1.
Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?
Correct Answer
E. Forward the frame out all ports except port 3
Explanation
Based on the CAM table provided, the switch has learned the MAC address 00-00-3D-1F-11-05 and associated it with port 2. When the switch receives the frame shown at the bottom of the exhibit, it will forward the frame out all ports except port 3. This means that the frame will be sent to all connected devices except the one connected to port 3.
2.
Refer to the exhibit. An administrator issues the commands as shown on SwitchB. What is the result for port Fa0/22?
Correct Answer
D. The port is now a member of the default VLAN.
Explanation
The commands "switchport mode access" and "switchport access vlan 1" configure the port as an access port and assign it to VLAN 1. Therefore, the result for port Fa0/22 is that it becomes a member of the default VLAN (VLAN 1).
3.
What is one reason that SSID cloaking is not considered an effective security measure for a wireless network?
Correct Answer
D. An attacker can spoof the SSID simply by using an SSID of NULL in all messages.
Explanation
SSID cloaking is not considered an effective security measure for a wireless network because an attacker can easily spoof the SSID by using an SSID of NULL in all messages. This means that even if the SSID is hidden, the attacker can still impersonate the network by sending out messages with a NULL SSID. Therefore, hiding the SSID does not provide any real protection against unauthorized access to the network.
4.
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?
Correct Answer
B. 192.168.1.22 /28
Explanation
The IP address 192.168.1.22 /28 should be assigned to the new host because it falls within the range of the subnet 192.168.1.16/28. The /28 subnet mask indicates that the network portion of the IP address is 28 bits long, leaving 4 bits for host addresses. Therefore, the valid host addresses in this subnet range from 192.168.1.17 to 192.168.1.30. Since 192.168.1.22 falls within this range, it is the correct IP address to assign to the new host.
5.
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?
Correct Answer
D. This allows web-based configuration tools to be used with the switch.
Explanation
Configuring the switch as an HTTP server allows web-based configuration tools to be used with the switch. This means that the network administrator can access and configure the switch's settings through a web browser, making it easier and more convenient to manage the switch. It eliminates the need for specialized software or command-line interfaces, simplifying the configuration process. By enabling web-based configuration tools, the network administrator can efficiently make changes to the switch's settings and optimize its performance.
6.
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?
Correct Answer
C. Trunking
Explanation
Trunking is the correct answer because it allows multiple VLANs to be carried over a single physical link between switches. By configuring trunking on switch X and switch Y, the host on VLAN 40 on switch X can communicate with the host in VLAN 40 on switch Y by sending and receiving VLAN tagged frames over the trunk link.
7.
Refer to the exhibit. A network administrator has designed and implemented a hierarchical network. What is the maximum network diameter between any two hosts on the network?
Correct Answer
A. 5
Explanation
The maximum network diameter between any two hosts on the network is 5. This means that the maximum number of hops or links that a packet would have to traverse to reach any two hosts on the network is 5.
8.
A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?
Correct Answer
A. Probing
Explanation
The wireless client uses the process of probing to discover the access points that are available to it. During probing, the client sends out broadcast messages to search for nearby access points. These messages are sent on all available channels and the client listens for responses from the access points. This allows the client to identify and establish a connection with the access point that provides the strongest signal and best network conditions.
9.
What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?
Correct Answer
C. Allows the use of straight-through patch cables regardless of connected device types
Explanation
The auto-MDIX feature on a Cisco Catalyst switch allows the use of straight-through patch cables regardless of the connected device types. This means that the switch can automatically detect the type of cable being used (straight-through or crossover) and adjust the connection accordingly. This eliminates the need for manual cable swapping or the use of crossover cables, making network setup and maintenance easier and more convenient.
10.
Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?
Correct Answer
C. The trunk has not been established because the router does not support dynamic trunking protocol.
Explanation
The likely problem is that the trunk has not been established because the router does not support dynamic trunking protocol. This is indicated by the output of the "show interface fa0/1 trunk" command, which shows that the trunking encapsulation is set to "nonegotiate". This means that the router is not negotiating trunking with the switch, which is necessary for the trunk to be established.
11.
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Correct Answer
B. Reconfigure the trunk port on switch SW2 with static trunk configuration.
Explanation
To fix the problem of hosts not being able to communicate between switches SW1 and SW2, the trunk port on switch SW2 needs to be reconfigured with a static trunk configuration. This will ensure that the VLAN information is properly carried across the trunk link, allowing the hosts in the same VLANs connected to switch SW2 to communicate with the hosts connected to switch SW1.
