CompTIA Network+ Practice Tests. Craig Zacker
Читать онлайн книгу.wireless network devices to IEEE 802.11n.Configure all of the network devices to use WPA2 encryption with AES.Configure the wireless devices to use the 5 GHz band.Configure the AP to suppress SSID broadcasts.Upgrade all of the network devices to the latest firmware.
146 Which of the following is the fastest speed achievable by a wireless LAN using the currently ratified IEEE 802.11 standards?54 Mbps600 Mbps1.3 Gbps2.6 Gbps
147 What is the term for the technology implemented in the IEEE 802.11ac standard that enables a wireless device to transmit multiple frames to multiple clients simultaneously?MIMOChannel bondingCSMA/CAMU-MIMO
148 On an IEEE 802.11b/g/n wireless network running at 2.4 GHz with multiple Access Points (APs), the traditional best practice is to use channels 1, 6, and 11, with no two adjacent APs configured to use the same channel. Which of the following is the real reason why this is a good plan?Channels 1, 6, and 11 are the only channels with frequencies that do not overlap.Channels 1, 6, and 11 have more bandwidth than the other channels.Channels 1, 6, and 11 have greater ranges than the other channels.Channels 1, 6, and 11 are the default settings on most wireless devices.
149 Ralph is planning a wireless LAN installation for a warehouse with two offices at either end of the building, approximately 300 feet apart. If he installs a single Access Point (AP) in the center of the warehouse, equidistant from the two offices, which of the following standards should he look for when purchasing hardware so that workstations in both offices will be able to connect to the network at the best possible speed?IEEE 802.11aIEEE 802.11gIEEE 802.11nIEEE 802.11ac
150 Which of the following terms defines a wireless LAN transmission technique in which devices use multiple antennae to increase transmission speeds?MIMOTDMAPANAnt+
151 What is the maximum channel width possible using wireless networking equipment based on the ratified IEEE 802.11 regulatory standards?20 MHz40 MHz80 MHz160 MHz
152 Which of the following wireless networking standards are capable of using only the 5 GHz frequency? (Choose all that apply.)IEEE 802.11aIEEE 802.11bIEEE 802.11gIEEE 802.11nIEEE 802.11ac
153 Which of the following IEEE wireless LAN standards provides the greatest possible throughput?802.11a802.11ac802.11b802.11g802.11n
154 Which of the following IEEE 802.11 wireless LAN standards are capable of supporting both the 2.4 GHz and 5 GHz frequencies?802.11a802.11b802.11g802.11n802.11ac
155 What is the maximum number of transmit and receive antennae supported by the currently ratified IEEE 802.11 wireless LAN standards?24816
156 Which of the following is the term for the network name that you use to connect a client device to an Access Point (AP) on a wireless LAN?BSSESSSSIDBSSID
157 Which of the following IEEE wireless LAN standards define devices with a maximum aggregate channel width of 20 MHz? (Choose all that apply.)802.11a802.11g802.11n802.11ac
158 At which layer of the Open Systems Interconnection (OSI) model do wireless range extenders operate?PhysicalData linkNetworkTransportSessionPresentationApplication
159 Which of the following wireless security protocols provides the greatest degree of network device hardening?WEPWPAWPA2EAP
160 Which of the following encryption protocols was introduced in the WiFi Protected Access (WPA) wireless security standard?CCMP-AESTKIP-RC4EAP-TLSTACACS+
161 TKIP-RC4 is an encryption protocol used with which of the following wireless network security standards?WEPWPAWPA2EAP
162 Which of the following protocols provides wireless networks with the strongest encryption?AESTKIPEAP802.1X
163 When the WiFi Protected Access (WPA) wireless security protocol was released to replace Wired Equivalent Privacy (WEP), it included the Temporal Key Integrity Protocol (TKIP) for encryption. Which of the following is not one of the improvements that WPA and TKIP provide over WEP?TKIP enlarges the WEP encryption key.TKIP modifies the encryption key for every packet.WPA does not require a hardware upgrade for WEP devices.TKIP eliminates the use of Pre-Shared Keys (PSKs).
