The IT Certification Resource Center

Featured Deal

Get CompTIA, Cisco, and Microsoft training courses free for a week.
Learn More ❯

Network+ for CompTIA Exam N10-005

This free practice test contains 20 questions and answer explanations covering the wireless networking objectives of the CompTIA Network+ exam.  These practice questions are excerpted from CompTIA Network+ Certification Practice Exams (N10-005) by Robb H. Tracy (McGraw-Hill, 2012) with permission from McGraw-Hill.

Question 1:

You are implementing a wireless network in an office suite. Due to the rectangular shape of the building, you need to implement a single wireless access point in the center of the office suite along with four additional wireless access points in each corner. What should you do? (Choose two.)

A. Implement a WAP with an omni-directional antenna in the center of the office complex.
B. Implement a WAP with a semi-directional antenna in each corner of the office complex.
C. Implement a WAP with a highly-directional antenna in the center of the office complex.
D. Implement a WAP with a semi-directional antenna in the center of the office complex.
E. Implement a WAP with an omni-directional antenna in each corner of the office complex.

 

Question 2:

You have discovered that the signal from your wireless network is emanating some distance out into the parking lot of your facility. What can you do to stop this? (Choose three.)

A. Implement wireless repeaters at strategic locations within your building.
B. Relocate the wireless access point to a central location in your building.
C. Increase the gain on the wireless access point antenna.
D. Reduce the power level of the wireless access point.
E. Implement a Faraday cage on the exterior of your building.
F. Implement omni-directional wireless access points.

 

Question 3:

Which type of wireless network does not use a wireless access point?

A. Infrastructure
B. Bus
C. Star
D. Ad hoc

 

Question 4:

Which wireless networking standard runs at a frequency of 5 GHz? (Choose two.)

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11z

 

Question 5:

You have discovered an older laptop in your equipment closet that has in integrated 802.11b wireless network adapter. Your organization uses 802.11n wireless access points to provide wireless connectivity to your network. What must you do to connect this device to the network?

A. Disable the integrated 802.11b adapter and install an 802.11n USB wireless network adapter.
B. Disable the integrated 802.11b adapter and install an 802.11g USB wireless network adapter.
C. Install a wireless bridge and connect the integrated 802.11b adapter to the 802.11b side of the bridge.
D. Connect the integrated 802.11b adapter directly to the 802.11n wireless network.

 

Question 6:

Which technologies allows the 802.11n standard to provide dramatically more wireless bandwidth than that available with 802.11b and 802.11g? (Choose two.)

A. Lempel-Ziv (LZ) compression
B. Time-division multiplexing
C. 3DES data encryption
D. MIMO
E. Channel bonding

 

Question 7:

You are implementing an 802.11n wireless network for a small business in a rented office suite within a large, multitenant office complex. You are experiencing significant interference in the wireless network, causing dropped connections. You have discovered that the 2.4 GHz cordless phone system used in the office is set to use channel 3. You also discovered that neighboring tenants are using channels 1 and 5 for their 802.11x wireless networks. What should you do?

A. Set your wireless access point to use channel 2.
B. Set your wireless access point to use channel 4.
C. Set your wireless access point to use channel 7.
D. Set your wireless access point to use channel 3.

 

Question 8:

A small business has hired you to manage its 802.11g wireless network. Upon investigation, you find that 128-bit WEP is being used to secure transmissions on the wireless network. Which components comprise the encryption keys used on this network? (Choose two.)

A. 24-bit initialization vector
B. 40-bit encryption key
C. 48-bit initialization vector
D. 104-bit encryption key
E. 80-bit encryption key

 

Question 9:

Which security standard uses the AES-CCMP algorithm to secure data on a wireless network?

A. WEP
B. WPA2
C. WPA
D. WAP

 

Question 10:

You are implementing a new wireless network for a financial services firm. You need to ensure that the network is as secure as possible. What should you do? (Choose two.)

A. Implement WEP encryption on wireless access points and all client systems that will connect to them.
B. Hide the SSID.
C. Implement MAC address filtering.
D. Implement WPA encryption on wireless access points and all client systems that will connect to them.
E. Use omni-directional antennae on the wireless access points and locate them along the exterior walls of the firms physical structure.

