S & R CH. 10-13 Part 6
Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?
802.1X
A network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?
FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second
A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?
Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands
Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?
The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address
Which access control component, implementation, or protocol controls what users can do on the network?
authorization
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?
authorization
A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?
protect
Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the automatic trunking port feature enabled for all ports by default
Which type of wireless network is suitable for providing wireless access to a city or district?
wireless metropolitan-area network
Which type of wireless network is suitable for national and global communications?
wireless wide-area network