CCNA 2 Exam 4 Pt 3 of 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

SNMP

Which protocol can be used to monitor the network?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

NAT

A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?

FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.

A network administrator enters the following commands on the switch SW1. SW1(config)# interface range fa0/5 - 10 SW1(config-if)# ip dhcp snooping limit rate 6 What is the effect after these commands are entered?

protect

A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands

A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

WLANs

On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.

Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

enterprise

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

preventing rogue switches from being added to the network

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

omnidirectional

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

authorization

Which access control component, implementation, or protocol controls what users can do on the network?

802.1x

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

accounting

Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

the automatic trunking port feature enabled for all ports by default

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

QoS

Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

wireless wide-area network

Which type of wireless network is suitable for national and global communications?

wireless metropolitan-area network

Which type of wireless network is suitable for providing wireless access to a city or district?

wireless wide-area network

Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?


Set pelajaran terkait

Practice Questions for Level 1 and Level 2 Preview

View Set

HW 3 Ch 04 Everyday Biology: A Future Without Antibiotics? (Watching the video)

View Set