CCNA2 Final 9-16
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network? Split the traffic between the 2.4 GHz and 5 GHz frequency bands. Upgrade the firmware on the wireless access point. Disable DHCP on the access point and assign static addresses to the wireless clients. Replace the wireless NICs on the computers that are experiencing slow connections.
The interface fa0/0 has not been activated.
A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0 . However, when the administrator issues the command show ip route , the routing table does not show the directly connected network. What is the possible cause of the problem No packets with a destination network of 172.16.1.0 have been sent to R1. The configuration needs to be saved first. The interface fa0/0 has not been activated. The subnet mask is incorrect for the IPv4 address.
It is used to encrypt the messages between the WLC and the RADIUS server.
A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose of the shared secret password? It is used to encrypt the messages between the WLC and the RADIUS server. It is used to authenticate and encrypt user data on the WLAN. It is used by the RADIUS server to authenticate WLAN users. It allows users to authenticate and access the WLAN.
Protect
A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces? Shutdown Restrict Protect Off
802.11ac
A network administrator is required to upgrade wireless access to end-users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented? 802.11b 802.11g 802.11n 802.11ac
Shutdown
An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode? Protect Disabled Shutdown Restrict
WLANs
On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2? SECURITY MANAGEMENT WIRELESS WLANs
Advanced
On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features? Advanced Network Summary Access Points Rogues
802.11ac
What IEEE 802.11 wireless standard operates only in the 5 GHz range? 802.11n 802.11b 802.11ac 802.11ad 802.11g
Enterprise
What is a wireless security mode that requires a RADIUS server to authenticate wireless users? Personal WEP Enterprise Shared key
Authorization
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform? Authentication Authorization Accounting Auditing
Enable BPDU guard.
Which is NOT a technique for mitigating VLAN attacks? Enable trunking manually. Enable BPDU guard. Disable DTP. Set the native VLAN to an unused VLAN.
Antenna frequency
Which parameter would NOT need to be changed if best practices are being implemented for a home wireless AP? SSID Wireless network password AP password Antenna frequency
SNMP
Which protocol can be used to monitor the network? AAA SNMP RADIUS DHCP
Wireless wide-area network
Which type of wireless network uses transmitters to provide coverage over an extensive geographic area? Wireless personal-area network Wireless local-area network Wireless metropolitan-area network Wireless wide-area network
Ensure that the wireless NIC is enabled and Ensure that the wireless SSID is chosen.
A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? Ensure that the laptop antenna is attached and Ensure that the wireless SSID is chosen. Ensure that the NIC is configured for the proper frequency and Ensure that the wireless SSID is chosen. Ensure that the correct network media is selected and Ensure that the NIC is configured for the proper frequency. Ensure that the wireless NIC is enabled and Ensure that the wireless SSID is chosen.
NAT
A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet? DHCP NAT RADIUS DNS
FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.
A network administrator enters the following commands on the switch SW1. SW1(config)# interface range fa0/5 - 10SW1(config-if)# ip dhcp snooping limit rate 6 What is the effect after these commands are entered? FastEthernet ports 5 through 10 can receive up to 6 DHCP messages per second of any type. FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second. If any of the FastEthernet ports 5 through 10 receive more than 6 DHCP messages per second, the port will be shut down. If any of the FastEthernet ports 5 through 10 receive more than 6 DHCP messages per second, the port will continue to operate and an error message will be sent to the network administrator.
HSRP uses active and standby routers.
A network administrator is analyzing the features that are supported by different first-hop router redundancy protocols. Which statement describes a feature that is associated with HSRP? It uses ICMP messages in order to assign the default gateway to hosts. HSRP is nonproprietary. HSRP uses active and standby routers. It allows load balancing between a group of redundant routers.
It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.
A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command? It checks the source MAC address in the Ethernet header against the MAC address table. It checks the source MAC address in the Ethernet header against the user-configured ARP ACLs. It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. It checks the source MAC address in the Ethernet header against the target MAC address in the ARP body.
Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.
A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result? Add a Wi-Fi range extender to the WLAN and set the AP and the range extender to serve different bands. Check and keep the firmware of the wireless router updated. Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands. Require all wireless devices to use the 802.11n standard.
RADIUS
A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such a service? RADIUS AAA SNMP NAT
RADIUS
A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service? RADIUS SNMP AAA NAT
RADIUS
A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service? SNMP AAA NAT RADIUS
The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service? The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia. Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services. The 5 GHz band has a greater range and is therefore likely to be interference-free. The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.
Change the default user-name and password of the wireless router.
A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router? Configure encryption on the wireless router and the connected wireless devices. Disable the wireless network SSID broadcast. Change the default user-name and password of the wireless router. Enable MAC address filtering on the wireless router.
To avoid interference from nearby wireless devices
A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel? To avoid interference from nearby wireless devices To enable different 802.11 standards To disable broadcasting of the SSID To provide stronger security modes
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices. A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed? Change the SSID. Configure devices to use a different channel. Update the firmware on the new router. Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices. A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed? Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band. Configure devices to use a different channel. Change the SSID. Update the firmware on the new router.
Sticky secure MAC addresses
As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this? Dynamic secure MAC addresses Static secure MAC addresses Auto secure MAC addresses Sticky secure MAC addresses
A) GLBP B) HSRP C) VRRP
Match the FHRP protocols to the appropriate description. A) A Cisco proprietary FHRP that provides load sharing in addition to redundancy GLBP B) A Cisco proprietary FHRP that provides redundancy through use of an active device and standby device HSRP C) An open standard FHRP that provides redundancy through use of a virtual routers master and one or more backups Options HSRP VRRP GLBP
A) Initial B) Learn C) Listen D) Speak E) Standby
Match the HSRP state with its function. (Not all options are used) A) When there is a configuration change or when an interface becomes available B) Waiting to hear from the active router C) Knows virtual IP address but does not know its status (active or standby) D) Sends hello messaged and participates in election of active/standby router E) Router is candidate to become the next active router Options, (Standby, Listen, Speak, Initial, Learn)
A/B are Static Routing C/D are Dynamic Routing
Match the characteristic to the corresponding type of routing. A) Typically used on stub networks B) Less routing overhead C) New networks are added automatically to the routing table D) Best choice for large networks Options Static Routing x 2, Dynamic Routing x 2
A) Route Source B) Destination Network C) Metric D) Administrative Distance
Match the routing table entry to the corresponding function. A) Identifies how a route was learned B) Identifies the address of the remote network C) Identifies the value assigned to reach a remote network D) Identifies the trustworthiness of a route source Options Metric Administrative Distance Source Destination Network
Step 1) A Step 2) B Step 3) C Step 4) D
Match the step number to the sequence of stages that occur during the HSRP failover process. Step 1 The forwarding router fails. Step 2 The standby router stops seeing hello messages from the forwarding router. Step 3 The standby router assumes the role of the forwarding router. Step 4 The new forwarding router assumes both the IP and MAC addresses of the virtual router. Choices A) The forwarding router fails B) The standby router stops seeing hello messages from the forwarding router. C) The standby router assumes the role of the forwarding router. D) The new forwarding router assumes both the IP and MAC addresses of the router.
192.168.2.100
Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a first-hop redundancy protocol. Which IPv4 gateway address should be configured on the host? https://gyazo.com/42f3ec96e80c44cad370ca1dd924cac0 192.168.2.100 192.168.2.2 192.168.2.1 192.168.2.0
192.168.12.16
Refer to the exhibit. PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A? https://gyazo.com/2e007befe61814e164303f5800d7a0d8 192.168.11.1 192.168.12.16 192.168.10.1 192.168.10.10
7
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration? https://gyazo.com/0b899e56e26c22eefb2aa48a982023eb 5 7 1 3
SWA(config-if)# switchport port-security violation restrict
Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration statement would is NOT needed for port Fa0/2 if the network administrator has the following goals? No one is allowed to disconnect the IP phone or the PC and connect some other wired device. If a different device is connected, port Fa0/2 is shut down. The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration. https://gyazo.com/e8d8cc98d24bd7f5adda0b642eeee144 SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security violation restrict SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration? https://gyazo.com/71d72c2d80b769420edea78b48d48eea Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made. Frames from PC1 will be dropped, and there will be no log of the violation. Frames from PC1 will be dropped, and a log message will be created. Frames from PC1 will be forwarded to its destination, and a log entry will be created. Frames from PC1 will be forwarded since the switchport port-security violation command is missing. Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.
Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? https://gyazo.com/c6a07401f94faeddbc05670afe99cdee The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address. The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface. S1 has been configured with a switchport port-security aging command. The connection between S1 and PC1 is via a crossover cable.
The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.
Refer to the exhibit. What can be determined about port security from the information that is shown? https://gyazo.com/32048e93badb932cdf4d3b92a514f150 The port has two attached devices. The port violation mode is the default for any port that has port security enabled. The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security. The port has been shut down.
120
Refer to the exhibit. What is the administrative distance value of the route for router R1 to reach the destination IPv6 address of 2001:DB8:CAFE:4::A? https://gyazo.com/62a13d5892addcf86c211582097c16b3 4 110 1 120
GLBP
Refer to the exhibit. What protocol can be configured on gateway routers R1 and R2 that will allow traffic from the internal LAN to be load-balanced across the two gateways to the Internet? https://gyazo.com/ce75d618c1428d89ee1ec1182c6027a9 GLBP PVST STP PVST+
Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1.
Refer to the exhibit. What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization? https://gyazo.com/de5703404781c73657e51501e4f6b16f Configure a dynamic route from R1 to Edge and a static route from Edge to R1. Configure a static route from R1 to Edge and a dynamic route from Edge to R1. Configure a dynamic routing protocol between R1 and Edge and advertise all routes. Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1.
Send the packet out the Serial0/0/0 interface.
Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227? https://gyazo.com/1a60d129a46e46e988fd196e8099ecbb Send the packet out the GigabitEthernet0/0 interface. Send the packet out the GigabitEthernet0/1 interface. Send the packet out the Serial0/0/0 interface. Drop the packet.
The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.
Refer to the exhibit. What would happen after the IT administrator enters the new static route? https://gyazo.com/0c87964dd8b6b5fa379dc217dfe6ee48 The 172.16.1.0 static route would be entered into the running-config but not shown in the routing table. The 172.16.1.0 static route is added to the existing routes in the routing table. The 0.0.0.0 default route would be replaced with the 172.16.1.0 static route. The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.
MAC address of the virtual router
Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway? https://gyazo.com/e610db51fbf33a4b81e37608d3b900f7 MAC address of the forwarding router MAC address of the virtual router MAC address of the standby router MAC addresses of both the forwarding and standby routers
If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request.
Refer to the exhibit.What does R1 use as the MAC address of the destination when constructing the frame that will go from R1 to Server B? R1 leaves the field blank and forwards the data to the PC. The packet is encapsulated into a PPP frame, and R1 adds the PPP destination address to the frame. If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request. R1 uses the destination MAC address of S1.
Accidental interference
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid? Interception of data Improperly configured devices Accidental interference Rogue access points
Accidental interference
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid? Rogue access points Improperly configured devices Accidental interference Interception of data
Transmitting a probe request and Receiving a broadcast beacon frame
What are the two methods that are used by a wireless NIC to discover an AP? Initiating a three-way handshake using an SYN bit and Replying with a ACK-SYN bit Sending an ARP request and Receiving an ARP reply from the AP Sending a broadcast frame and Receiving a broadcast frame from the AP Transmitting a probe request and Receiving a broadcast beacon frame
TACACS+ and RADIUS
What are two protocols that are used by AAA to authenticate users against a central database of usernames and passwords? CDP and LLDP SSH and Telnet CHAP and PAP TACACS+ and RADIUS
The client that is requesting authentication
What device is considered a supplicant during the 802.1X authentication process? The authentication server that is performing client authentication The client that is requesting authentication The router that is serving as the default gateway The switch that is controlling network access
Clients will have to manually identify the SSID to connect to the network.
