1
Which value determines if a switch becomes the central point of reference in the spanning tree
topology?
lowest bridge ID
highest revision number
lowest numeric IP address
highest numeric
MAC address
2
Refer to the exhibit. What is the purpose of the
configuration commands that are shown?
to activate port Fa0/10
to make the port a member of VLAN 30
to activate port security on port Fa0/10
to add VLAN 30 to
the trunk that is connected to port Fa0/10
3
Refer to the exhibit. What would happen if the
network administrator moved
the network cable of Host A from interface Fa0/1 to Fa0/switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.
Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
Host A remains a member of VLAN 10, because
the switch provides dynamic VLAN assignment for the port.
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.
4
Which device or devices should have the
Spanning Tree
Protocol enabled to prevent host traffic from creating a broadcast storm?
Core_S1
Access_S2 and Access_S3
Core_S1, Access_S2, and Access_S3
Core_S1, Access_S2, Access_S3, and R1
5
Refer to the exhibit. The hosts connected to switch SW1 are not able
to communicate with the hosts in the same VLANs connected switch SW2.
What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration.
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
6
Refer to the exhibit. The Layer 2 switching design that is shown has
been implemented in a campus environment that is using Spanning
Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D
1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol.
7 What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?
The IOS will be copied to the TFTP server.
The configuration file named tokyo-config will overwrite the startup configuration file on S1.
The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.
The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.
8
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine
the
final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.
The switch learned this MAC address from the source address in a frame received on Fa0/18.9 Which two statements are correct about wireless infrastructure components? (Choose two
.)
An AP converts the TCP/IP data packets from their 802.11 frame encapsulation format to the 802.3 Ethernet frame format on the
wired Ethernet network.
A wireless AP does not require any physical connection to allow wireless clients to access the Internet.
An AP is a layer 2 device, similar to a switch, that provides dedicated bandwidth to each connected wireless host.
Collisions do not occur between wireless NICs and APs.
The wireless router performs the roles of AP and router.
10
Which service should be disabled on a Cisco switch or router to
prevent packet sniffers from capturing information about the device?
SSH
VTP
CDP
SNMP
11
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to
transmit a frame at the same time but a collision occurs. Which
hosts will receive the collision jamming signal?
only hosts A and B
only hosts A, B, and C
only hosts A, B, C, and D
only hosts A, B, C, and E
12
What are three benefits of employing a hierarchical network design? (Choose three.)
Hierarchically designed networks can more easily be expanded to suit future needs.
Hierarchical design models enhance existing bandwidth through the use of link aggregation.
The hierarchical model allows for specialized functionality at each layer, simplifying device management.Use of a hierarchical design allows replacement of redundant devices with high-capacity network equipment.
A hierarchical design uses firewalls instead of complicated port-based and distribution layer security policies.
The hierarchical model allows the use of high-performance switches at all design layers, thus allowing for a fully-meshed topology.
13 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router. What is one important fact that must considered?
The physical interface must have an IP address configured.
The subinterface numbers must match the VLAN ID number.
The no shutdown command must be issued on each subinterface.
The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.
14
Which type of frame contains information that is used in the election of the spanning tree root bridge?
BID
LSA
LSU
BPDU
15
Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the
switches are configured with their default priority values?
switch A
switch B
switch C
switch D
switch E
switch F
Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment – ESwitching Final Exam – CCNA Exploration: LAN Switching and
Wireless (Version 4.0)
Time Remaining:
16
Refer to the exhibit. What will happen when frames with a source address other than 0019.d2e4.d9f7 enters interface Fa0/24?
Fa0/24 will become error-disabled.
The incoming frames will be dropped.
The Fa0/24 port LED will be turned off.
The security violation count will be incremented.
17
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly
configured
with IP addresses in the subnet range for VLAN 50. Host A can
communicate with host B, but cannot communicate with C or host D. What
is the cause of this problem?
There is a native VLAN mismatch.
The Fa0/11 interface of Switch1 is not configured as a trunk.
The link between Switch1 and Switch2 is up but not trunked.
VLAN 50 is not allowed on the trunk link between Switch1 and Switch2.
18
Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these
commands?
VLAN 30 will be added to S1, S2, and S3, but not to S4.
VLAN 30 will be pruned from the VLAN database of S3.
VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.
VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed.
19
Refer to the exhibit. R1 is configured for traditional inter-VLAN
routing. R1 can ping computer 3 but cannot ping computer 1. What is
possible cause for this failure?
S1 port Fa0/11 is in the wrong VLAN.
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.
20
Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 drops the traffic because it is untagged.
SW1 leaves the traffic untagged and forwards it over the trunk.
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
21
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?
QoS
routing
trunking
VPN
22 When implementing a router-on-a-stick, what must be configured on the router to ensure connectivity between different VLANs?
subinterfaces
routing protocol
switched virtual circuits
dynamic trunking protocol
23
Refer to the exhibit. Users complain that they do not have
connectivity to the web server that is connected to SW1. What should be
to remedy the problem?
Allow all VLANs on the trunk link.
Configure VLAN 100 as the native VLAN for SW1.
Configure the trunk port in trunk mode on SW1.
Attach the web server to a router and configure inter-VLAN routing.
24 Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
Modify
the TCP/IP properties of the computer connected to the access point so
that it exists on the same network, and then reboot
your computer to establish a connection.
25
Company
policy requires disabling the command history buffer on network
devices. An administrator enters terminal no history size
the command
prompt on a Cisco Catalyst switch and receives no error messages back,
but the command history buffer is still available.What is the problem?
The command contained a syntax error.
The Cisco IOS version does not support disabling the command history buffer.
The command history can only be disabled on a router, not a switch.
The size parameter reset the default buffer size but did not disable access to the buffer.
26
Refer to the exhibit. What does “FORWARDING” mean in the command output shown?
The switch is sending and receiving data frames.The switch is receiving BPDUs, but not sending data frames.
The switch is participating in an election process by forwarding the BPDUs it receives.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.
27
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
Cat-C
Cat-D
28
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?
192.168.1.11 /28
192.168.1.22 /28192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
29
Refer to the exhibit. All trunk links are operational and all VLANs
are allowed on all trunk links. An ARP request is sent by computer Which
device or devices will receive this message?
only computer 4
computer 3 and RTR-Acomputer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router
30
Refer to the exhibit. The switches in the exhibit have VTP pruning
enabled. What will be pruned in the VTP advertisements from switch
ST-C to switch ST-1?
VLAN 30
VLAN 20 and VLAN 30
VLAN 1, VLAN 20, and VLAN 30
VLAN 2 through VLAN 29, and VLAN 31 through VLAN 1000
Time Remaining:
31
Refer to the exhibit. An administrator documented the output of a CAM
table from an Ethernet switch as shown. What action will the
switch take when it receives the frame shown at the bottom of the exhibit?
discard the frame
forward the frame out port 2
forward the frame out port 3
forward the frame out all ports
forward the frame out all ports except port 3
add station 00-00-3D-1F-11-05 to port 2 in the forwarding table
32
What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)
Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment.
The physical interface of the router must be connected to a trunk link on the adjacent switch.The number of physical interfaces on the router should match the number of VLANs.
Different static VLANs should be assigned to different interfaces of the router.
The router should be configured as the VTP server.
33
Refer to the exhibit. The switch VTY lines have been properly
configured, but PC1 is unable to remotely manage the switch. How can
this problem be resolved?
Configure the Fa0/1 interface of the switch in trunk mode.
Configure a default gateway on the switch.Configure the native VLAN on the switch.
Configure the Fa0/1 interface of the switch to allow all VLANs.
34
Refer to the exhibit. After entering the commands in the exhibit, the
administrator receives a “password required, but none set” message
when attempting to connect to S1. What is the problem?
The enable secret password was not set.
S1 does not have login configured on the vty lines.
S1 does not have a password configured for the vty lines.The crypto key is not properly configured to generate passwords.
The VLAN1 interface has not be enabled with the no shutdown command.
35
Refer to the exhibit. After the listed commands are entered into
router R1 and switch S1, the administrator enters the show interface
fa0/1 trunk and gets the results shown. What is the likely problem?
The trunk is established, but no VLANs have been configured to use it.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.
The trunk has not been established because the router does not support dynamic trunking protocol.The
router, the switch, or both must be configured with the dynamic
desirable option for dynamic trunking protocol to establish trunk.
36
Which parameter is used to uniquely identify one wireless network from another?
SSIDOFDM
WEP
DSSS
37
Refer
to the exhibit. Switch SW2 has been newly purchased and added to the
network. What configuration should be applied to SW2 that it
participates in the same VTP domain as switch SW1, receives VLAN
information from SW1, and synchronizes VLAN information?
Disable VTP pruning on SW2.
Configure SW2 in VTP transparent mode.
Configure SW2 with the VTP domain password.
Configure SW2 as a VTP server with a higher revision number.
38
Refer to the exhibit. In what two ways will the router handle VLAN traffic that is received on the trunk? (Choose two.)
Traffic to VLAN 1 received by the router interface Fa0/0 will be dropped by the router.Because interface Fa0/0 requires an IP address, the router will not be able to route between the VLANs.
