Exam Source | ||||||||||||||||||
| ||||||||||||||||||
1. What is the most tangible benefit of wireless implementations? | ||||||||||||||||||
cost reduction | ||||||||||||||||||
increased mobility | ||||||||||||||||||
better productivity | ||||||||||||||||||
improved security | ||||||||||||||||||
2. What method does a WLAN use to control transmissions? | ||||||||||||||||||
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) | ||||||||||||||||||
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) | ||||||||||||||||||
CSMA/CR (Carrier Sense Multiple Access with Collision Rejection) | ||||||||||||||||||
CSMA/CW (Carrier Sense Multiple Access with Collision Weighting) | ||||||||||||||||||
3a. Occurs when radio frequency (RF) waves bounce off metal or glass surfaces. | ||||||||||||||||||
Absorption | ||||||||||||||||||
Reflection | ||||||||||||||||||
Scattering | ||||||||||||||||||
3b. Occurs when RF waves are soaked up by walls. | ||||||||||||||||||
Absorption | ||||||||||||||||||
Reflection | ||||||||||||||||||
Scattering | ||||||||||||||||||
3c. Occurs when RF waves strike an uneven surface and are reflected in many directions. | ||||||||||||||||||
Absorption | ||||||||||||||||||
Reflection | ||||||||||||||||||
Scattering | ||||||||||||||||||
4. Which regulatory agency controls the 801.11 standard that governs WLANs? | ||||||||||||||||||
Wi-Fi Alliance | ||||||||||||||||||
IEEE | ||||||||||||||||||
EMA | ||||||||||||||||||
WISC | ||||||||||||||||||
5. Which organization offers certification for interoperability between vendors of 802.11 products? | ||||||||||||||||||
Wi-Fi | ||||||||||||||||||
IEEE | ||||||||||||||||||
EMA | ||||||||||||||||||
WISC | ||||||||||||||||||
6. Which three are the unlicensed bands used by WLANs? (Choose Three) | ||||||||||||||||||
2.4-MHz band | ||||||||||||||||||
900-MHz band | ||||||||||||||||||
2.4-GHz band | ||||||||||||||||||
5-GHz band | ||||||||||||||||||
900-GHz band | ||||||||||||||||||
7. Which two of the 802.11 standards has the highest possible data rates? (Choose two) | ||||||||||||||||||
802.11 | ||||||||||||||||||
802.11a | ||||||||||||||||||
802.11b | ||||||||||||||||||
802.11d | ||||||||||||||||||
802.11g | ||||||||||||||||||
8. Which 802.11 standard transmits using the 5-Ghz band? | ||||||||||||||||||
802.11 | ||||||||||||||||||
802.11a | ||||||||||||||||||
802.11b | ||||||||||||||||||
802.11d | ||||||||||||||||||
802.11g | ||||||||||||||||||
9. Which is true as related to the Wi-Fi Alliance organization? | ||||||||||||||||||
It is a global standards organization that controls the compatibility of Wi-Fi products | ||||||||||||||||||
It operates only in the United States of America and ensures the compatibility of Wi-Fi products | ||||||||||||||||||
It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LANs | ||||||||||||||||||
It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations | ||||||||||||||||||
10. What is a rogue AP? | ||||||||||||||||||
An AP that has an open WEP key | ||||||||||||||||||
An AP that is broadcasting its SSID | ||||||||||||||||||
An unsecured AP that has been placed on a WLAN | ||||||||||||||||||
An AP that has had a hardware failure that causes it to endlessly broadcast its SSID | ||||||||||||||||||
11. Which three are the steps to secure a WLAN? (Choose Three) | ||||||||||||||||||
Encryption for providing privacy and confidentiality | ||||||||||||||||||
Authentication to ensure that legitimate clients and users access the network via trusted access points | ||||||||||||||||||
Controls transmit power to limit the AP access range to the property boundaries of the parent organization | ||||||||||||||||||
Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs | ||||||||||||||||||
12. Which standard provides the strongest level of WLAN security? | ||||||||||||||||||
EAP | ||||||||||||||||||
WEP | ||||||||||||||||||
WPA | ||||||||||||||||||
802.11i/WPA2 | ||||||||||||||||||
13. What factor determines which AP a client will associate with? | ||||||||||||||||||
the AP with the lowest SSID | ||||||||||||||||||
the AP with the highest SSID | ||||||||||||||||||
the AP whose SSID is received first | ||||||||||||||||||
the AP that is received with the strongest signal | ||||||||||||||||||
14. When using 802.11X, how is the client authenticated? | ||||||||||||||||||
