Вы находитесь на странице: 1из 3

Lab Manual for CWNA Guide to Wireless LANs, Second Edition Lab Manual Solutions 9-

Chapter 9 Solutions
Activity Questions, Lab 9-1
10. What was the response? Does your flter appear to be working?
Answer: Request timed out !es
12. Were you able to successfully telnet to your access point? Did you
remove the list or ust the application of the list in !tep 11?
Answer: "es #ust remo$ed t%e a&&lication of t%e list'
Review Questions, Lab 9-1
1. What three parameters can you flter on using an "# flter on a $isco 1200
series access point?
Answer: (ort, &rotocol, and )( address
2. % confgured flter doesn&t work unless it is applied to an interface. 'rue
or (alse?
Answer: *rue
). "# flters can only be applied as incoming flters. 'rue or (alse?
Answer: +alse
*. "# flters provide some security. What other important function can "#
flters provide?
Answer: ,and-idt% utili.ation control
+. "n !tep , you viewed the flter you created. 'here were fve entries- one
of which was (orward all. Why is the (orward all statement necessary at
the end of the access list?
Answer: Eac% incomin/ &ac0et must matc% at least one rule in t%e list ot%er-ise, t%e &ac0et -ill be
denied'
Activity Questions, Lab 9-2
*%is acti$it! %as no questions for t%e students to ans-er'
Review Questions, Lab 9-2
1. '."# is a long/term security solution. 'rue or (alse?
Answer: +alse
2. What will be the replacement for '."# and W0#?
Answer: AES
). What algorithm does '."# and W0# use?
Answer: RC1
*. '."# improves on W0#&s weaknesses by encrypting the "1. 'rue or (alse?
Answer: +alse
+. 2ow does '."# enhance W0#?
Answer: ,! &ro$idin/ different 0e! streams
Activity Questions, Lab 9-3
12. What is the prompt?
Answer: *%e team name follo-ed b! t%e /reater t%an si/n 2for e3am&le, 0ilo-lima45
6
Lab Manual for CWNA Guide to Wireless LANs, Second Edition Lab Manual Solutions 9-
1). What is the prompt?
Answer: *%e team name follo-ed b! t%e &ound si/n 2for e3am&le, al&%a-bra$o75
1*. With respect to interface and functionality- how does #utty&s !!2
program compare to Windows& 'elnet program?
Answer: E3actl! t%e same
1+. "n addition to logging out of the !!2 session- what else does the #utty
program do when the logout command is issued?
Answer: Closes t%e -indo-
Review Questions, Lab 9-3
1. With respect to today&s security environment- what is the problem with
using ('# and 'elnet for remote access?
Answer: +*( and *elnet send e$er!t%in/ in clear te3t, so t%e! are not secure'
2. What is the port number for !!2- and does it use connectionless or
connection/oriented transport?
Answer: (ort 88, connection-oriented
). %t which layer of the 3!" model do ('#- 'elnet- and !!2 operate?
Answer: A&&lication la!er
*. !!2 provides secure data communications but does not provide secure
authentication. 'rue or (alse?
Answer: +alse
+. 4y default- your !!2 login and password will be the same as the one
used for 'elnet. 'rue or (alse?
Answer: *rue
Activity Questions, Lab 9-4
W%56"678 $heck with school or company o9cials before assigning this lab-
as there may be liability issues.
63'08 " always charge the laptops during the lecture period of the course.
'his is especially critical in this lab: otherwise- the students will get to their
neighborhood and the laptop will have no charge. " re;uire all students to
sign a feld trip permission form- a single paragraph stating that students are
100 percent responsible for the laptop they are taking o<site. %lso- in 'able
=/1- you should provide the names of fve nearby neighborhoods >or names
for as many teams as you have?. "t is best if students don&t have far to drive-
because they have school property. 'here should be at least two students in
each car for safety purposes. @ou should provide a map of the school and
nearby neighborhoods. " printed my map from map;uest.com and wrote the
team names on the map.
'his activity has no ;uestions for the students to answer.
Review Questions, Lab 9-4
1. %pproAimately what percentage of the access points that you detected in
the activity were using +*/Bbps technology?
Answer: 9aries
2. %pproAimately what percentage of the access points that you detected
were using W0# or some other type of encryption?
8
Lab Manual for CWNA Guide to Wireless LANs, Second Edition Lab Manual Solutions 9-
Answer: 9aries
). %pproAimately what percentage of the access points that you detected
were not broadcasting their !!"Ds >closed networks??
Answer: 9aries
*. 2ow could you fnd out the !!"D for a closed network?
Answer: A sniffer suc% as Airo(ee0 or AirMa/net
+. Why do you think it is illegal to connect to a non/public wireless network
that you come across while wardriving?
Answer: ,ecause !ou didn:t &a! for t%e band-idt%;it belon/s to someone else
<

Вам также может понравиться