S & R CH. 10-13 Part 5
A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)
-Ensure that the wireless NIC is enabled -Ensure that the wireless SSID is chosen
What is a wireless security mode that requires a RADIUS server to authenticate wireless users?
enterprise
An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?
shutdown
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?
7
What is an advantage of SSID cloaking?
Clients will have to manually identify the SSID to connect to the network
A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?
NAT
Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?
QoS
Which protocol can be used to monitor the network?
SNMP
A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?
Split the traffic between the 2.4 GHz and 5 GHz frequency bands
Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?
accounting