The client is authenticated against a local database stored on the AP | ||||||||||||||||||
The access point forwards all network traffic to the server where it is either authenticated or blocked | ||||||||||||||||||
The access point encapsulates any 802.1X traffic bound for the authentication server and sends it to the server | ||||||||||||||||||
The client encapsulates the 802.1X authentication traffic before sending it to the AP. This causes the AP to forward it to the server | ||||||||||||||||||
15. Which is true when comparing WPA and WPA2? | ||||||||||||||||||
WPA uses pre-shared keys while WPA 2 uses PSK | ||||||||||||||||||
WPA uses EAP authentication while WPA 2 uses 802.11X | ||||||||||||||||||
WPA uses a personal mode while WPA 2 uses an enterprise mode | ||||||||||||||||||
WPA uses TKIP/MIC encryption while WPA 2 uses AES-CCMP encryption | ||||||||||||||||||
16a. Mobile clients connect directly without an intermediate access point | ||||||||||||||||||
Ad hoc mode | ||||||||||||||||||
Basic Service Set (BSS) | ||||||||||||||||||
Extended Services Set (ESS) | ||||||||||||||||||
16b. The communication devices use a single access point for connectivity to each other or to wired network resources | ||||||||||||||||||
Ad hoc mode | ||||||||||||||||||
Basic Service Set (BSS) | ||||||||||||||||||
Extended Services Set (ESS) | ||||||||||||||||||
16c.The wireless topology is two or more service sets connected by a distribution system (DS) or commonly a wired infrastructure. | ||||||||||||||||||
Ad hoc mode | ||||||||||||||||||
Basic Service Set (BSS) | ||||||||||||||||||
Extended Services Set (ESS) | ||||||||||||||||||
17. What does the physical area of radio frequency coverage provided by an access point define? | ||||||||||||||||||
the RF service area | ||||||||||||||||||
the basic service area | ||||||||||||||||||
the ad hoc service area | ||||||||||||||||||
the extended services area | ||||||||||||||||||
18. When implementing extended service areas, how much overlap is suggested? | ||||||||||||||||||
5 to 10 percent | ||||||||||||||||||
10 to 15 percent | ||||||||||||||||||
15 to 20 percent | ||||||||||||||||||
25 to 30 percent | ||||||||||||||||||
19. What technique allows a client to communicate while moving? | ||||||||||||||||||
the ability to shift data rates | ||||||||||||||||||
the ability to vary transmit levels | ||||||||||||||||||
the ability to match the transmit level to the receive level | ||||||||||||||||||
the ability to perform error correction as the signal level changes | ||||||||||||||||||
20. Which three are basic wireless access point parameters? (Choose Three) | ||||||||||||||||||
SSID | ||||||||||||||||||
authentication | ||||||||||||||||||
data exchange rates | ||||||||||||||||||
Transmit band selection | ||||||||||||||||||
RF channel with optional power | ||||||||||||||||||
21. When implementing a WLAN, when should you use WEP? | ||||||||||||||||||
Only if there is an AAA server available | ||||||||||||||||||
When you need the increased security of WEP | ||||||||||||||||||
When you are planning to enable 802.11x authentication | ||||||||||||||||||
Only if the hardware equipment does not support WPA | ||||||||||||||||||
22a. full feature supplicant for both wired and wireless client | ||||||||||||||||||
WZC | ||||||||||||||||||
Cisco Compatible Extension | ||||||||||||||||||
Cisco Secure Services Client | ||||||||||||||||||
22b. Windows operating systems basic wireless supplicant client | ||||||||||||||||||
WZC | ||||||||||||||||||
Cisco Compatible Extension | ||||||||||||||||||
Cisco Secure Services Client | ||||||||||||||||||
22c. more advance wireless client features than those of native operating system | ||||||||||||||||||
WZC | ||||||||||||||||||
Cisco Compatible Extension | ||||||||||||||||||
Cisco Secure Services Client | ||||||||||||||||||
15423 participants so far | ||||||||||||||||||
Number answered correctly: 26 out of 28 |
This site is about layered tcp ip networks. You will not only learn tcp utp protocol, LAN WAN architects, as well as ssh, ssl, ipsec, vlan, vpn, ip routing etc, you will also expect to hands on hub, switch, router, ethernet cable and serial WAN cable.
Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions -Module 3
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment