CIsco Module 10-13

¡Supera tus tareas y exámenes ahora con Quizwiz!

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network? A: Upgrade the firmware on the wireless access point. B: Disable DHCP on the access point and assign static addresses to the wireless clients. C: Replace the wireless NICs on the computers that are experiencing slow connections. D: Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

D

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service? A: SNMP B: AAA C: NAT D: RADIUS

D

A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet? A: DNS B: DHCP C: NAT D: RADIUS

C

Which type of management frame may regularly be broadcast by an AP? A: probe request B: probe response C: beacon D: authentication

C

Which access control component, implementation, or protocol is based upon usernames and passwords? A: accounting B: authorization C: 802.1X D: authentication

D

Which authentication method stores usernames and passwords in the router and is ideal for small networks? A: local AAA over TACACS+ B: local AAA over RADIUS C: server-based AAA over TACACS+ D: local AAA E: server-based AAA over RADIUS F: server-based AAA

D

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed? A: Change the SSID. B: Update the firmware on the new router. C: Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band. D: Configure devices to use a different channel.

C

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features? A: Rogues B: Network Summary C: Advanced D: Access Points

C

Which type of wireless network is suitable for national and global communications? A: wireless personal-area network B: wireless local-area network C: wireless wide-area network D: wireless metropolitan-area network

C

Which step is required before creating a new WLAN on a Cisco 3500 series WLC? A: Build or have an SNMP server available. B: Create a new SSID. C: Build or have a RADIUS server available. D: Create a new VLAN interface.

D

A network administrator enters the following commands on the switch SW1.SW1(config)# interface range fa0/5 - 10SW1(config-if)# ip dhcp snooping limit rate 6What is the effect after these commands are entered? A: FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second. B: FastEthernet ports 5 through 10 can receive up to 6 DHCP messages per second of any type. C: If any of the FastEthernet ports 5 through 10 receive more than 6 DHCP messages per second, the port will be shut down. D: If any of the FastEthernet ports 5 through 10 receive more than 6 DHCP messages per second, the port will continue to operate and an error message will be sent to the network administrator.

A

A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac . What is the purpose of this configuration command? A: It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. B: It checks the source MAC address in the Ethernet header against the MAC address table. C: It checks the source MAC address in the Ethernet header against the target MAC address in the ARP body. D: It checks the source MAC address in the Ethernet header against the user-configured ARP ACLs.

A

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid? A: accidental interference B: interception of data C: improperly configured devices D: rogue access points

A

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms? A: omnidirectional B: Yagi C: dish D: directional

A

Which feature on a switch makes it vulnerable to VLAN hopping attacks? A: the automatic trunking port feature enabled for all ports by default B: mixed port bandwidth support enabled for all ports by default C: the limited size of content-addressable memory space D: the mixed duplex mode enabled for all ports by default

A

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.) A: Port Security B: Web Security Appliance C: Dynamic ARP Inspection D: DHCP Snooping E: IP Source Guard

A and D

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.) A: 802.11ac B: 802.11b C: 802.11g D: 802.11ad E: 802.11a F: 802.11n

A and E

What is an advantage of SSID cloaking?​ A: It provides free Internet access in public locations where knowing the SSID is of no concern. B: SSIDs are very difficult to discover because APs do not broadcast them.​ C: Clients will have to manually identify the SSID to connect to the network.​ D: It is the best way to secure a wireless network.

C

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.) A: Ensure that the laptop antenna is attached. B: Ensure that the NIC is configured for the proper frequency. C: Ensure that the wireless NIC is enabled. D: Ensure that the correct network media is selected. E: Ensure that the wireless SSID is chosen.

C and E

What is the function provided by CAPWAP protocol in a corporate wireless network? A: CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point. B: CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client. C: CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing. D: CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

D

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices? A: Use the open standard LLDP rather than CDP. B: Enable CDP on edge devices, and enable LLDP on interior devices. C: Use the default router settings for CDP and LLDP. D: Disable both protocols on all interfaces where they are not required.

D

What are three techniques for mitigating VLAN attacks? (Choose three.) A: Disable DTP. B: Enable BPDU guard. C: Set the native VLAN to an unused VLAN. D: Enable Source Guard. E: Enable trunking manually. F: Use private VLANs.

A, C, E

What device is considered a supplicant during the 802.1X authentication process? A: the switch that is controlling network access B: the client that is requesting authentication C: the router that is serving as the default gateway D: the authentication server that is performing client authentication

B

Which protocol can be used to monitor the network? A: AAA B: DHCP C: RADIUS D: SNMP

D

DHCP snooping

prevents DHCP starvation and SHCP spoofing attacks

IP Source Guard

prevents MAC and IP address spoofing attacks

Port Security

prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks

Authentication

proves that users are who they say they are

Accounting

records what users do and what they access

Authenticator

switch that the client is connecting to and that is actually controlling physical network access

Authentication Server

where the authentication actually takes place

Supplicant

which is the client that is requesting network access

A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service? A: The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia. B: Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services. C: The 5 GHz band has a greater range and is therefore likely to be interference-free. D: The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.

A

sticky secure MAC addresses

MAC addresses that can be dynamically learned or manually configured, then stored in the address table and added to the running configuration.

authorization

determines what resources users can access or the operations they are allowed to perform

Web Security Appliance (WSA)

mitigation technology for web-based threats

Dynamic ARP Inspection (DAI)

prevents ARP spoofing and ARP poisoning attacks

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources? A: accounting B: authentication C: authorization D: accessibility

A


Conjuntos de estudio relacionados

Network+ Ch3 quiz, Networking Final Quizlet

View Set

AP Psychology - Unit 6: Learning

View Set

Lab 5-2: Configure SMB and NFS File Shares

View Set

PTE Reading and Writing: Fill in the Blanks: - July 2023

View Set

Conduit fabrication lvl 1 lesson 2

View Set

TEXAS SAE REAL ESATE INVESTMENT COURSE

View Set

Clinical Decision Making / Clinical Judgment

View Set