Deck 10: Managing a Wireless LAN
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Managing a Wireless LAN
1
Information security weaknesses can never be entirely eliminated.
True
2
What is another name for propagation loss?
A) transmission loss
B) effective loss
C) free space loss
D) signal loss
A) transmission loss
B) effective loss
C) free space loss
D) signal loss
C
3
In the Windows operating system, what window provides basic tools for monitoring a WLAN?
A) Wireless Adapter Information
B) Wireless Network Connection Status
C) Access Point Utilities
D) Network Monitor
A) Wireless Adapter Information
B) Wireless Network Connection Status
C) Access Point Utilities
D) Network Monitor
B
4
Almost all WLAN vendors provide utilities to assist in monitoring the wireless network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ attenuators are the only type permitted by the FCC for WLAN systems.
A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a nonvolatile storage chip used in computers and other devices.
A) Firmware
B) SNMP
C) RMON
D) EEPROM
A) Firmware
B) SNMP
C) RMON
D) EEPROM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ antenna is most typically used on a WLAN.
A) panel
B) rod
C) sectorized
D) beam steering
A) panel
B) rod
C) sectorized
D) beam steering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
What information is required for a link budget?
A) power of the transmitter
B) path length
C) frequency of the link
D) All of the above
A) power of the transmitter
B) path length
C) frequency of the link
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.
A) bidirectional
B) pre-injection
C) unidirectional
D) internal
A) bidirectional
B) pre-injection
C) unidirectional
D) internal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A wireless network is a static system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.
A) donut
B) horizontal
C) plain
D) azimuth
A) donut
B) horizontal
C) plain
D) azimuth
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
What is the last step in RF site tuning?
A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
What tool(s) are used most often as "standard" network monitoring tools?
A) AP Monitor and Simple Network Management Protocol
B) WLAN Logger and Remote Monitoring
C) Simple Network Management Protocol and Remote Monitoring
D) All of the above
A) AP Monitor and Simple Network Management Protocol
B) WLAN Logger and Remote Monitoring
C) Simple Network Management Protocol and Remote Monitoring
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The current version of SNMP (____) addresses security and remote configuration.
A) v1
B) v2
C) v3
D) v4
A) v1
B) v2
C) v3
D) v4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
For a proper WLAN performance, the link budget must be ____ dB.
A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Which type of RF loss is caused by the equipment itself, not external objects?
A) Refraction
B) Scattering
C) Voltage Standing Wave Ratio
D) Absorption
A) Refraction
B) Scattering
C) Voltage Standing Wave Ratio
D) Absorption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.
A) multicast
B) unicast
C) broadcast
D) netcast
A) multicast
B) unicast
C) broadcast
D) netcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.
A) manual
B) event
C) network
D) AP
A) manual
B) event
C) network
D) AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ is software that is embedded into hardware to control the device.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.
A) major
B) catastrophic
C) significant
D) small impact
A) major
B) catastrophic
C) significant
D) small impact
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.
A) Physical
B) Practical
C) Hardware
D) Social
A) Physical
B) Practical
C) Hardware
D) Social
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
When conducting a security audit, ____ should determine vulnerabilities.
A) a highly-paid consultant
B) a wireless system administrator employed by the company
C) a junior administrator
D) a team with diverse backgrounds
A) a highly-paid consultant
B) a wireless system administrator employed by the company
C) a junior administrator
D) a team with diverse backgrounds
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Many enterprise-level access points provide utilities that offer three types of information. What are they?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe three RF tuning settings.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
What is an RF amplifier?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
There are several factors that may result in RF loss. What are they?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A radio frequency link between the sender and receiver consists of three basic elements. What are they?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What is Remote Monitoring?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Describe a sectorized antenna.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The first step in creating a security policy is ____.
A) risk assessment
B) security auditing
C) impact analysis
D) documentation
A) risk assessment
B) security auditing
C) impact analysis
D) documentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What technique(s) is/are most effective for defeating social engineering attacks?
A) physical and software security
B) documentation
C) education and policies
D) undercover work by network administrators
A) physical and software security
B) documentation
C) education and policies
D) undercover work by network administrators
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
In order to use SNMP, a software ____________________ is loaded onto each network device that will be managed using SNMP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.
A) RF attenuator
B) splitter
C) lightning arrestor
D) phase modulator
A) RF attenuator
B) splitter
C) lightning arrestor
D) phase modulator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the factors that should be considered in determining the relative value of assets?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
When creating a functional (working) security policy, there are several elements that should be considered. Describe them.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck