SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Wireless Questions
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 25 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WPA2 uses which encryption method?
AES-CCMP
54Mpbs
Independent Basic Service Set (IBSS) is ad-hoc wireless
IEEE 802.11i
2. Which IEEE committee has been sanctioned by WPA and is called WPA2?
Changing the default SSID value and administrator password
IEEE 802.11i
Three
Block Acknowledgments
3. Describes the wireless security standard that WPA defines?
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
PEAP - EAP-FAST - Local-EAP
WPA - although using the same RC4 encryption that WEP uses - provides enhancements to the WEP protocol by using dynamic keys that change constantly - as well as providing a Pre-Shared Key method of authentication.
Independent Basic Service Set (IBSS) is ad-hoc wireless
4. A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless card. The client section of the access point does not list any active WLAN clients. What is a possible reason for this?
AES-CCMP
SSID
The SSID is configured incorrectly on the client.
5 GHz
5. You are connecting your access point and it is set to root. What does extended service set ID mean?
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
2.4 GHz
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
Extended service set ID means that you have more than one access point and they all are set to the same SSID and all are connected together in the same VLAN or distribution system so users can roam.
6. You have finished physically installing an access point on the ceiling of your office. At a minimum - which parameter must be configured on the access point in order to allow a wireless client to operate on it?
SSID
54 Mbps
Three
AES-CCMP
7. What device must be on your wired network when running an enterprise EAP solution?
5 GHz
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
RADIUS Server
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
8. What is the frequency range of IEEE 802.11g?
WEP & TKIP (WPA) use RC4 WPA2 uses AES
2.4 GHz
WPA - although using the same RC4 encryption that WEP uses - provides enhancements to the WEP protocol by using dynamic keys that change constantly - as well as providing a Pre-Shared Key method of authentication.
54 Mbps
9. The TKIP encryption is based on the...
SSID
RC4 algorithm
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
Changing the default SSID value and administrator password
10. What is the frequency range of IEEE 802.11a?
5 GHz
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
Independent Basic Service Set (IBSS) is ad-hoc wireless
WPA2 uses AES-CCMP for encryption. WPA uses TKIP.
11. Which two practices help secure the configuration utilities on wireless access points from unauthorized access?
PEAP - EAP-FAST - Local-EAP
Overlapping the wireless cell coverage by at least 10%
SSID
Changing the default SSID value and administrator password
12. A single 802.11g access point has been configured and installed in the center of a square-shaped office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What could likely be the caus
Cordless phone interference - antenna type or orientation - and metal filing cabinet reflection of the RF signal can all give rise to connectivity issues.
IEEE 802.11i
Block Acknowledgments
PEAP - EAP-FAST - Local-EAP
13. Which two features did WPA add to address the inherent weaknesses found in WEP?
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
2.4 GHz
11Mbps
14. What is the maximum data rate of IEE 902.11b?
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
11Mbps
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
WPA - although using the same RC4 encryption that WEP uses - provides enhancements to the WEP protocol by using dynamic keys that change constantly - as well as providing a Pre-Shared Key method of authentication.
15. What is the maximum data rate of IEEE 802.11g?
2.4 GHz
54Mpbs
AES-CCMP
Overlapping the wireless cell coverage by at least 10%
16. What are three basic parameters to configure on a wireless access point?
WPA - although using the same RC4 encryption that WEP uses - provides enhancements to the WEP protocol by using dynamic keys that change constantly - as well as providing a Pre-Shared Key method of authentication.
Cordless phone interference - antenna type or orientation - and metal filing cabinet reflection of the RF signal can all give rise to connectivity issues.
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
IEEE 802.11i
17. What is the frequency range of IEEE 802.11b?
SSID
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
Independent Basic Service Set (IBSS) is ad-hoc wireless
2.4 GHz
18. Which encryption type does WPA2 use? WPA?
WEP & TKIP (WPA) use RC4 WPA2 uses AES
54 Mbps
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
WPA2 uses AES-CCMP for encryption. WPA uses TKIP.
19. How many non-overlapping channels are available with 802.11b?
54 Mbps
Three
Extended service set ID means that you have more than one access point and they all are set to the same SSID and all are connected together in the same VLAN or distribution system so users can roam.
5 GHz
20. Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?
Overlapping the wireless cell coverage by at least 10%
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
54Mpbs
Cordless phone interference - antenna type or orientation - and metal filing cabinet reflection of the RF signal can all give rise to connectivity issues.
21. Name three EAP types that allow us to use wireless LANs in enterprise networks?
The SSID is configured incorrectly on the client.
PEAP - EAP-FAST - Local-EAP
RADIUS Server
Block Acknowledgments
22. Which two wireless encryption methods are based on the RC4 encryption algorithm?
RADIUS Server
Block Acknowledgments
WEP & TKIP (WPA) use RC4 WPA2 uses AES
1. Key mixing using temporal keys. 2. Per frame sequence counter. WPA uses Temporal Key Integrity Protocol (TKIP) - which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames.
23. What is the maximum data rate for the 802.11a standard?
11Mbps
54 Mbps
RC4 algorithm
WPA - although using the same RC4 encryption that WEP uses - provides enhancements to the WEP protocol by using dynamic keys that change constantly - as well as providing a Pre-Shared Key method of authentication.
24. Two workers have established wireless communication directly between their wireless laptops. What type of wireless topology has been created by these employees?
Independent Basic Service Set (IBSS) is ad-hoc wireless
IEEE 802.11i
WPA2 uses AES-CCMP for encryption. WPA uses TKIP.
PEAP - EAP-FAST - Local-EAP
25. Which feature of 802.11n provides MAC efficiency?
2.4 GHz
Block Acknowledgments
The three basic parameters to configure when setting up an access point are the SSID - the RF channel - and the authentication method.
PEAP - EAP-FAST - Local-EAP