN Security
    • A. 

      The access point with the lowest ssm

    • B. 

      The access point with the highest ssm

    • C. 

      The access point whose SSID is received first

    • D. 

      The access point that is received with the strongest signal

  • 13. 
    When using 802.IX, how is the client authenticated? (Source: Understanding WLAN Security)
    • A. 

      The client is authenticated against a local database stored on the access point.

    • B. 

      The access point forwards all network traffic to the server where it is either authenticated or blocked

    • C. 

      The access point encapsulates any 802.1 X traffic bound for the authentication server and sends it to the server

    • D. 

      The client encapsulates the 802.1 X authentication traffic before sending it to the access point. This causes the access point to forward it to the server.

  • 14. 
    Which statement is true of a comparison between WP A and WP A2? (Source: Understanding WLAN Security)
    • A. 

      WPA uses pre-shared keys, while WPA 2 uses PSK.

    • B. 

      WPA uses EAP authentication, while WPA 2 uses 802.IIX.

    • C. 

      WPA uses personal mode, while WPA 2 uses enterprise mode.

    • D. 

      WPA uses TKIP/MIC encryption, while WPA 2 uses AES-CCMP encryption.

  • 15. 
    When you are implementing extended service areas, how much overlap is suggested? (Source: Implementing a WLAN)
    • A. 

      5 to 10 percent

    • B. 

      10 - 15 percent

    • C. 

      15 - 20 percent

    • D. 

      25 - 30 percent

  • 16. 
    What allows a client to communicate while moving? (Source: Implementing a WLAN)
    • A. 

      The ability to shift data rates ,

    • B. 

      The ability to vary transmit levels

    • C. 

      The ability to match the transmit level to the receive level

    • D. 

      The ability to perform error correction as the signal level changes

  • 17. 
    Which three are basic wireless access point parameters? (Choose three.) (Source: Implementing a WLAN)
    • A. 

      SSID

    • B. 

      Authentication

    • C. 

      Data exchange rates

    • D. 

      Transmit band selection

    • E. 

      RF Channel with optional power

  • 18. 
    When implementing a WLAN, when should you use WEP? (Source: Implementing a WLAN)
    • A. 

      Only if there is an AAA server available

    • B. 

      When you need the increased security ofWEP

    • C. 

      When you are planning to enable 802.llx authentication

    • D. 

      Only If the hardware equipment does not support WPA

  • 19. 
    Match the wireless client to its description. (Source: Implementing a WLA   1. WZC 2.Cisco Compatible Extensions 3.Cisco Secure Services Client   ___full feature supplicant for both wired and wireless client ___Windows operating systems basic wireless supplicant client ___more advanced wireless client features than those of native operating system
Back to Top Back to top