S & R CH. 10-13 Part 3
Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)
-DHCP Snooping -Port Security
What are three techniques for mitigating VLAN attacks? (Choose three.)
-Enable trunking manually -Disable DTP -Set the native VLAN to an unused VLAN
Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)
-wireless network password -AP password -SSID
On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?
Advanced
A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?
Change the default user-name and password of the wireless router
Which step is required before creating a new WLAN on a Cisco 3500 series WLC?
Create a new VLAN interface
A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?
It is used to encrypt the messages between the WLC and the RADIUS server
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?
The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia
Which access control component, implementation, or protocol is based upon usernames and passwords?
authentication
Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?
wireless local-area network