12.
Refer to the exhibit. A network administrator needs to download a previously saved configuration file from the TFTP server to Switch1. Which command will accomplish this task?
Correct Answer
B. Switch1# copy tftp://192.168.0.254/backup-confg nvram:startup-config
Explanation
The correct command to download a previously saved configuration file from the TFTP server to Switch1 is "Switch1# copy tftp://192.168.0.254/backup-confg nvram:startup-config". This command specifies the source file location as the TFTP server at IP address 192.168.0.254 and the destination file location as the startup configuration in the NVRAM of Switch1.
13.
What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?
Correct Answer
D. The switch allows remote connections only after a new RSA key pair is generated.
Explanation
When the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines, the switch deletes the current RSA key pair. As a result, the switch is no longer able to make SSH connections as an SSH client. However, after the key pair is deleted, the switch allows remote connections again once a new RSA key pair is generated.
14.
Which statement about STP network diameter is correct?
Correct Answer
A. STP diameters are restricted by convergence times.
Explanation
The correct answer is that STP diameters are restricted by convergence times. This means that the size of an STP network is limited by how quickly the network can converge after a change in the network topology. If the convergence time is too long, it can lead to network instability and potential disruptions. Therefore, it is important to consider convergence times when designing and implementing STP networks.
15.
In the implementation of PVST+ in a specific VLAN where all switches have default
Correct Answer
A. Root primary
Explanation
The given answer "root primary" suggests that the switch with this configuration will become the root bridge for the specific VLAN in the PVST+ implementation. This is because the "root primary" command is used to manually set a switch as the root bridge with the highest priority. In this case, the switch with this configuration will have a priority of 8192, which is higher than the priority of 2048 set on the other switches. Therefore, it will become the root bridge for the VLAN.
16.
Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?
Correct Answer
C. SW3(config)# vtp domain Cisco1
Explanation
The command "SW3(config)# vtp domain Cisco1" will remedy the problem because it sets the VTP domain name on SW3 to "Cisco1". This ensures that SW3 is in the same VTP domain as SW1 and SW2, allowing VLAN information to propagate properly.
17.
In an attempt to improve switch performance, a network administrator changes the MAC aging time to ten seconds. What is a likely result of this decision?
Correct Answer
C. Unnecessary flooding will slow network performance.
Explanation
By reducing the MAC aging time to ten seconds, the switch will remove MAC addresses from its table after only ten seconds of inactivity. This means that if a device becomes inactive for more than ten seconds, its MAC address will be removed from the table. As a result, when a frame arrives for that device, the switch will flood the frame to all ports, causing unnecessary flooding. This flooding will consume network bandwidth and slow down network performance.
18.
What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?
Correct Answer
C. Divide the computers into separate VLANs on the existing switches.
Explanation
Dividing the computers into separate VLANs on the existing switches is an efficient and cost-effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN. By creating separate VLANs, broadcast traffic is contained within each VLAN, reducing the overall broadcast traffic on the network. This helps to prevent broadcast storms from occurring and spreading throughout the network, which can lead to network congestion and performance issues. Additionally, dividing the computers into separate VLANs allows for better network segmentation and control, as different VLANs can have different access control policies and configurations.
19.
Which value determines if a switch becomes the central point of reference in the spanning tree topology?
Correct Answer
A. Lowest bridge ID
Explanation
The value that determines if a switch becomes the central point of reference in the spanning tree topology is the lowest bridge ID. In the spanning tree protocol, each switch is assigned a unique bridge ID that consists of a priority value and the switch's MAC address. The switch with the lowest bridge ID is selected as the root bridge, which becomes the central point of reference for the spanning tree topology.
20.
Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?
Correct Answer
B. 4
Explanation
Based on the exhibit, the switch is configured with a total of 9 VLANs. However, the question asks for the maximum number of VLANs that can be deleted. Since the switch must always have at least one default VLAN, a maximum of 8 VLANs can be deleted, leaving the default VLAN intact. Therefore, the correct answer is 8.
21.
