Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following standards aggregates two 40 MHz carriers to double the speed from 54 Mbps to 108 Mbps?

802.11n

Which wireless standard uses channel bonding of both 2.4 GHz and 5 GHz ranges to get increased bandwidth of over 100 Mbps?

802.11n

Which of the following are the IEEE versions of STP? Each correct answer represents a complete solution. Choose all that apply.

802.1D 802.1w

Which of the following represents the percentage of uptime provided when fault tolerance is present?

99.99 percent

All ports on the root switch are designated ports that forward the traffic they receive from their segment.

True

An ad hoc network would not scale well and is not recommended due to collision and organization issues.

True

Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?

Set the SSID value on the client to the SSID value configured on the AP.

MIMO optimizes throughput to gain the high-speed advantage that 802.11n provides. Which of the following statements is true in relation to the given information?

Several frames are sent by several antennas over several paths, and the frames are then recombined by another set of antennas.

Cisco compares NetFlow informational reports to receiving a phone bill with detailed call information to track calls.

True

On Wi-Fi networks, both WEP and WPA-TKIP use the RC4 cipher, but WEP's implementation is far more vulnerable to attack.

True

The users should test the batteries of the devices periodically to ensure that they stand ready to provide the expected runtime.

True

The types of ports that can be found on a switch are _____ and _____. Each correct answer represents a part of the solution. Choose all that apply.

Trunk Access

Which of the following features of a switch will allow two switches to pass the VLAN network information?

Trunking

Which device has an attached battery that can provide power to the devices in the event of a power outage?

UPS

Markus, a network analyst, wants to create broadcast domains to eliminate the need for expensive routers. Which of these will help him to accomplish the task?

VLAN

Which switching technology reduces the size of a broadcast domain in layer 2 switched internetworks?

VLAN

Which of these is an IEEE standard (RFC 2338) for router redundancy?

VRRP

A humidifying system should be used to maintain the level above ______.

50 percent

What is the maximum data rate for the 802.11a standard?

54 Mbps

What is the maximum data rate for the 802.11b standard?

11 Mbps

How many non-overlapping frequency channels are available in the 802.11a standard?

12

What is the frequency range of the IEEE 802.11g standard?

2.4 GHz

What is the HSRP group number of the group with the HSRP MAC address as 0000.0c07.ac0a?

10

Which of the following statements states the difference between a switch and a router?

A switch creates separate collision domains but one broadcast domain, whereas a router provides separate broadcast domains.

Which of the following statements is true about fire suppression?

Class A (flammable solids), Class B (flammable liquids), and Class D (combustible metal) extinguishers should only be placed or used near fire hazards of their appropriate types.

Which is the highest encryption that WPA2 can use?

AES-CCMP

How are Omnidirectional and Yagi antennas rated?

According to the signal gain with respect to an actual or theoretical laboratory reference antenna

Which of these are the features of VTP?

Adding VLANs using plug-and-play Consistent VLAN configuration across all switches in the network Accurate tracking and monitoring of VLANs

You want to automatically log users out who have been logged in for a specified period without activity, so which policy would you configure?

Authentication period

Which of the following sites is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring?

Cold

Why do Yagi antennas provide a greater range than Omnidirectional antennas of an equivalent gain?

Because Yagis focus all their power in a single direction, and Omnis must disperse the same amount of power in all directions at the same time.

Why are layer 2 switches and bridges faster than routers?

Because they don't take up time looking at the network layer header information

Which of these is considered a PAN device?

Bluetooth

Which of the following statements states the difference between bridges and switches?

Bridges are software-based, whereas switches are hardware-based because they use ASIC chips to help make filtering decisions.

Which of the following modes removes the UPS from the device and the wall output conceptually, without disconnecting it?

Bypass

A network technician is setting up a new wireless network. With the WPA2 standard in use, which of these will provide both data confidentiality and data integrity? Each correct answer represents a part of the solution. Choose all that apply.