Packets that are received from network 192.168.20.0 /24 will be handled by subinterface Fa0/0.20.The router will use subinterface MAC addresses to identify the VLAN traffic that is received on the physical interface.
The router will continue to process traffic from the attached VLANs even if the physical interface goes down.
http://www.ccna4u.org
39
In
which mode is a VTP switch operating if it does not allow for the
creation of local VLANs but it does accept VLAN updates from other
switches in the same domain?
client
root
server
transparent
40
Which configuration changes will increment the configuration revision number on the VTP server?
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or changing the VTP domain name
configuring or changing the VTP version number
configuring or deleting a VLAN or creating a VLAN name
41
Refer to the exhibit. Switches S2 and S3 are properly connected using
an ethernet cable. A network administrator has configured both
switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.
VTP pruning is disabled.
VTP v2 is disabled.
42
Refer to the exhibit. What is true of the configuration of switch S1?
Only VLAN 99 will be allowed to use the trunk links.
Switch ports Fa0/1 and Fa0/3 are configured with a standard trunking protocol.
Switch ports Fa0/1 and Fa0/3 should be configured as access ports to allow data from multiple VLANs to access switch S1.
The switch negotiated trunk links for interfaces Fa0/1 and Fa0/3 because all connected interfaces have been configured with the
switchport mode dynamic auto command.
43
What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?
Connect each PC directly to a router port.
Use access control lists to filter broadcasts from the network.
Divide the computers into separate VLANs on the existing switches.
Divide the computers into separate workgroups using different physical switches.
44
Refer to the exhibit. The configuration steps that are listed in the
exhibit have been entered in switch S1 via the console. Subsequent
attempts to telnet to the switch are not successful. What is causing the problem?
The switch must be configured with SSH version 1.
The transport input command must specify Telnet access.
The RSA keys must be returned to zero before SSH will permit Telnet access.
The ip domain-name command must also be entered in line configuration mode for the vty lines.
45 Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers.
The cabling distance between the switches is 100 meters.
The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.
Showing 3 of 4
Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment – ESwitching Final Exam – CCNA Exploration: LAN Switching and
Wireless (Version 4.0)
Time Remaining:
46
Refer to the exhibit. The commands are entered into switch SW1 as
shown, and an 802.1q trunk is successfully established. How does
switch SW1 handle the untagged traffic that is destined for the trunk?
SW1 will drop all untagged traffic.
SW1 will send all untagged traffic to VLAN 1.
SW1 will send all untagged traffic to VLAN 25.
SW1 will send untagged traffic to all VLANs that are configured on the trunk.
47
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4
both transmit data at the same time. How do the hosts respond the
network? (Choose two.)
After the end of the jam signal, a backoff algorithm is invoked.
Hosts 1 and 4 are operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
If
a host has data to transmit after the backoff period of that host, the
host checks to determine if the line is idle before transmitting.
48
Refer to the exhibit. Hosts PC_A and PC_B send traffic
simultaneously, and the frames from the transmitting stations collide.
What last device to receive the collision?
hub HB1
switch SW1
router R1
switch SW2
router R2
switch SW4
49
What provides an authentication mechanism for 802.11-based wireless networks?
DSSS
OFDM
SSID
WPA
50 What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)
requires less equipment
provides improved range
permits increased data rates
has a single-input and a single-output
needs no hardware upgrade for compatibility
51
Refer to the exhibit. Users A and B are reporting intermittent
connectivity problems. Pre-installation surveys showed strong signal
strength
from the AP locations to the client locations. Outside electrical
interference has been eliminated. What will fix the problem?
1
What is the purpose of TCP?
to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and server
*to assign the logical address and encapsulate the request into packets for routing to the destination
to provide flow control and acknowledgment of packets that are exchanged between the client and server
2
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
*NIC
video card
sound card
internal modem
3
Which type of computer has an integrated mouse?
desktop
*laptop
mainframe
server
pocket PC
4
After attaching four PCs to the switch ports, configuring the SSID and
setting authentication properties for a small office network, a
technician successfully tests the connectivity of all PCs that are
connected to the switch and WLAN. A firewall is then configured on the
device prior to connecting it to the Internet. What type of network
device includes all of the described features?
switch
ISR router
*firewall appliance
standalone wireless access point
5
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
6
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
*broadcast
simulcast
multicast
unicast
7
What portion of the destination IP address is used as a packet is routed through the Internet?
*subnet mask
host portion
network portion
default gateway address
8
Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
core layer
*access layer
network layer
distribution layer
9
What is the name for the contract between a customer and an ISP that
specifies requirements for uptime and service response time?
