CCNA 2 Exam 4 Pt 3 of 4
SNMP
Which protocol can be used to monitor the network?
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?
NAT
A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?
FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.
A network administrator enters the following commands on the switch SW1. SW1(config)# interface range fa0/5 - 10 SW1(config-if)# ip dhcp snooping limit rate 6 What is the effect after these commands are entered?
protect
A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?
Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands
A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?
WLANs
On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?
The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.
Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?
enterprise
What is a wireless security mode that requires a RADIUS server to authenticate wireless users?
preventing rogue switches from being added to the network
What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?
omnidirectional
What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?
authorization
Which access control component, implementation, or protocol controls what users can do on the network?
802.1x
Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?
accounting
Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?
authorization
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?
the automatic trunking port feature enabled for all ports by default
Which feature on a switch makes it vulnerable to VLAN hopping attacks?
QoS
Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?
wireless wide-area network
Which type of wireless network is suitable for national and global communications?
wireless metropolitan-area network
Which type of wireless network is suitable for providing wireless access to a city or district?
wireless wide-area network
Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?