CCMP AES

Which of these means that packets have been damaged?

CRC errors

Which UPS value assumes that all of the attached devices are pulling the maximum amount of power?

Capacity

You need to install a wireless network on multiple floors of a large building and maintenance area. What is the first concern before installing the APs?

Channel overlap

Your wireless network is configured with WEP encryption and has a limited number of users. You notice that there are some unauthorized connections on your access point. Which of the following steps will you take to enhance the security of your network? Each correct answer represents a part of the solution. Choose all that apply.

Configure WPA encryption. Configure MAC filtering.

Which devices can interfere with the operation of a wireless network because they operate on similar frequencies? Each correct answer represents a complete solution. Choose all that apply.

Cordless phone Microwave oven

You are installing an ADSL router for your company's new branch office. The router has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN named VLAN1. When you plug a laptop into one of the Ethernet ports, you can access the Internet with no difficulties. Now, you need to connect the ADSL router to the company's network so that the wireless access points on the network can provide the users with Internet access through the ADSL router. However, when you plug the router into a network switch port that is assigned to VLAN4, the switch starts generating 'Native VLAN mismatch detected' errors once every minute. Which of the following steps should be a part of the solution that you implement to stop the error messages from appearing? Each correct answer represents a part of the solution. Choose all that apply.

Create a VLAN4 on the ADSL router's switch module. Configure the router port connected to the network switch to use VLAN4.

You have made the release of product plans available only to the Sales group members. Which tool can prevent the emailing of a document to anyone other than Sales group members?

DLP

Which spread-spectrum technology does the 802.11b standard define for operation?

DSSS

Which of the following fire suppression systems is not a good choice for locating computing equipment?

Deluge

Which of the following is not a device hardening technique?

Deploy an access control vestibule.

Which of these are the primary strategies to protect against availability failures?Each correct answer represents a complete solution. Choose all that apply.

Disaster recovery Fault tolerance

Which of the following protocols gives the users a way to configure more than one physical router to appear as if they were only a single logical one?

FHRP

Which error message indicates that the router has a layer 3 packet and is lacking some element of the layer 2 header?

Failed encapsulation

Which of these is addressed by raised floors?

Flooding

What are the distinct functions of layer 2 switching that increases the available bandwidth on the network? Each correct answer represents a complete solution. Choose all that apply.

Forwarding and filtering Loop avoidance Address learning

Which of the following protocols allows active-active load balancing?

GLBP

Which of these is called the proper shutdown of a system?

Graceful

Which of the following timers have the default interval of 3 seconds and identifies the state that each router is in?

Hello

Which conditions cannot be tolerated because it leads to corrosion of electrical parts followed by shorts and other failures? Each correct answer represents a complete solution. Choose all that apply.

High humidity Low humidity

Which of the following is not the benefit of layer 2 switching?

High latency

Which of the following statements is true regarding network convergence?

High-performance TCP/IP networks augmented by additional technologies are increasingly displacing other options.

Which site is a leased facility that contains all the resources needed for full operation?

Hot

What is the disadvantage of using port spanning?

It can create overhead on the switch.

Which of these makes clustering a less desirable option than load balancing? Each correct answer represents a complete solution. Choose all that apply.

It doesn't work as well for some services. It requires identical or nearly identical hardware for each node. It can be more complicated to configure.

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or known in the filter table?

It floods the network with the frame looking for the device.

Which of the following statements is true about the HSRP group?

It has only one active router, at least one standby router, and many listening routers.

Which of the following statements is true about the maintenance bypass?

It is possible when the UPS is augmented with an external appliance called the bypass cabinet.

Which of the following statements is true about STP?

It is standardized as IEEE 802.1D.

Which of the following statements is true about the original 1997 802.11 standards?

It only supported network speeds of 2 Mbps.

Which of the following statements is true about SSID?

It refers to the unique 32-character identifier that represents a particular wireless network and defines the basic service set.

