On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such…

Continue ReadingOn a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features? Rogues Advanced Access Points Network Summary Answers Explanation & Hints: The Cisco 3504 WLC…

Continue ReadingOn a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older…

Continue ReadingA network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel? to disable broadcasting of the SSID…

Continue ReadingA technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.) 802.11a 802.11b 802.11g 802.11n 802.11ac 802.11ad Answers Explanation & Hints: The 802.11a and 802.11ac standards…

Continue ReadingWhat two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a wireless security mode that requires a RADIUS server to authenticate wireless users? enterprise personal shared key WEP Answers Explanation & Hints: WPA and WPA2 come in two…

Continue ReadingWhat is a wireless security mode that requires a RADIUS server to authenticate wireless users?

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building? ad hoc hotspot infrastructure mixed mode Answers Explanation & Hints:…

Continue ReadingWhich wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.) sending an ARP request delivering a broadcast frame transmitting a probe request…

Continue ReadingWhat are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

Which type of management frame may regularly be broadcast by an AP?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of management frame may regularly be broadcast by an AP? beacon probe request authentication probe response Answers Explanation & Hints: Beacons are the only management frame that may…

Continue ReadingWhich type of management frame may regularly be broadcast by an AP?

A network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network administrator enters the following commands on the switch SW1. SW1(config)# interface range fa0/5 – 10 SW1(config-if)# ip dhcp snooping limit rate 6 What is the effect after these…

Continue ReadingA network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports…

Continue ReadingRefer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN? DTP spoofing DHCP spoofing VLAN double-tagging DHCP starvation Answers Explanation & Hints: Spoofing…

Continue ReadingWhich type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces? preventing rogue switches from being added to the network protecting against Layer 2 loops enforcing the placement…

Continue ReadingWhat security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the…

Continue ReadingRefer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

What device is considered a supplicant during the 802.1X authentication process?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What device is considered a supplicant during the 802.1X authentication process? the client that is requesting authentication the switch that is controlling network access the authentication server that is performing…

Continue ReadingWhat device is considered a supplicant during the 802.1X authentication process?

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources? accessibility accounting authentication authorization Answers Explanation &…

Continue ReadingWhich component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Which statement describes the behavior of a switch when the MAC address table is full?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which statement describes the behavior of a switch when the MAC address table is full? It treats frames as unknown unicast and floods all incoming frames to all ports on…

Continue ReadingWhich statement describes the behavior of a switch when the MAC address table is full?

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices? SCP SSH TFTP SNMP Answers Explanation & Hints: Telnet uses plain text to…

Continue ReadingWhich protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices? Use the open standard LLDP rather than CDP. Disable both protocols on all interfaces…

Continue ReadingWhat represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?