164 To connect a wireless client to a Wireless Access Point (WAP) using the WiFi Protected Access II (WPA2) security protocol with a Pre-Shared Key (PSK), which of the following must you supply on both devices?Base keyPassphraseSerial numberMAC address
165 Upgrading a wireless network from the Wired Equivalent Privacy (WEP) security protocol to WiFi Protected Access (WPA) enables it to use the Temporal Key Integrity Protocol (TKIP) for encryption, which generates a unique key for each packet. Which of the following types of attacks does this capability prevent?Denial-of-Service (DoS) attacksBrute-force attacksReplay attacksDeauthentication attacks
166 Which of the following wireless security protocols uses CCMP-AES for encryption?WEPWPAWPA2TKIP
167 Which of the following was the first wireless LAN security protocol to come into common usage?WEPWPAWPA2TKIP
168 Which of the following did the second version of the WiFi Protected Access (WPA) protocol add to the standard?CCMP-AESMIMOWEPTKIP
169 You are setting up a wireless LAN in a friend's home, using devices that conform to the IEEE 802.11g standard. You have installed and successfully tested the devices on an open network, and now you are ready to add security. Which of the following protocols should you choose to provide maximum security for the wireless network?WEPWPA2IPsecTLSL2TP
170 CCMP-AES is an encryption protocol used with which of the following wireless network security standards?WEPWPAWPA2EAP
171 Which of the following encryption protocols was introduced in the WiFi Protected Access II (WPA2) wireless security standard?CCMP-AESTKIP-RC4EAP-TLSTACACS+
172 Which of the following wireless security protocols can enable network users to authenticate using smartcards?WEPWPA2EAPAES
173 Which of the following forms of the WiFi Protected Access (WPA) and WPA2 protocols require a RADIUS server? (Choose all that apply.)WPA-PersonalWPA-PSKWPA-EnterpriseWPA-802.1X
174 Which of the following forms of the WiFi Protected Access (WPA) and WPA2 protocols call for the use of a Pre-Shared Key (PSK)?WPA-PersonalWPA-EnterpriseWPA-EAPWPA-802.1X
175 Which of the following stream ciphers does the Temporal Key Integrity Protocol (TKIP) use for encryption on a wireless network?RC4AESCCMPSHA
176 Which of the following wireless security protocols uses CCMP for encryption?WEPWPAWPA2802.1X
177 CCMP is based on which of the following encryption standards?TKIPRC4AES802.1X
178 You have installed a new Wireless Access Point (WAP) on your network and configured it to use an SSID that is not broadcasted and WPA2 for security. Which of the following describes what you must do to configure your wireless clients?Select the SSID from a list and allow the client to automatically detect the security protocol.Select the SSID from a list and then select WPA2 from the security protocol options provided.Type the SSID manually and allow the client to automatically detect the security protocol.Type the SSID manually and then select WPA2 from the security protocol options provided.
179 Which of the following wireless LAN security protocols was rendered obsolete after it was found to be extremely easy to penetrate?WEPWPAWPA2EAP
180 Which of the following protocols does the WiFi Protected Access (WPA) security protocol use for encryption?AESTKIPMD5SHA
181 Which of the following wireless network security protocols provides open and shared key authentication options?WPAWEPWPA2EAP
182 Which of the following wireless security protocols uses TKIP for encryption?WEPWPAWPA2AES
183 Which of the following is not a factor that weakens the security of the Wired Equivalent Privacy (WEP) protocol used on early IEEE 802.11 wireless LANs?40-bit encryption keys24-bit initialization vectorsStatic shared secretsOpen System Authentication
184 Which of the following encryption ciphers was replaced by CCMP-AES when the WPA2 wireless security protocol was introduced?EAPWEPTKIPCCMP
185 Which of the following wireless security protocols was substantially weakened by its initialization vector?WPAWEPWPA2PEAP
186 Ralph