You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Select and place the authentication method you are required to configure to implement the security policy of the company.
Select and Place:
John is a WLAN engineer hired to perform a predictive analysis site survey for a 180,000 squarefoot building. This building space includes small walled offices and cubicles. If John performs a predictive site survey instead of a manual site survey, what advantages does he get?Each correct answer represents a complete solution. Choose all that apply.
A. A predictive site survey is the most accurate method available to him.
B. His amount of time consumed for accurate results in a predictive site survey is much less than a complete manual site.
C. A predictive site survey will allow him to model different scenarios.
D. He will be able to determine the interference values of any obstacles.
What does a protocol analyzer do during a manual site survey?
A. Execute an RF analysis of an area.
B. Describe wireless LAN security requirements.
C. Identify existing wireless networks in an area.
D. Locate RF interference sources.
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
A. His laptop is incompatible.
B. A firewall is blocking him.
C. MAC filtering is blocking him.
D. His operating system is incompatible.
Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?
A. Mac Filtering
B. A Firewall
C. WPA encryption
D. WEP encryption
What percentage of the total area of the Fresnel zone must be clear of obstacles in order to have RF line of sight?
A. 40
B. 60
C. 50
D. 72
In an IEEE 802.1x secure network, what does the term authenticator identify?
A. The RAS server
B. The access point
C. The RADIUS server
D. The client device
Which of the following is an Institute of Electrical and Electronics Engineering (IEEE) specification that defines standards for Ethernet?
A. 802.5
B. 802.4
C. 802.12
D. 802.3
The IEEE 802.11b wireless standard uses GHz frequency band.
A. 5.0
B. 8.6
C. 7.4
D. 2.4
Which of the following reasons may be the cause of a client's exclusion?
A. The client has failed 802.11 association four times.
B. The client has passed three web authentication attempts.
C. The client has failed 802.11 authentication seven times.
D. The client has failed 802.1x authentication three times.