Podcast
Questions and Answers
Which of the following is used on a wireless network to identify the network name?
Which of the following is used on a wireless network to identify the network name?
Which of the following is generated after a site survey and shows the Wi-Fi signal strength throughout the building?
Which of the following is generated after a site survey and shows the Wi-Fi signal strength throughout the building?
You need to implement a wireless network link between two buildings on a college campus. Which type of wireless antenna should you use on each side of the link? (Select two.)
You need to implement a wireless network link between two buildings on a college campus. Which type of wireless antenna should you use on each side of the link? (Select two.)
Where should you install the wireless LAN controller (WLC)?
Where should you install the wireless LAN controller (WLC)?
Signup and view all the answers
Which type of wireless access point is generally used in a residential setting?
Which type of wireless access point is generally used in a residential setting?
Signup and view all the answers
Which device would you most likely use to manage multiple access points in your organization?
Which device would you most likely use to manage multiple access points in your organization?
Signup and view all the answers
Which device would you use to perform a site survey?
Which device would you use to perform a site survey?
Signup and view all the answers
Which type of site surveys should be performed first?
Which type of site surveys should be performed first?
Signup and view all the answers
What is responsible for broadcasting information and data over radio waves?
What is responsible for broadcasting information and data over radio waves?
Signup and view all the answers
Which class of wireless access point (WAP) has everything necessary to manage clients built into its functionality?
Which class of wireless access point (WAP) has everything necessary to manage clients built into its functionality?
Signup and view all the answers
What sends unsolicited business cards and messages to a Bluetooth device?
What sends unsolicited business cards and messages to a Bluetooth device?
Signup and view all the answers
What best describes Bluesnarfing?
What best describes Bluesnarfing?
Signup and view all the answers
Which type of interference is caused by motors, heavy machinery, and fluorescent lights?
Which type of interference is caused by motors, heavy machinery, and fluorescent lights?
Signup and view all the answers
What best describes an evil twin?
What best describes an evil twin?
Signup and view all the answers
Which type of attack is WEP extremely vulnerable to?
Which type of attack is WEP extremely vulnerable to?
Signup and view all the answers
What type of attack are you most likely experiencing if clients complain about short bursts of high-intensity RF signals interfering with your wireless network signal?
What type of attack are you most likely experiencing if clients complain about short bursts of high-intensity RF signals interfering with your wireless network signal?
Signup and view all the answers
What type of attack is being executed if an attacker has intercepted NFC data and is masquerading as the original device?
What type of attack is being executed if an attacker has intercepted NFC data and is masquerading as the original device?
Signup and view all the answers
Which type of RFID tag can send a signal over a long distance?
Which type of RFID tag can send a signal over a long distance?
Signup and view all the answers
What type of security risk is present if an employee connects a wireless access point to the network in an unauthorized manner?
What type of security risk is present if an employee connects a wireless access point to the network in an unauthorized manner?
Signup and view all the answers
What should you do if you are concerned that wireless access points may have been deployed without authorization? (Select two.)
What should you do if you are concerned that wireless access points may have been deployed without authorization? (Select two.)
Signup and view all the answers
What should you do to connect a laptop to a wireless network using WPA2-Personal and a pre-shared key?
What should you do to connect a laptop to a wireless network using WPA2-Personal and a pre-shared key?
Signup and view all the answers
What is the most secure method for adding security to your wireless network?
What is the most secure method for adding security to your wireless network?
Signup and view all the answers
What value uniquely identifies the network access point (AP) when configuring it?
What value uniquely identifies the network access point (AP) when configuring it?
Signup and view all the answers
What should you implement to provide guests with a login page when they initially connect to the wireless network?
What should you implement to provide guests with a login page when they initially connect to the wireless network?
Signup and view all the answers
Which EAP implementation is most secure?
Which EAP implementation is most secure?
Signup and view all the answers
Which method do switches and wireless access points use to control access through a device?
Which method do switches and wireless access points use to control access through a device?
Signup and view all the answers
Where would you configure passwords used for authentication with 802.1x on your wireless network?
Where would you configure passwords used for authentication with 802.1x on your wireless network?
Signup and view all the answers
What should you do to configure the new 802.11g wireless network while using Active Directory? (Select two.)
What should you do to configure the new 802.11g wireless network while using Active Directory? (Select two.)
Signup and view all the answers
What should you do to prevent unauthorized users from using the access point (AP) configuration utility?
What should you do to prevent unauthorized users from using the access point (AP) configuration utility?
Signup and view all the answers
What components should be part of your design for configuring a wireless network using WPA2-Enterprise? (Select two.)
What components should be part of your design for configuring a wireless network using WPA2-Enterprise? (Select two.)
Signup and view all the answers
Study Notes
Wireless Network Fundamentals
- SSID (Service Set Identifier) is the name used to identify a wireless network.
- Heat map depicts Wi-Fi signal strength across a location and is created after site surveys.
Wireless Antennas and Links
- High-gain and parabolic antennas are recommended for creating a wireless link between two buildings 100 meters apart.
WLAN Components and Installation
- A wireless LAN controller (WLC) should be installed in a secure location, such as a network closet.
- SOHO (Small Office/Home Office) access points are commonly used in residential environments.
Access Point Management
- To manage multiple access points effectively in an organization, implement a WLC.
- Use a Wi-Fi analyzer for conducting site surveys.
Types of Site Surveys
- The passive site survey should be conducted first to gather information without actively probing the network.
Wireless Communication Devices
- A wireless access point is responsible for transmitting information and data via radio waves.
- Fat access points contain all necessary features to manage clients and broadcast the network.
Bluetooth Security Vulnerabilities
- Bluejacking involves sending unsolicited messages to a Bluetooth device.
- Bluesnarfing refers to unauthorized viewing of data such as emails and messages on another person's device.
Sources of Interference
- EMI (Electromagnetic Interference) is created by motors, heavy machinery, and fluorescent lights.
- Evil twin refers to a rogue access point designed to deceive users by mimicking a legitimate one.
Wireless Security Threats
- WEP (Wired Equivalent Privacy) is highly susceptible to an IV (Initialization Vector) attack.
- Jamming is likely occurring if there are bursts of high-intensity RF signals disrupting the wireless network.
NFC and RFID Attacks
- A relay attack involves intercepting NFC data to impersonate a legitimate device.
- Active RFID tags can transmit signals over long distances.
Rogue Devices and Network Security
- A rogue access point presents a significant security risk when unauthorized devices connect to the network.
- To identify rogue access points, check MAC addresses of connected devices and conduct a thorough site survey.
Secure Wireless Connections
- Configure the connection to a hidden SSID using a pre-shared key and AES encryption for the strongest security.
- Implement WPA2 to add robust security to your wireless network.
Access Point Configuration
- The SSID uniquely identifies a wireless access point and is crucial for successful manual configuration.
- A captive portal can be used to restrict guest internet access, requiring verification via a code provided during check-in at hotels.
EAP (Extensible Authentication Protocol)
- EAP-TLS is recognized as the most secure implementation of EAP.
Access Control Mechanisms
- MAC address filtering is a common method used by switches and wireless access points to control access.
- For 802.1x authentication, passwords must be configured on a RADIUS server.
Transitioning to Wireless
- When replacing a wired network with an 802.11g wireless network, utilize RADIUS servers and 802.1x authentication to secure the network.
- Ensure devices in the wireless environment are operating in infrastructure mode.
Access Point Security
- Protect access point configuration utilities by changing the administrative password after installation.
WPA2-Enterprise Configuration
- For a WPA2-Enterprise wireless network, ensure inclusion of both 802.1x authentication and AES encryption in the design.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on wireless networking concepts with these flashcards from Chapter 8. Explore key terms like SSID and heat maps that are crucial for understanding wireless network implementation and signal strength analysis. Perfect for students and professionals looking to reinforce their understanding of wireless technology.