 

Question 11:

A nefarious individual has used Kismet on his laptop to determine the SSID of a public access WAP at an airport. Using this information, he has set up a rogue access point and web server on a laptop within the airport using the same SSID. On the web server, he has created bogus web pages that look like the pages used by several large banks and credit card companies. These pages are used to capture bank and credit card account information and account credentials. What kind of wireless exploit is in use in this scenario?

A. Evil twin
B. WPA cracking
C. War chalking
D. War driving

 

Question 12:

Which security weakness is found within the WEP encryption scheme and makes it relatively easy to crack?

A. The DES encryption used by WEP is relatively easy to crack.
B. The RSA encryption used by WEP is relatively easy to crack.
C. Short passphrases using words found in the dictionary can be cracked using a dictionary attack.
D. The 24-bit IVs are reused and transmitted in clear-text.

 

Question 13:

Which mechanism can be used with WPA security to encapsulate Extensible Authentication Protocol (EAP) information within an encrypted SSL/TLS tunnel?

A. Lightweight Extensible Authentication Protocol (LEAP)
B. Protected Extensible Authentication Protocol (PEAP)
C. Temporal Key Integrity Protocol (TKIP)
D. Extensible Authentication Protocol-MD5 (EAP-MD5)

 

Question 14:

The wireless users located in a portable office building situated next to your organizations main physical structure are complaining of slow data transfers over the network. Given that your organization uses an 802.11n wireless network with WAPs implemented within the main physical structure, what should you do? (Choose two.)

A. Implement MAC address filtering.
B. Move the users closer to the WAP to see if the signal strength improves.
C. Upgrade the users computers to 802.11a network interfaces.
D. Implement an additional WAP in the location where the users work.
E. Change the channel used by the WAP nearest the users to a higher numbered channel.

 

Question 15:

Your 802.11n wireless network is experiencing a significant amount of latency. You have used the IPERF utility to determine that your wireless network is experiencing a significant number of packets arriving out of order, arriving late, and being completely lost. What should you do? (Choose two.)

A. Check for sources of interference, such as microwave ovens or 2.4 GHz cordless phones.
B. Verify that all devices on the wireless network are using the correct encryption mechanism.
C. Try using a different channel on the WAP to reduce interference from other 2.4 GHz devices.
D. Verify that wireless devices are not using mismatched SSIDs.
E. Move the WAPs antenna to a lower physical location.

 

Question 16:

A user has reported that he cant connect to your organizations 802.11n wireless network from his newly issued laptop computer. The user works in a location at which you know a good wireless signal is available. In addition, none of his co-workers are having trouble connecting to the wireless network. The user checked the documentation that came with his laptop and verified that it has an integrated wireless adapter and that it is enabled. What should you do? (Choose three.)

A. Verify that the user is using the correct SSID when connecting.
B. Install an 802.11n wireless USB adapter in the laptop.
C. Check to see if MAC filtering is in use on the WAP.
D. Change the channel used by the WAP to eliminate interference from other 2.4 GHz devices.
E. Check for surfaces or objects that might be causing the wireless network signal to bounce.
F. Verify that the user has configured the wireless adapter to use the correct wireless encryption mechanism.

 

Question 17:

Given optimal wireless conditions, which wireless networking standard provides the longest range?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

 

Question 18:

Which wireless networking standard is limited to a maximum bitrate of 11 Mbps?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

 

Question 19:

Which wireless security mechanism uses a preshared key (PSK)?

A. WEP
B. WPA2 Enterprise
C. WPA Personal
D. WAPI

 

Question 20:

The Marketing workgroup in your organization decided that they need a stronger wireless signal in their workspace to support the tablet devices they are using to develop a new marking app. To do this, they purchased a WAP and plugged it into an open network jack within an empty cubicle. Which term best describes the security risk in this scenario?

A. Rogue access point
B. Evil twin
C. War driving
D. Data emanation

 

Congratulations, you have completed this practice quiz and are one step closer to getting certified! Thanks again to Robb Tracy and McGraw-Hill for these practice questions, which are excerpted from the CompTIA Network+ Certification Practice Exams (N10-005) by Robb H. Tracy (McGraw-Hill, 2012 with permission from McGraw-Hill.

For fully-featured test simulation software that will keep score and help you identify your areas of strength and weakness, surf on over to the GoExam Practice Test Center.