Professional Documents
Culture Documents
1 Which statements are true concerning the shared memory buffering used by an Ethernet
switch? (Choose two.)
* Frames are processed through a single queue.
* All frames are placed in a common memory buffer.
• Frames are placed in a queue for the destination port.
• A port with a full memory buffer can cause frames for available ports to be delayed.
• Each switch port is statically assigned a buffer of equal size.
5 Why would a network administrator segment a network with a Layer 2 switch? (Choose
two.)
• to create fewer collision domains
* to enhance user bandwidth
• to create more broadcast domains
• to eliminate virtual circuits
* to isolate traffic between segments
• to isolate ARP request messages from the rest of the network
6
Refer to the graphic. Which point must be reached before a frame is forwarded when the
switch is using store-and-forward mode?
•A
•B
•C
•D
•E
*F
Refer to the graphic. Which point in the frame must be reached before it is forwarded by
a switch that is using fast-forward mode?
•A
•B
*C
•D
•E
•F
15 Which of the following are true regarding the addition of switches to a network?
(Choose two.)
• They increase the number of collision domains.
* They decrease the number of collision domains.
• They increase the number of broadcast domains.
• They decrease the number of broadcast domains.
* They increase the amount of bandwidth available to users.
• They decrease the amount of bandwidth available to users.
When using 802.1x for wireless security, clients are allowed to associate with open
authentication for RADIUS traffic.
WPA2 personal mode permits RADIUS use in SOHO environments.
A AAA server is required for the RADIUS portion of the 802.1x protocol.
Pre-shared keys are not permitted for authentication with WPA2.
WPA introduced SSID hiding and MAC address filtering as security measures.
WPA2 improved on WPA by introducing 802.1x port authentication.
2 To support the client association process, which two methods of authentication are
specified in the 802.11 standard? (Choose two.)
3 Which three statements are valid wireless security concerns? (Choose three.)
Rogue access points are commonly installed by employees inside the company.
With a WLAN, the risk for a man-in-the-middle connection is solved by using RF access
points.
Flooding a BSS with CTS messages creates an effective DoS attack by defeating media
access control.
Allowing a PC NIC to accept all traffic makes it operate as an access point.
Beaconing SSIDs are required to successfully implement WPA and WPA2.
Shared WEP keys are the most secure means to prevent man-in-the-middle and DoS
attacks.
4 Which two statements are true regarding configuring APs? (Choose two.)
APs should be configured with WPA only if they do not allow WEP for encryption.
Set the radio band to standard or 20 Mhz if are using Wireless-N, Wireless-B, and
Wireless-G devices.
If wide, the 40 MHz channel is selected for the Radio Band setting, and the standard
channel is a secondary channel for Wireless-N.
Disabling SSID broadcast prevents any unauthorized connections to the AP.
AES provides stronger security than TKIP.
5 A wireless access point is not working properly. It has been placed horizontally so that
it is 6 inches (15.2 cm) from the person seated at the desk, and 2 feet (61 cm) from a
metal obstruction. What are three reasons why the access point is not working properly?
(Choose three.)
An access point should be at least 7.9 inches (20 cm) from people.
An access point should be mounted vertically.
An access point must always be mounted on a ceiling.
An access point should be mounted at a 45-degree angle for proper coverage.
An access point should be at least 3 feet (91.4 cm) from metal obstructions.
An access point should be at least 15.8 inches (40 cm) from people.
6 Which installation method will allow connectivity for a new wireless network?
7 Which three statements concerning network security are accurate? (Choose three.)
8 Which two statements are true regarding wireless client configuration? (Choose two.)
Leaving the SSID as null on a Windows XP client causes it to broadcast a null SSID
request and trigger an SSID broadcast from the AP.
MAC address filtering prevents a wireless network from displaying in the Network
Connections, unless the specific MAC address is permitted at the AP.
Manually adding a network and setting the known SSID makes the network visible when
using the Network Connections icon in the Windows XP client system tray, even if the
SSID is not being broadcast.
A wireless network requires both the SSID and the network key to be visible as an
available network.
Default SSIDs on specific manufacturer APs are generally known and may permit hostile
wireless connections.
9 Which three devices do many wireless routers incorporate? (Choose three.)
10 Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
11 Wireless users on a network complain about poor performance within a small area of
a room. Moving away from this area in any direction improves performance dramatically.
What is the first step in designing a solution to this problem?
This might be RF channel overlap, so the technician should verify the channels in use on
each wireless access point and change to non-overlapping channels.
The RF power settings might be set too low on the wireless access points servicing the
room. Increase the RF output power on all wireless access points.
Install a new wireless access point in this center area to provide coverage.
Verify that the wireless access points have sufficient in-line power and connectivity to the
wired network.
12 Which two conditions or restrictions apply to Cisco wireless access points? (Choose
two.)
13 Which access method does a wireless access point use to allow for multiple user
connectivity and distributed access?
CSMA/CD
token passing
CSMA/CA
polling
14 Which two statements are valid planning considerations for WLAN deployments?
(Choose two.)
The IEEE 802.11n draft standard is intended to improve WLAN data rates and range
without requiring additional power or RF band allocation.
In North America, 802.11a channels should be restricted to 1, 6, and 11 to reduce channel
overlaps.
An ESS generally includes a common SSID to allow roaming from access point to access
point without requiring client configuration.
802.1q trunking across the network infrastructure allows an ESS to associate diverse
access points as long as each access point has a unique SSID.
Cells in an ESS should have 10 to 15 percent overlap between them in an extended
service area.
Access points can be quickly deployed as ad hoc installations to form an ESS.
15
Refer to the exhibit. When configuring the wireless access point, which setting does the
network administrator use to configure the unique identifier that client devices use to
distinguish this wireless network from others?
Network Mode
Network Name (SSID)
Radio Band
Wide Channel
Standard Channel