NCTI Final Exam: Progression Field Tech 2- 3 Exam| 2023/ 2024 Update| Verified Questions and Answers
1. How might you confirm the presence of a hidden
... [Show More] node on the network
Answer: Turn on the request to send/clear to send (RTS/CTS) protocol and watch for increased network data throughput
2. Which one of the following conditions occurs when an access point (AP) receives a distant client's signal at a lower power level than that of a nearer client
Answer: Near/ Far
3. Which one of the following tasks is the best choice for troubleshooting the near/ far problem
Answer: Review the location of the stations(clients) on the network
4. You wish to build a wireless network that provides significantly better throughput than a single IEEE 802.11b access point (AP) Which of the following is an acceptable solution
Answer: Use IEEE 802.11 compliant equipment operating in the 5 GHz U-NII bands, allowing for more non-overlapping channels
5. What test instrument is used to locate and measure interfering narrowband radio frequency (RF) signals in an IEEE 802.11 wireless local area network (WLAN) among other things
Answer: A spectrum analyzer
6. What causes co-channel interference in a wireless local area network (WLAN)
Answer: An overlap in the signal ranges of access points (AP) or different WLANS operating on the same channels
7. What are the three main conditions that influence the range of a wireless local area network (WLAN)
Answer: Transmission power, antenna type and location, and environment
8. What can be done to increase the coverage area of a wireless local area network (WLAN)
Answer: Increase the transmission power, replace the omnidirectional antenna with a parabolic antenna, and use the 2.4 GHz radio band instead of the 5 GHz radio band
9. What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use?
Answer: 24 Bit
10. How can filtering augment some of the security limitations of (WEP) in a (WLAN)
Answer: By defining parameters to which client stations must adhere in order to gain access to the network
11. Which term describes a wireless system in which the (AP) removes the (WLAN) (SSID) from the beacon frames
Answer: Closed System
12. (WLAN) that use an IEEE 802.1x protocol control network access on what basis
Answer: Port Based
13. Ap must support what encryption techniques in order to comply with IEEE 802.11i security standards
Answer: TKIP, AES, and AES-CCMP(Counter-Mode/CBC-MAC Protocol)
14. What is a main-in-the-middle attack on a WLAN
Answer: A situation in which a hacker uses an AP to effectively hijack mobile nodes(clients) by sending a stronger signal than the legitimate AP is sending
15. What type of wireless local area network (WLAN) attack could cost an employee their job because network usage logs point directly to the employee whenever a hacker gains access to the employee's domain login information and causes havoc on the network?
Answer: A passive attack
16. How might a wireless local area network (LAN) administrator ensure compliance with security audits? [Show Less]