CWNA Wireless Network Administrator - Question List

Select how would you like to study

61. Which of the following information on a wireless LAN is encrypted and WEP-enabled?
  1. The MAC addresses of the frame
  2. Beacon management frames
  3. The data payload of the frame
  4. Shared Key challenge plaintext
62. Which of the following are the three types of filtering that can be performed on a wireless LAN?
  1. MAC address, manufacturer hardware, and SSID filtering
  2. Protocol, SSID, and WEP filtering
  3. SSID, MAC address, and Protocol filtering
  4. WEP, 802.11 standard, and manufacturer hardware filtering
63. Why is SSID filtering not considered a secure form of access control?
  1. SSID is uni-casted in the clear to every access point beacon by default.
  2. The SSID of a wireless LAN client must match the SSID on the access point in order for the client to authenticate and associate to the access point.
  3. SSID of a network can be easily found out using a protocol analyzer.
  4. SSID encryption is easy to decrypt using freeware utilities.
64. Which of the following is the best solution to mitigate a jamming attack?
  1. Use a spectrum analyzer to locate the RF source and then remove it.
  2. Increase the power on the wireless LAN to overpower the jamming signal.
  3. Shut down the wireless LAN segment and wait for the jamming signal to dissipate.
  4. Arrange for the FCC to shut down the jamming signal’s transmitter.
65. Why should access points be connected to switches instead of hubs?
  1. Hubs are faster than switches and can handle high-utilization networks.
  2. Hubs are full duplex and switches are only half duplex.
  3. Hubs are broadcast devices and pose an unnecessary security risk.
  4. Access points are not capable of full-duplex mode.

Select how would you like to study