WLAN Configuration
Assessment
•
Alicia Pierce
•
Science
•
11th Grade
•
22 plays
•
Medium
Improve your activity
Higher order questions
Match
•
Reorder
•
Categorization
actions
Add similar questions
Add answer explanations
Translate quiz
Tag questions with standards
More options
14 questions
Show answers
1.
Multiple Choice
A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?
Configure encryption on the wireless router and the connected wireless devices.
Disable the wireless network SSID broadcast.
Change the default user-name and password of the wireless router.
Enable MAC address filtering on the wireless router.
Answer explanation
The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network.
2.
Multiple Choice
Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?
NAT
QoS
DNS
DHCP
Answer explanation
Many wireless routers have an option for configuring quality of service (QoS). By configuring QoS, certain time-sensitive traffic types, such as voice and video, are prioritized over traffic that is not as time-sensitive, such as email and web browsing.
3.
Multiple Choice
A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?
Require all wireless devices to use the 802.11n standard.
Check and keep the firmware of the wireless router updated.
Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.
Add a Wi-Fi range extender to the WLAN and set the AP and the range extender to serve different bands.
Answer explanation
By default, dual-band routers and APs use the same network name on both the 2.4 GHz band and the 5 GHz band. The simplest way to segment traffic is to rename one of the wireless networks.
4.
Multiple Choice
A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?
Change the SSID.
Configure devices to use a different channel.
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Update the firmware on the new router.
Answer explanation
Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band will allow for the 802.11n to use the two bands as two separate wireless networks to help manage the traffic, thus improving wireless performance.
5.
Multiple Choice
A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?
AAA
NAT
SNMP
RADIUS
Answer explanation
Remote Authentication Dial-In User Service (RADIUS) is a protocol and server software that provides user-based authentication for an organization. When a WLAN is configured to use a RADIUS server, users will enter username and password credentials that are verified by the RADIUS server before allowing to the WLAN.
6.
Multiple Select
Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)
SSID
AP password
antenna frequency
wireless beacon time
wireless network password
Explore this activity with a free account
Find a similar activity
Create activity tailored to your needs using
Computer Architecture Practice Test
•
9th - 12th Grade
Information Transfer
•
4th Grade
Information Technologies Review
•
4th Grade
Signals, Communication and Technology
•
6th - 8th Grade
Introduction to Cybersecurity
•
7th - 8th Grade
Ocean Sediments
•
11th - 12th Grade
Information Technology
•
4th Grade
Renewable Energy
•
11th - 12th Grade