A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.) Ensure that the wireless NIC is enabled. Ensure that the laptop…

Continue ReadingA laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret…

Continue ReadingA network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is

A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result? Require all wireless devices to use…

Continue ReadingA network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web…

Continue ReadingWhich service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such…

Continue ReadingOn a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features? Rogues Advanced Access Points Network Summary Answers Explanation & Hints: The Cisco 3504 WLC…

Continue ReadingOn a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older…

Continue ReadingA network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel? to disable broadcasting of the SSID…

Continue ReadingA technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.) 802.11a 802.11b 802.11g 802.11n 802.11ac 802.11ad Answers Explanation & Hints: The 802.11a and 802.11ac standards…

Continue ReadingWhat two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a wireless security mode that requires a RADIUS server to authenticate wireless users? enterprise personal shared key WEP Answers Explanation & Hints: WPA and WPA2 come in two…

Continue ReadingWhat is a wireless security mode that requires a RADIUS server to authenticate wireless users?

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building? ad hoc hotspot infrastructure mixed mode Answers Explanation & Hints:…

Continue ReadingWhich wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.) sending an ARP request delivering a broadcast frame transmitting a probe request…

Continue ReadingWhat are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

Which type of management frame may regularly be broadcast by an AP?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of management frame may regularly be broadcast by an AP? beacon probe request authentication probe response Answers Explanation & Hints: Beacons are the only management frame that may…

Continue ReadingWhich type of management frame may regularly be broadcast by an AP?

A network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network administrator enters the following commands on the switch SW1. SW1(config)# interface range fa0/5 – 10 SW1(config-if)# ip dhcp snooping limit rate 6 What is the effect after these…

Continue ReadingA network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports…

Continue ReadingRefer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN? DTP spoofing DHCP spoofing VLAN double-tagging DHCP starvation Answers Explanation & Hints: Spoofing…

Continue ReadingWhich type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces? preventing rogue switches from being added to the network protecting against Layer 2 loops enforcing the placement…

Continue ReadingWhat security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the…

Continue ReadingRefer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?