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
Correct Answer
C. VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.
Explanation
The source of the problem could be that the VTP configuration revision number of SW2 was higher than the configuration revision number of SW1. This indicates that SW2 has a more recent VTP configuration, which would overwrite the configuration on SW1 when they are connected. This could result in the loss of connectivity for all users.
22.
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
Correct Answer
B. The port will transition immediately into forwarding state.
Explanation
The correct answer is that the port will transition immediately into the forwarding state. This is because the port is configured with the "spanning-tree portfast" command, which allows the port to bypass the listening and learning states and go straight into the forwarding state. This command is typically used for ports connected to end devices, such as hosts, to minimize the time it takes for the device to become operational on the network.
23.
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
Correct Answer
D. The switch learned this MAC address from the source address in a frame received on Fa0/18.
Explanation
The term "DYNAMIC" in the output indicates that the MAC address entry was dynamically learned by the switch. This means that the switch learned the MAC address from the source address in a frame received on port Fa0/18. The switch does not have to perform a lookup to determine the final destination port when forwarding a frame to the device with this MAC address. The entry can only be removed from the MAC address table by a network administrator.
24.
Which type of traffic can still be received on a switch interface that is in STP blocking mode?
Correct Answer
A. BPDU frames
Explanation
In STP (Spanning Tree Protocol) blocking mode, the switch interface still allows BPDU (Bridge Protocol Data Unit) frames to be received. BPDU frames are used by switches to exchange information and maintain the spanning tree topology. The blocking mode is a state in STP where the switch interface does not forward any user data frames, including multicast frames, broadcast frames, and Layer 3 packets. However, it still receives and processes BPDU frames to ensure the stability and redundancy of the network.
25.
Refer to the exhibit. Hosts B and C attempt to transmit a frame at the same time, but a collision occurs. Which hosts will receive the collision jamming signal?
Correct Answer
C. Only hosts A, B, and C
Explanation
Hosts A, B, and C will receive the collision jamming signal. This is because all hosts that attempt to transmit a frame at the same time will detect the collision and receive the jamming signal. Hosts D, E, and F are not involved in the collision and will not receive the jamming signal.
26.
Which security protocol or measure would provide the greatest protection for a wireless LAN?
Correct Answer
A. WPA2
Explanation
WPA2 (Wi-Fi Protected Access 2) is the correct answer because it is the most secure security protocol for wireless LANs. It provides strong encryption and authentication, making it difficult for unauthorized users to access the network. Cloaking SSIDs, shared WEP key, and MAC address filtering are all security measures, but they are not as effective as WPA2 in providing protection against potential threats.
27.
Refer to the exhibit. Which statement is true about the status of interface Fa0/1?
Correct Answer
C. The interface is configured to transmit data in half-duplex mode
Explanation
The correct answer is that the interface is configured to transmit data in half-duplex mode. This means that the interface can either transmit or receive data, but not both simultaneously. In half-duplex mode, the interface must wait for a signal to finish transmitting before it can start receiving data. This mode is commonly used in Ethernet networks where collisions can occur if multiple devices try to transmit data at the same time. By configuring the interface in half-duplex mode, collisions can be avoided.
28.
What is the purpose of configuring a switch port as a trunk port?
Correct Answer
C. To transmit data from multiple VLANs through a single port
Explanation
Configuring a switch port as a trunk port allows the transmission of data from multiple VLANs through a single port. This is useful in scenarios where there are multiple VLANs in a network and the switch needs to communicate with devices on different VLANs. By using a trunk port, the switch can tag the data packets with VLAN information, allowing the devices on the other end of the connection to correctly identify and process the data from different VLANs. This simplifies network configuration and management by reducing the number of physical connections required between switches and devices on different VLANs.
29.
In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?
Correct Answer
D. TRANSPARENT
Explanation
A VTP switch is operating in transparent mode if it has been configured to only forward VTP advertisements. In transparent mode, the switch does not participate in VTP updates or advertise its VLAN configuration. It simply forwards VTP advertisements received from other switches to ensure that VLAN information is propagated throughout the network. This mode is commonly used when you want to maintain VLAN consistency across the network but do not want the switch to actively participate in VTP updates.
30.
When implementing a router-on-a-stick, what must be configured on the router to ensure connectivity between different VLANs?
