CNT Module 10-13 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

protect

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

the automatic trunking port feature enabled for all ports by default

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

lt is used to encypt the messages between the WLC and the RADIUS server.

Which type of management frame may regularly be broadcast by an AP?

beacon

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

receiving a broadcast beacon frame transmitting a probe request

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

802.11a 802.11ac

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

Advanced

What is the function provided by CAPWAP protocol in a corporate wireless network?

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

Which step is required before creating a new WLAN on a Cisco 3500 series WLC?

Create a new VLAN interface.

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

DHCP Snooping Port Security

What are three techniques for mitigating VLAN attacks? (Choose three.)

Disable DTP. Enable trunking manually. Set the native VLAN to an unused VLAN.

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Disable both protocols on all interfaces where they are not required.

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

Ensure that the wireless NIC is enabled. Ensure that the wireless SSID is chosen.

A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac . What is the purpose of this configuration command?

It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.

Which statement describes the behavior of a switch when the MAC address table is full?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

RADIUS

Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

S1(config)# spanning-tree portfast bpduguard default S1(config-if)# spanning-tree bpduguard enable

Which protocol can be used to monitor the network?

SNMP

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.

Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

authentication

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

VLAN double-tagging

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

accidental interference

As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

sticky secure MAC addresses

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

the native VLAN of the trunking port being the same as a user VLAN

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

to avoid interference from nearby wireless devices

Which type of wireless network often makes use of devices mounted on buildings?

wireless metropolitan-area network


Conjuntos de estudio relacionados

Chapter 2: The Chemistry of Life

View Set

FNP Board Practice Questions - PART 2

View Set

Series 6 Annuities/ Taxation and Economics

View Set

Psychology Exam 4 Belmont Prof GARR

View Set

Knewton Chapter 1: Identify and Use the SI Units for Temperature and Time

View Set

Ch. 1: Start Smart - Setting Goals

View Set