If a switch receives a frame and the source MAC address is not in the MAC address table, but the destination address is, what will the switch do with the frame?

It will add the source address and port to the MAC address table and will forward the frame out the destination port.

If the users have a duplex mismatch, which counter will increment?

Late collision

Which of the following is not the commonly used NetFlow identifier?

Layer 2 protocol field

In which states is the MAC address table populated with addresses? Each correct answer represents a complete solution. Choose all that apply.

Listening Blocking

You connect a new host to your company's wireless network. The host is set to receive a DHCP address, and the WPA2 key is entered correctly. However, the host cannot connect to the network. What can the problem be?

MAC filtering is enabled on the AP.

Which of these connects equipment (inside plant) to cables and subscriber carrier equipment (outside plant)?

MDF

Which of these represents the amount of time a system will be down or unavailable during the implementation of changes?

Maintenance window

To what type of devices are the BYOD policies applied?

Mobile

Which of these can the users use to provide the descriptions of bandwidth needs for an application as well as the available bandwidth?

NetFlow

Which service can analyze the traffic on the network by showing the major users of the network, meaning top talkers?

NetFlow

Which of these should not be updated to reflect the changed state of the network?

Notification to change

Which of the following statements is true about RADIUS?

Once RADIUS has authenticated the users, it allows them to specify the type of rights a user or workstation has, plus control what RADIUS, or the users, can do within the network.

Which of these causes system reboots?

Overheating

Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another (roaming)?

Overlapping the wireless cell coverage by at least 10 percent

Which policy shows the time before a password can be reused?

Password history

You connect your host to a switch that is running the network analysis software. However, you are not seeing any packets from the server. What do you need to implement on the switch to see all the packet information?

Port mirroring

Which of these indicates the way of properly installing or removing software on the servers?

Procedure

If you are configuring voice VLANs, which of the following should you configure on the switch ports to provide higher precedence to voice traffic over data traffic to improve the sound quality of the line?

QoS

Which of these is a measure back in time when the data was preserved in a usable format, most often to the recent backup?

RPO

Which of these is a layer 2 protocol used to maintain a loop-free network?

STP

Which of these is a plan for reversing changes and recovering from any adverse effects from the changes?

Rollback

Which value represents the amount of time that the UPS can provide power at a given power level?

Runtime

Which of the following SNMP versions has no significant security features, and the devices only respond to messages containing the correct community name string?

SNMPv1

Which of these provides a method to join multiple physical switches into a single logical switching unit?

Switch stacking

Which of the following backup types does not include the data?

System state

A network baseline delimits when bandwidth is available and the amount of that bandwidth.

True

Which of the following statements defines the limitations of layer 2 switching?

The users absolutely have to break up the collision domains properly.

Which of these is the reason that WPA encryption is preferred over WEP?

The values of WPA keys can change dynamically while the system is used.

Which of these are the benefits of VLANs? Each correct answer represents a complete solution. Choose all that apply.

They increase the number of broadcast domains while decreasing the size of the broadcast domains. They allow the logical grouping of users by function. They can enhance network security.

What is the primary purpose of SSID?

To allow devices to self-identify as members of a single interoperating logical network segment

A properly designed VLAN-based network only routes a minority of traffic, while most packets remain within their VLAN.

True

When is STP said to be converged on the root bridge? Each correct answer represents a complete solution. Choose all that apply.

When all ports are in the forwarding state When all ports are in the blocking state

Using a cable that is too long can result in late ______.

collisions

Any Ethernet packet that is greater than 1518 bytes is considered a ______.

giant


Ensembles d'études connexes

Ch 6 Lesson 2 How do plants use sunlight to make food?

View Set

1.21.1 Introduction to Programming Quiz

View Set

Chapter 11 - Complaints, Grievances, and Conflict

View Set

Lab 3-3: Search Text Files Using Regular Expressions: Linux installation and configuration

View Set

1.1 Scientific Method/Notes Study Guide

View Set