Preview

802.11 Fundamentals: Sub-Objective Name Technology Fundamentalss

Satisfactory Essays
Open Document
Open Document
1570 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
802.11 Fundamentals: Sub-Objective Name Technology Fundamentalss
3.1
Sub-Objective Name Technology Fundamentals
Objective Tested Describe 802.11 fundamentals Bloom Level 1
Question Stem Two users want to connect using a wireless network directly without using a production wireless network. Which of the following 802.11 standard wireless networks allows this type of connectivity?
Options (A) IBSS (B) BSS (C) ESS (D) WPAN (E)
Correct Answer(s) A
Explanation

The 802.11 IBSS standard allows two or more wireless clients to communicate directly with each other, considering there is no other means of network connectivity. This is also known as ad hoc wireless network.

2.1
Sub-Objective Name Technology Fundamentals
Objective Tested Describe basic Wi-Fi governance Bloom Level 2
Question Stem Which of the following is the
…show more content…
Options (A) An X.509 certificate is preinstalled in each device when it is purchased, which allows authentication of the AP to the WLC. (B) Each AP must authenticate with the WLC based on the MAC address pre-configured on the WLC. (C) The WLC must be configured to authenticate each AP based on RSA certificates installed on them. (D) The AP must authenticate with the WLC using a preconfigured password. (E)
Correct Answer(s) A
Explanation

The method introduced into the network is pre-installation of an X.509 certificate in each device when it is purchased, which allows authentication of the AP to the WLC. Every LAP and WLC must also authenticate each other with digital certificates. By using certificates behind the scenes, every device is properly authenticated before becoming part of the wireless network. This process helps assure that no rogue non-CAPWAP AP can be introduced into the

You May Also Find These Documents Helpful

  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Wi-Fi wireless networks support ad hoc connections between devices. Ad hoc Wi-Fi networks are pure peer to peer compared to those utilizing wireless routers as an intermediate device.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ is a free stumbler application for Mac OS X that puts the computer’s wireless card into monitor mode.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    3. E-commerce involves the passing of sensitive information like credit card numbers or bank account numbers over the internet, and the risk of losing the privacy of this information is high in public places. –Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. –Evil twin hotspots: these are hotspots setup by a hacker and made available to the public. Unknowing users who connect to the intent using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSl encrypted and look for a valid security certificate.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    In order to properly authenticate on the wireless network, you must agree and sign the ITT Wireless Network Release Form. You can acquire this form from your local System Support Technician.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    IEEE 802.15 deals with the subject of Wireless personal area networks (WPANs) which includes standards for Bluetooth, co-existence of WPANs with other wireless devices, high-rate and low-rate WPANs, and mesh networking.…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will use WPA2 authentication for all wireless devices. WPA2 is important as it can be configured for any device including phones and wireless printers…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Wireless Networks

    • 1176 Words
    • 5 Pages

    your response to the following: Imagine you are the network administrator of aWLAN. Give an example of how knowing the 10’s and 3’s Rules of RF Math can helpyou on the job. Include your answers to Case Project 3-5 in your response. Show your work…

    • 1176 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Remote Access

    • 496 Words
    • 2 Pages

    This two part authentication process would be added to every access point either remotely or locally by any and all employees within Richman Investments. I’ve had to use this device in several of my customer service positions because there was always sensitive information that I didn’t need to see and if there was nothing in place to prevent me…

    • 496 Words
    • 2 Pages
    Good Essays