WIRELESS: CH26 - 29

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

When using a Cisco WLC, client sessions with the WLAN are set to how many seconds by default? Question 14 options: A) 600 B) 900 C) 1800 D) 3600

1800

A Cisco embedded WLC deployment can typically support up to how many APs? Question 27 options: A) 100 B) 200 C) 3000 D) 6000

200

A cloud WLC deployment can support how many clients? Question 6 options: A) 2,000 B) 4,000 C) 32,000 D) 64,000

32,000

Fill in the blanks: Cisco controllers support a maximum of ________ WLANs, but only ________ of them can be actively configured on an AP. Question 40 options: A) 16, 5 B) 512, 16 C) 100, 50 D) 100, 5

512, 16

What is the max data rate for the 802.11n standard? Question 30 options: A) 2 Mbps B) 54 Mbps C) 600 Mbps D) 6.93 Gbps

600 Mbps

A unified WLC deployment can support how many clients? Question 18 options: A) 2,000 B) 4,000 C) 32,000 D) 64,000

64,000

Which of the following terms describes a WLC's ability to automatically choose and configure the RF channel used by each AP, based on other active access points in the area? Question 26 options: A) Self-healing wireless coverage B) Flexible client roaming C) Dynamic channel assignment D) RF monitoring

Dynamic channel assignment

When connecting a VLAN to a WLAN, which interface is used? Question 34 options: A) Management interface B) Virtual interface C) Service port interface D) Dynamic interface

Dynamic interface

Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant? Question 43 options: A) EAP-FAST B) PEAP C) EAP-TLS D) GCMP

EAP-FAST

Which authentication method is considered the most secure wireless authentication method currently available? Question 24 options: A) EAP-FAST B) PEAP C) LEAP D) EAP-TLS

EAP-TLS

Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame? A) MIC B) KIP C) OAuth D) EAP

MIC

Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)? Question 19 options: A) WPA B) WPA2 C) WPA3 D) These features are not in any version of WPA.

WPA3

Which WPA version has encryption and MIC with AES and GCMP? Question 25 options: A) WPA B) WPA2 C) WPA3 D) WPA4

WPA3

Which of the following describes an IBSS? Question 37 options: A) A network in which multiple access points are spread throughout multiple geological locations B) A network in which two or more wireless devices connect to each other directly, with no other means of network connectivity C) A network which contains a single access point D) A network in which only certain devices have authorization to connect to the wireless network

A network in which two or more wireless devices connect to each other directly, with no other means of network connectivity

When referring to wireless networks, membership in a BSS is known as which of the following? Question 35 options: A) Partnership B) Association C) Neighbor D) Pair

Association

Which of the following types of access points are equipped with both wired and wireless hardware so that the wireless client associations can be terminated onto a wired connection locally at the AP? Question 11 options: A) Cloud AP B) Autonomous AP C) Contained AP D) Split-MAC AP

Autonomous AP

A basic service set (BSS) is bounded by the area in which the access point's signal is usable. What is this area known as? A) Basic service area (BSA) B) Wireless service area (WSA) C) Basic service reach (BSR) D) Wireless service reach (WSR)

Basic service area (BSA)

Which tunneling protocol makes it possible for a lightweight AP and WLC to carry 802.11-related messages and client data between them? Question 33 options: A) L2TP B) PPTP C) IPsec D) CAPWAP

CAPWAP

Which one of the following is the data encryption and integrity method used by WPA2? Question 21 options: A) CCMP B) GCMP C) TKIP D) WIPS

CCMP

An engineer works for an organization with a large number of Cisco APs. She would like to be able to manage and maintain all of the APs in one central location. What product could the engineer use to accomplish this? Question 7 options: A) Cisco Autonomous Platform B) Cisco Prime Infrastructure C) Cisco AP Manager D) Cisco Network Monitor

Cisco Prime Infrastructure

The Cisco Meraki is an example of which type of access point? Question 41 options: A) Isolated B) Autonomous C) Split D) Cloud-based

Cloud-based

An engineer needs to add an additional access point to extend the range of their wireless network. However, it's not possible to run a wired network cable to the new access point. What could this engineer do so that the new wireless access point doesn't require a wired connection to the access point? Question 29 options: A) There is no way to make this scenario work without the engineer being able to provide a wired connection to the access point. B) Configure the access point to use IBSS. C) Configure the access point to operate in repeater mode. D) Use a workgroup bridge to connect the two access points.

Configure the access point to operate in repeater mode.

