PrepAway - Latest Free Exam Questions & Answers

Which of the following should the technician do?

Users have been reporting that their wireless access point is not functioning. They state that it allows slow
connections to the internet, but does not provide access to the internal network. The user provides the SSID
and the technician logs into the company’s access point and finds no issues. Which of the following should the
technician do?

PrepAway - Latest Free Exam Questions & Answers

Change the access point from WPA2 to WEP to determine if the encryption is too strong

Clear all access logs from the AP to provide an up-to-date access list of connected users

Check the MAC address of the AP to which the users are connecting to determine if it is an imposter

Reconfigure the access point so that it is blocking all inbound and outbound traffic as a troubleshooting gap

The users may be connecting to a rogue access point. The rogue access point could be hosting a wireless
network that has the same SSID as the corporate wireless network. The only way to tell for sure if the access
point the users are connecting to is the correct one is to check the MAC address. Every network card has a
unique 48-bit address assigned.
A media access control address (MAC address) is a unique identifier assigned to network interfaces for
communications on the physical network segment. MAC addresses are used as a network address for most
IEEE 802 network technologies, including Ethernet and WiFi. Logically, MAC addresses are used in the media
access control protocol sublayer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are
stored in its hardware, such as the card’s read-only memory or some other firmware mechanism. If assigned by
the manufacturer, a MAC address usually encodes the manufacturer’s registered identification number and
may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address
(EHA), hardware address or physical address. This can be contrasted to a programmed address, where the
host device issues commands to the NIC to use an arbitrary address.
A network node may have multiple NICs and each NIC must have a unique MAC address.
MAC addresses are formed according to the rules of one of three numbering name spaces managed by the
Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64.

Leave a Reply