cc- 1013
A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?
802.11ac
What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)
802.11ac 802.11a
Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?
802.1X
Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports?
802.1X
What is the function provided by CAPWAP protocol in a corporate wireless network?
CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.
What is an advantage of SSID cloaking?
Clients will have to manually identify the SSID to connect to the network.
Which step is required before creating a new WLAN on a Cisco 3500 series WLC?
Create a new VLAN interface.
A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac . What is the purpose of this configuration command?
It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.
Which two commands can be used to enable BPDU guard on a switch? (Choose two.)
S1(config)# spanning-tree portfast bpduguard default S1(config-if)# spanning-tree bpduguard enable
Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?
VLAN double-tagging
On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?
WLANs
Which three Cisco products focus on endpoint security solutions? (Choose three.)
Web Security Appliance Email Security Appliance NAC appliance
While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?
active
What device is considered a supplicant during the 802.1X authentication process?
the client that is requesting authentication
Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?
the native VLAN of the trunking port being the same as a user VLAN
True or False?In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
true
Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?
wireless local-area network
Which type of wireless network uses low powered transmitters for a short-range network, usually 20 to 30 ft. (6 to 9 meters)?
wireless personal-area network
What is a wireless security mode that requires a RADIUS server to authenticate wireless users?
enterprise
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
local AAA
What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)
receiving a broadcast beacon frame transmitting a probe request
Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the automatic trunking port feature enabled for all ports by default