ITN 101: MODULE 6 TEST QUESTIONS WITH ACCURATE
SOLUTIONS
1) Which of the following will help you to determine an AP arrangement that will
ensure reliable wireless connectivity? -- Answer ✔✔ Site survey
2) Which of the following devices will help users to adjust temperature settings based
on daily schedules in response to voice commands? -- Answer ✔✔ Smart thermostat
3) What is the service that offers a central authentication point for wireless, mobile,
and remote users called? -- Answer ✔✔ RADIUS
4) Victor has been recently added to the network engineers' team at Yakuza Infinity.
Which of the following methods must he know to understand how filtering prevents
the AP from authenticating any device whose MAC address is not listed by the
network administrator? -- Answer ✔✔ MAC filtering
5) What is the frequency range for Bluetooth communication? -- Answer ✔✔ 2.4 GHz-
2.4835 GHz
, 6) Which wireless technology is used to track fitness activity levels and geographic
movement? -- Answer ✔✔ ANT+
7) You have been appointed as the network administrator in Well Brew Ltd. The WPS
(Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent
problem highlighted that the PIN can be easily cracked through a brute force attack,
which means simply trying numerous possible character combinations to find the
correct combination. Which of the following attacks have you most likely
encountered? -- Answer ✔✔ WPS attack
8) Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job
requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible
Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-
key infrastructure) certificates to exchange public keys. Analyze which of the
following steps Quinton should follow under these circumstances. -- Answer ✔✔
Use the EAP-TLS encryption to protect communications
9) James has been contracted to set up a wireless network for a supermarket. The IT
department of the supermarket wants James to develop a mesh network of APs in
order to offer customers Internet access and selective discount coupons. James has
decided that he will have to add additional security options for this purpose. Analyze
which of the following will help James fix the issue. -- Answer ✔✔ Use Geofencing
security technique
10) Which of the following versions of EAP (Extensible Authentication Protocol) uses
PKI (public-key infrastructure) certificates to exchange public keys and authenticate
both the supplicant and the server? -- Answer ✔✔ EAP-TLS
11) You have been working as a network engineer for Flaming Systems and Solutions. An
existing client of your organization has requested you to set up a network for a new
joint wherein a user will have to agree to a certain set of terms and conditions
SOLUTIONS
1) Which of the following will help you to determine an AP arrangement that will
ensure reliable wireless connectivity? -- Answer ✔✔ Site survey
2) Which of the following devices will help users to adjust temperature settings based
on daily schedules in response to voice commands? -- Answer ✔✔ Smart thermostat
3) What is the service that offers a central authentication point for wireless, mobile,
and remote users called? -- Answer ✔✔ RADIUS
4) Victor has been recently added to the network engineers' team at Yakuza Infinity.
Which of the following methods must he know to understand how filtering prevents
the AP from authenticating any device whose MAC address is not listed by the
network administrator? -- Answer ✔✔ MAC filtering
5) What is the frequency range for Bluetooth communication? -- Answer ✔✔ 2.4 GHz-
2.4835 GHz
, 6) Which wireless technology is used to track fitness activity levels and geographic
movement? -- Answer ✔✔ ANT+
7) You have been appointed as the network administrator in Well Brew Ltd. The WPS
(Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent
problem highlighted that the PIN can be easily cracked through a brute force attack,
which means simply trying numerous possible character combinations to find the
correct combination. Which of the following attacks have you most likely
encountered? -- Answer ✔✔ WPS attack
8) Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job
requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible
Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-
key infrastructure) certificates to exchange public keys. Analyze which of the
following steps Quinton should follow under these circumstances. -- Answer ✔✔
Use the EAP-TLS encryption to protect communications
9) James has been contracted to set up a wireless network for a supermarket. The IT
department of the supermarket wants James to develop a mesh network of APs in
order to offer customers Internet access and selective discount coupons. James has
decided that he will have to add additional security options for this purpose. Analyze
which of the following will help James fix the issue. -- Answer ✔✔ Use Geofencing
security technique
10) Which of the following versions of EAP (Extensible Authentication Protocol) uses
PKI (public-key infrastructure) certificates to exchange public keys and authenticate
both the supplicant and the server? -- Answer ✔✔ EAP-TLS
11) You have been working as a network engineer for Flaming Systems and Solutions. An
existing client of your organization has requested you to set up a network for a new
joint wherein a user will have to agree to a certain set of terms and conditions