Which WLC port is an asynchronous connection to a terminal emulator that can be used for out-of-band management, system recover, and initial boot functions? Question 28 options: A) Service port B) Redundancy port C) Console port D) Distribution port

Console port

The IEEE 802.11 standard refers to the upstream wired Ethernet as the ________ for the wireless BSS. Question 39 options: A) Upstream system B) Distribution connection C) Ethernet retrieval D) Distribution system

Distribution system

The WLC port that is used for all normal AP and management traffic, and usually connects to a switch port in 802.1Q trunk mode is known as what? Question 42 options: A) Service port B) Redundancy port C) Console port D) Distribution system port

Distribution system port

What is the term used to describe when access points are placed at multiple geographical locations and interconnected by a switched infrastructure? Question 38 options: A) Basic service set B) Extended service set C) Geographical service set D) Enhanced service set

Extended service set

What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users? Question 15 options: A) Expanded Authentication Protocol B) Wireless Security Protocol C) Extensible Authentication Protocol D) Multi-security Protocol

Extensible Authentication Protocol

Which of the following is not a method for accessing a Cisco WLC? Question 31 options: A) HTTPS B) HTTP C) FTP D) SSH

FTP

If you wanted to classify all frames in your WLAN as "video" for QoS, which of the following should you select from the QoS drop-down menu? Question 20 options: A) Platinum B) Gold C) Silver D) Bronze

Gold

Which standard must wireless devices adhere to? Question 5 options: A) IEEE 802.11 B) IEEE 802.1 C) IEEE 802.3 D) IEEE 802.14

IEEE 802.11

Wired Ethernet is based on which IEEE standard? Question 9 options: A) IEEE 802.11 B) IEEE 802.1 C) IEEE 802.3 D) IEEE 802.14

IEEE 802.3

One disadvantage of EAP-TLS is which of the following? Question 16 options: A) It's not as secure as other authentication methods. B) It can be complex to implement. C) It isn't compatible with many network types. D) It can only be used in small networks.

It can be complex to implement.

When the functions of an autonomous AP are divided and the AP performs only real-time 802.11 operation, the AP is known as which of the following? Question 45 options: A) Independent AP B) Cloud-based AP C) Lightweight AP D) Unified AP

Lightweight AP

Which interface is used for normal management traffic, such as RADIUS user authentication, WLC-to-WLC communication, web-based and SSH sessions, as well as used to terminate CAPWAP tunnels between the controller and its AP? Question 8 options: A) Management interface B) Virtual interface C) Service port interface D) Dynamic interface

Management interface

Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server? Question 36 options: A) EAP-FAST B) EAP C) PEAP D) LEAP

PEAP

On what configuration page of the Cisco WLC would you be able to configure a Wi-Fi Multimedia (WMM) policy? Question 4 options: A) Advanced B) General C) Security D) QoS

QoS

The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data? Question 12 options: A) Blowfish B) HMAC C) AES D) RC4

RC4

The WLC port that is used to connect to a peer controller for high availability (HA) operation is known as what? Question 10 options: A) Service port B) Redundancy port C) Console port D) Distribution system port

Redundancy port

A user has a laptop so that she can freely move around the office building and work in difference locations. As the user walks through the building, her device immediately connects to the closest access point. What is this known as? Question 23 options: A) Wireless passing B) Swapping C) Hopping D) Roaming

Roaming

Which WLC port is used for out-of-band management, system recovery, and initial boot functions and always connects to a switch port in access mode? Question 44 options: A) Service port B) Redundancy port C) Console port D) Distribution system port

Service port

By default, on a Cisco WLC, the Quality of Service (QoS) is set to which of the following? Question 17 options: A) Platinum B) Gold C) Silver D) Bronze

Silver

In autonomous AP architecture, what should be used on each switch to prevent loops from forming and corrupting your network? A) Spanning Tree Protocol B) Autonomous Configuration Protocol C) VLAN Extension Protocol D) WLC deployment

Spanning Tree Protocol

In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following? A) The network device that provides access to the network B) The client device requesting access C) The device that takes user or client credentials and permits/denies access D) The wired uplink connection

The client device requesting access

The original 802.11 standard offered which of the following authentication methods? (Select all that apply.) Question 32 options: WPA2 LEAP WEP Open Authentication

WEP Open Authentication

Which of the following usually performs the management functions of many lightweight APs? Question 13 options: A) Cisco Prime Infrastructure B) Wireless LAN controller C) Lightweight Management Protocol D) Management functions are performed by the lightweight AP itself.

Wireless LAN controller


संबंधित स्टडी सेट्स

Air Force core values/Air Force professional test questions

View Set

Нюхач новые слова Oct. 2019

View Set

IL CHAPTER 4 - TAXES, RETIREMENT, & OTHER INSURANCE CONCEPTS

View Set

Meds Affecting Endocrine System (8/10)

View Set

Bio1100 Chapter 13, Carbohydrates

View Set

Amino Acid - Structure to one letter code

View Set

A & P 1 Nervous System Lecture Exam

View Set