What is an advantage of SSID cloaking? SSIDs are very difficult to discover because APs do not broadcast them. Clients will have to manually identify the SSID to connect to the network. It is the best way to secure a wireless network. It provides free Internet access in public locations where knowing the SSID is of no concern.
CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.
What is the function provided by CAPWAP protocol in a corporate wireless network? CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller. CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing. CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client. CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point.
CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.
What is the function provided by CAPWAP protocol in a corporate wireless network? CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client. CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing. CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point. CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.
Legitimate clients are unable to lease IP addresses.
What is the result of a DHCP starvation attack? The attacker provides incorrect DNS and default gateway information to clients. The IP addresses assigned to legitimate clients are hijacked. Legitimate clients are unable to lease IP addresses. Clients receive IP address assignments from a rogue DHCP server.
Disable both protocols on all interfaces where they are not required.
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices? Use the default router settings for CDP and LLDP. Disable both protocols on all interfaces where they are not required. Use the open standard LLDP rather than CDP. Enable CDP on edge devices, and enable LLDP on interior devices.
Preventing rogue switches from being added to the network
What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces? Protecting against Layer 2 loops Preventing rogue switches from being added to the network Enforcing the placement of root bridges Preventing buffer overflow attacks
Disable DTP.
What technique is used for mitigating VLAN attacks? Enable Source Guard. Enable BPDU guard. Disable DTP. Use private VLANs.
Omnidirectional
What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms? Omnidirectional Yagi Directional Dish
Port Security
Which Cisco solution helps prevent DHCP starvation attacks? IP Source Guard Port Security Dynamic ARP Inspection Web Security Appliance
Port Security
Which Cisco solution helps prevent DHCP starvation attacks? Web Security Appliance Port Security Dynamic ARP Inspection IP Source Guard
HSRP for IPv6
Which FHRP implementation is Cisco-proprietary and permits only one router in a group to forward IPv6 packets? HSRP VRRPv2 HSRP for IPv6 VRRPv3
GLBP
Which FHRP implementation is a Cisco-proprietary protocol that supports IPv4 load sharing? VRRPv2 VRRPv3 GLBP GLBP for IPv6
GLBP for IPv6
Which FHRP implementation is a Cisco-proprietary protocol that supports IPv6 load balancing? GLBP for IPv6 VRRPv3 IRDP GLBP
VRRPv2
Which FHRP implementation is a nonproprietary IPv4-only election protocol which has one master router per group? GLBP HSRP for IPv6 VRRPv2 VRRPv3
VRRPv2
Which FHRP implementation is a nonproprietary IPv4-only election protocol with limited scalability? IRDP GLBP GLBP for IPv6 VRRPv2
IRDP
Which FHRP implementation is a nonproprietary protocol which relies on ICMP to provide IPv4 redundancy? GLBP GLBP for IPv6 IRDP VRRPv3
Accounting
Which access control component, implementation, or protocol audits what user's actions are performed on the network? Authentication 802.1X Authorization Accounting
Accounting
Which access control component, implementation, or protocol collects and reports usage data? Authentication 802.1X Accounting Authorization
Authorization
Which access control component, implementation, or protocol controls what users can do on the network? Authorization Authentication 802.1X Accounting
802.1X
Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server? 802.1X Authentication Authorization Accounting
Authentication
Which access control component, implementation, or protocol is based upon usernames and passwords? 802.1X Accounting Authentication Authorization
Accounting
Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user? 802.1X Authorization Accounting Authentication
802.1X
Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports? Authorization 802.1X Accounting Authentication
Local AAA
Which authentication method stores usernames and passwords in the router and is ideal for small networks? Server-based AAA over RADIUS Server-based AAA Local AAA Local AAA over RADIUS Local AAA over TACACS+ Server-based AAA over TACACS+
S1(config-if)# spanning-tree bpduguard enable
Which command is used to enable BPDU guard on a switch interface? S1(config-if)# enable spanning-tree bpduguard S1(config)# spanning-tree bpduguard default S1(config-if)# spanning-tree portfast bpduguard S1(config-if)# spanning-tree bpduguard enable
Accounting
Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources? Accounting Authorization Authentication Accessibility
The automatic trunking port feature enabled for all ports by default
Which feature on a switch makes it vulnerable to VLAN hopping attacks? Mxed port bandwidth support enabled for all ports by default The automatic trunking port feature enabled for all ports by default The mixed duplex mode enabled for all ports by default The limited size of content-addressable memory space
SSH
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices? CDP TFTP SSH SNMP
QoS
Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data? NAT DNS DHCP QoS
It is used within a group of routers for selecting an active device and a standby device to provide gateway services to a LAN.
Which statement describes HSRP? If the virtual router master fails, one router is elected as the virtual router master with the other routers acting as backups. It is used within a group of routers for selecting an active device and a standby device to provide gateway services to a LAN. It uses ICMP to allow IPv4 hosts to locate routers that provide IPv4 connectivity to remote IP networks. It is an open standard protocol.
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
Which statement describes the behavior of a switch when the MAC address table is full? It treats frames as unknown unicast and floods all incoming frames to all ports on the switch. It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain. It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN. It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.
Create a new VLAN interface.
Which step is required before creating a new WLAN on a Cisco 3500 series WLC? Create a new SSID. Build or have a RADIUS server available. Create a new VLAN interface. Build or have an SNMP server available.
VLAN double-tagging
Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN? DHCP spoofing DTP spoofing DHCP starvation VLAN double-tagging
Beacon
Which type of management frame may regularly be broadcast by an AP? Probe request Authentication Beacon Probe response
Wireless personal-area network
Which type of wireless network commonly uses Bluetooth or ZigBee devices? Wireless local-area network Wireless metropolitan-area network Wireless personal-area network Wireless wide-area network
Wireless local-area network
Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency? Wireless personal-area network Wireless local-area network Wireless wide-area network Wireless metropolitan-area network
Wireless wide-area network
Which type of wireless network is suitable for national and global communications? Wireless wide-area network Wireless personal-area network Wireless metropolitan-area network Wireless local-area network
Wireless metropolitan-area network
Which type of wireless network is suitable for providing wireless access to a city or district? Wireless personal-area network Wireless wide-area network Wireless local-area network Wireless metropolitan-area network
Wireless local-area network
Which type of wireless network is suitable for use in a home or office? Wireless local-area network Wireless personal-area network Wireless wide-area network Wireless metropolitan-area network
Wireless metropolitan-area network
Which type of wireless network often makes use of devices mounted on buildings? Wireless local-area network Wireless metropolitan-area network Wireless wide-area network Wireless personal-area network
Wireless personal-area network
Which type of wireless network uses low powered transmitters for a short-range network, usually 20 to 30 ft. (6 to 9 meters)? Wireless local-area network Wireless personal-area network Wireless wide-area network Wireless metropolitan-area network
Wireless local-area network
Which type of wireless network uses transmitters to cover a medium-sized network, usually up to 300 feet (91.4 meters)? Wireless personal-area network Wireless metropolitan-area network Wireless wide-area network Wireless local-area network
Wireless metropolitan-area network
Which type of wireless network uses transmitters to provide wireless service over a large urban region? Wireless wide-area network Wireless local-area network Wireless metropolitan-area network Wireless personal-area network
Administrative distance
Which value in a routing table represents trustworthiness and is used by the router to determine which route to install into the routing table when there are multiple routes toward the same destination? Outgoing interface Administrative distance Metric Routing protocol
Infrastructure
Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building? Hotspot Mixed mode Infrastructure Ad hoc
Active
While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode? Mixed Passive Active Open