Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Online Exam
›
IT Certification
›
CCNA
ICND Part 1 Vol 1 Module 3 Review
18 Questions
|
By Whithickson | Updated: Mar 21, 2022
| Attempts: 73
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 18
0 %
0/100
Score
0/100
1.
Which standard provides the strongest level of WLAN security? (Source: Understanding WLAN Security)
EAP
WEP
WPA
802.11i/WPA2
Submit
Start Quiz
About This Quiz
Module 3 Review
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
What method does a WLAN use to control transmissions? (Source: Exploring Wireless Networking)
Submit
3.
Which regulatory agency controls the 801.11 standard that governs WLANs? (Source: Exploring Wireless Networking)
Wi-Fi Alliance
IEEE
EMA
WISC
Submit
4.
Which organization offers certification for interoperability between vendors of 802.11 products? (Source: Exploring Wireless Networking)
Submit
5.
Which statement is true of a comparison between WP A and WP A2? (Source: Understanding WLAN Security)
WPA uses pre-shared keys, while WPA 2 uses PSK.
WPA uses EAP authentication, while WPA 2 uses 802.IIX.
WPA uses personal mode, while WPA 2 uses enterprise mode.
WPA uses TKIP/MIC encryption, while WPA 2 uses AES-CCMP encryption.
Submit
6.
Which three are the steps to secure a WLAN? (Choose three.) (Source: Understanding WLAN Security)
Encryption for providing privacy and confidentiality
Authentication to ensure that legitimate clients and users access the network via trusted access points
Controls to transmit power to limit the access point access range to the property boundaries of the parent organization
Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
Submit
7.
What is a rogue access point? (Source: Understanding WLAN Security) A)
An access point that has an open WEP key
An access point that is broadcasting its SSID
An unsecured access point that has been placed on a WLAN
An access point that has had a hardware failure that causes it to endlessly broadcast its SSID
Submit
8.
When you are implementing extended service areas, how much overlap is suggested? (Source: Implementing a WLAN)
5 to 10 percent
10 - 15 percent
15 - 20 percent
25 - 30 percent
Submit
9.
When implementing a WLAN, when should you use WEP? (Source: Implementing a WLAN)
Only if there is an AAA server available
When you need the increased security ofWEP
When you are planning to enable 802.llx authentication
Only If the hardware equipment does not support WPA
Submit
10.
Which 802.11 standard transmits using the 5-GHz band? (Source: Exploring Wireless Networking)
802.11
802.11a
802.11b
802.11d
802.11g
Submit
11.
What is the most tangible benefit of wireless implementation? (Source: Exploring -Fireless Networking)
Submit
12.
Which two of the 802.11 standards have the highest possible data rates? (Choose two.) (Source: Exploring Wireless Networking)
802.11
802.11a
802.11b
802.11d
802.11g
Submit
13.
Which statement is true about the Wi-Fi Alliance? (Source: Exploring Wireless Networking)
It is a global standards organization that controls the compatibility of Wi-Fi products.
It operates only in the United States and ensures the compatibility ofWi-Fi products
It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LAN s.
It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations.
Submit
14.
Which three are the unlicensed bands used by WLANs? (Choose three.) (Source: Exploring Wireless Networking)
2.4-MHz band
900- MHz band
2.4-GHz band
5-GHz band
900-GHz band
Submit
15.
What allows a client to communicate while moving? (Source: Implementing a WLAN)
The ability to shift data rates ,
The ability to vary transmit levels
The ability to match the transmit level to the receive level
The ability to perform error correction as the signal level changes
Submit
16.
What factor determines which access point a client will associate with? (Source: Understanding WLAN Security
The access point with the lowest ssm
The access point with the highest ssm
The access point whose SSID is received first
The access point that is received with the strongest signal
Submit
17.
Which three are basic wireless access point parameters? (Choose three.) (Source: Implementing a WLAN)
SSID
Authentication
Data exchange rates
Transmit band selection
RF Channel with optional power
Submit
18.
When using 802.IX, how is the client authenticated? (Source: Understanding WLAN Security)
The client is authenticated against a local database stored on the access point.
The access point forwards all network traffic to the server where it is either authenticated or blocked
The access point encapsulates any 802.1 X traffic bound for the authentication server and sends it to the server
The client encapsulates the 802.1 X authentication traffic before sending it to the access point. This causes the access point...
The client encapsulates the 802.1 X authentication traffic before sending it to the access point. This causes the access point to forward it to the server.
Submit
View My Results
Related Quizzes
CCNA Subnetting Quiz Questions And Answers
CCNA Subnetting Quiz Questions And Answers
CCNA - OSPF Quiz Questions And Answers
CCNA - OSPF Quiz Questions And Answers
CCNA Quiz Exam: Hardest MCQ!
CCNA Quiz Exam: Hardest MCQ!
CCNA OSI Layer Exam Quiz
CCNA OSI Layer Exam Quiz
A Unique Quiz On CCNA – IPv6
A Unique Quiz On CCNA – IPv6
Ait CCNA 1 Network Fundamentals Rec Chapter 5
Ait CCNA 1 Network Fundamentals Rec Chapter 5
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (18)
Unanswered (
)
Answered (
)
Which standard provides the strongest level of WLAN security? (Source:...
What method does a WLAN use to control transmissions? (Source:...
Which regulatory agency controls the 801.11 standard that governs...
Which organization offers certification for interoperability between...
Which statement is true of a comparison between WP A and WP A2?...
Which three are the steps to secure a WLAN? (Choose three.) (Source:...
What is a rogue access point? (Source: Understanding WLAN Security)...
When you are implementing extended service areas, how much overlap is...
When implementing a WLAN, when should you use WEP? (Source:...
Which 802.11 standard transmits using the 5-GHz band? (Source:...
What is the most tangible benefit of wireless implementation? (Source:...
Which two of the 802.11 standards have the highest possible data...
Which statement is true about the Wi-Fi Alliance? (Source: Exploring...
Which three are the unlicensed bands used by WLANs? (Choose three.)...
What allows a client to communicate while moving? (Source:...
What factor determines which access point a client will associate...
Which three are basic wireless access point parameters? (Choose...
When using 802.IX, how is the client authenticated? (Source:...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement