Your customer reports he just bought a new laptop and he cannot log on to his wireless router with it. You verify the wireless NIC is working, you can see the wireless routers network, and you verify the customer is using the correct username and password. What is the most likely cause of this problem?
A. The router has a virus.
B. His new laptop is not compatible with the router.
C. MAC filtering is enabled.
D. The router has maximum connections now.
Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?
A. DES
B. WEP
C. PKI
D. WAP
Which of the following network standards is used in wireless networks?
A. 802.4
B. 802.11
C. 809.5
D. 802.3
Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?
A. Mac Filtering
B. A Firewall
C. WPA encryption
D. WEP encryption
You work as a Network Administrator for Infonet Inc. The company's office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
A. Internet service provider's DNS server address
B. Service Set Identifier
C. I/O address
D. Demilitarized zone
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Implement the open system authentication for the wireless network.
B. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
C. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.
D. Implement the IEEE 802.1X authentication for the wireless network.
E. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.
What percentage of the total area of the Fresnel zone must be clear of obstacles in order to have RF line of sight?
A. 40
B. 60
C. 50
D. 72
How many characters is the maximum limit of a service set identifier (SSID)?
A. 64
B. 16
C. 18
D. 32
Which of the following organizations provides the certification for interoperability of wireless products?
A. Wi-Fi
B. Wi-MAX
C. FCC
D. IEEE
What should be the separation between two channels of the 2.4 GHz ISM band in order to be considered non-overlapping?
A. 25 MHz
B. 15 MHz
C. 20 MHz
D. 5 MHz