DSL
IAB
NAP
*SLA
10
A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
*ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
11
A user is not able to connect to the network. A PC technician replaces
the network cable that connects the PC to the switch port. The user is
now able to connect to the network. Which troubleshooting technique did
the technician use?
top-down
substitution
*divide-and-conquer
a combination of top-down and divide-and-conquer
12
What component of a personal computer is responsible for the processing of all data?
RAM
*CPU
firewall
system bus
operating system
13
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
*TCP
*UDP
14
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
*ISP modem
wireless-enabled laptop
integrated services router
15
Refer to the exhibit. Which pair of addresses would be appropriate to
use for PC1 and PC2 to establish a workgroup using private addresses?
127.0.0.1 and 127.0.0.2
*172.16.4.2 and 172.16.4.3
172.16.5.1 and 192.168.3.2
198.133.219.25 and 198.133.219.26
What are two ways that a user can interact with an operating system shell? (Choose two.)
*CLI
OS
*GUI
NIC
kernel
17
A company has a web server that must be accessible to both external and
internal clients. Which security policy best practice should be followed
to maximize security of the server?
Place the web server in a DMZ.
*Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
*18
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
*wireless bridge
*19
Which two statements are characteristics of DHCP services? (Choose two.)
*A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
*The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks.
20
What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
A,B,C,D
A,C,D,B
*B,D,C,A
B,C,D,A
D,C,B,A
21
Refer to the exhibit. Assume that the exhibited output is from a host
that is connected to a Linksys integrated router. What is the first
thing that should be checked while using a bottom-up troubleshooting
approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
22
Which firewall resource could include the capability of recognizing and filtering DoS attacks?
URL filtering
application filtering
*Layer 4 packet filtering
stateful packet inspection
*23
Which type of network attack occurs when an unauthorized person tries to
persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
*social engineering
*24
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
*ad hoc
*25
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
*It prevents the display of advertisement windows.
It removes unwanted e-mail.
26
What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting
27
What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
*28
Why would a corporate web server be assigned a public IP address instead of a private IP address?
The public address can be acquired at no cost.
*The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP addresses.
29
When would a LAN switch use flooding to forward a frame?
when the MAC address table is empty
when retransmissions are required after a collision
after all hosts on the network are added to the MAC table
when a frame is received from a port that is connected to a hub
30
Refer to the exhibit. The network is experiencing excessive broadcast
traffic from multiple hosts. What can be done to reduce the broadcast
traffic that each host receives without compromising connectivity to the
corporate servers?
Separate the switches with a router.
Create a separate VLAN for the servers and hosts.
Change from Ethernet switches to FastEthernet switches.
Increase the number of switches to reduce the number of PCs that are connected to each switch.
What are two characteristics of a MAC address? (Choose two.)
*It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
*It is displayed in HEX characters.
It is a physical address.
It is cable-based.
*32
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
*The user can specify high-performance components to meet specific needs.
33
What are two examples of peripheral input devices? (Choose two.)
external modem
*barcode reader
digital camera
*plotter
printer
34
A home user is looking for an ISP connection that provides high speed
digital transmission over regular phone lines. What ISP connection type
should be used?
*DSL
dial-up
satellite
cell modem
cable modem
35
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
*POP3
SMTP
IMAP4
36
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
*They are accessed from a remote computer.
They are stored on the local hard disk.
*They run on the computer where they are installed.
37
What is the purpose of the ipconfig /release command?
*It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
38
Which attribute must be the same for wireless devices on one network to
be able to communicate with devices on a different network?
DNS server
MAC address
*default gateway
operating system
wireless equipment vendor
39
A user has reported a failure to connect to the network. Based on
similar calls from other users in the same location, the network
technician starts troubleshooting by entering the ipconfig command on
the user computer. Which troubleshooting technique is the technician
using?
top-down
*bottom-up
substitution
divide-and-conquer
*40
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.
41
Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
*All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
42
What wireless technology has the ability to communicate with many
devices at the same time, makes use of the 2.4 GHz band, and is limited
to low-speed, short-range communications?
*RF
ISM
infrared
Bluetooth
*43
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
*DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
44
Refer to the exhibit. An educational institution needs to connect PC
systems that use private IP addressing to the Internet. They have
multiple systems that need to access the Internet, but were only able to
purchase one public IP address. What should be activated on the Linksys
integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
/*NAT
WEP
*45
What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP.
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.
Place AP-A and AP-B on the same wireless channel.
52 Why is MAC address filtering considered a poor choice in securing a WLAN?
Available bandwidth is reduced.
MAC addresses are easily spoofed.