Correct Answer
A. Subinterfaces
Explanation
When implementing a router-on-a-stick, subinterfaces must be configured on the router to ensure connectivity between different VLANs. Subinterfaces allow the router to divide a physical interface into multiple logical interfaces, each associated with a different VLAN. This enables the router to process and route traffic between the VLANs effectively. By configuring subinterfaces, the router can properly tag and route traffic between the VLANs, allowing devices in different VLANs to communicate with each other.
31.
Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?
Correct Answer
B. It will be forwarded out port Fa0/5 only.
Explanation
Switch ST-1 will handle Layer 2 broadcast traffic originating from host A on switch ST-C by forwarding it out port Fa0/5 only. This is because VTP pruning is enabled in the VTP domain, which allows the switch to dynamically remove unnecessary broadcast traffic from trunk links. As host A is not located on the same VLAN as switch ST-1, the broadcast traffic from host A will be pruned and only forwarded out the access port Fa0/5.
32.
Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
Correct Answer
A. AS1 and AS2
Explanation
The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the access switches in the network, which are responsible for connecting end devices such as IP phones. DS1 and DS2 are distribution switches, which connect different access switches together. CS1 is the core switch, which is responsible for routing traffic between different networks. Since the IP phones are end devices, they should connect to the access switches.
33.
Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?
Correct Answer
F. SW F
34.
Why is MAC address filtering considered a poor choice in securing a WLAN?
Correct Answer
B. MAC addresses are easily spoofed.
Explanation
MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. MAC spoofing involves changing the MAC address of a device to mimic the MAC address of an authorized device. This allows unauthorized devices to bypass the filtering mechanism and gain access to the WLAN. Since MAC addresses are not encrypted or authenticated, they can be easily manipulated, making the filtering method ineffective in preventing unauthorized access. Therefore, relying solely on MAC address filtering for WLAN security is not recommended.
35.
Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state? (Choose two.)
Correct Answer(s)
A. This switch is not the root bridge.
C. STP has detected links that create a loop.
Explanation
The Fa0/24 port is placed in the blocking state because the switch is not the root bridge and STP has detected links that create a loop. When a switch is not the root bridge, it needs to determine the best path to reach the root bridge. STP detects links that create a loop and places them in the blocking state to prevent network loops and ensure a loop-free topology.
36.
Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)
Correct Answer(s)
A. Revision number
E. Pruning mode
Explanation
The default value of the VTP configuration on a Cisco 2960 switch includes the revision number and the pruning mode. The revision number represents the version of the VTP database, and the default value is usually 0. The pruning mode determines whether the switch will prune unnecessary VLAN traffic, and the default value is usually disabled.
37.
Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?
Correct Answer
D. The size parameter reset the default buffer size but did not disable access to the buffer.
Explanation
The command "terminal no history size" was entered correctly without any syntax errors, as there were no error messages received. However, the command did not disable access to the command history buffer on the Cisco Catalyst switch. Instead, it only reset the buffer size to its default value. Therefore, the problem is that the size parameter reset the default buffer size but did not disable access to the buffer.
38.
Refer to the exhibit. Which Spanning Tree Protocol version is in effect?
Correct Answer
D. Rapid Spanning Tree Protocol (RSTP)
Explanation
The correct answer is Rapid Spanning Tree Protocol (RSTP). This can be determined by looking at the exhibit, which shows a switch with the "RSTP" label. RSTP is an IEEE standard protocol that provides rapid convergence of the spanning tree in a network. It improves upon the original Spanning Tree Protocol (STP) by reducing the convergence time after a topology change occurs. RSTP is backward compatible with STP and can be used in networks where both protocols are present.
39.
Refer to the exhibit. All switch interfaces are members of the same VLAN. What information is used by Switch1 to determine if incoming frames from the hosts should be forwarded to Router1?
Correct Answer
D. The destination address field in the Ethernet header
Explanation
je NE SUIS PAS CERTAIN DE CETTE REPONSE !!!!
40.
Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?
Correct Answer
B. The transport input command must specify Telnet access.
Explanation
The problem is caused by the fact that the "transport input" command does not specify Telnet access. This command determines which protocols are allowed for remote access to the switch. By not including Telnet in the list of allowed protocols, the switch is not permitting Telnet access, which is why subsequent telnet attempts are not successful.
41.
What provides an authentication mechanism for 802.11-based wireless networks?
Correct Answer
D. WPA
Explanation
WPA (Wi-Fi Protected Access) provides an authentication mechanism for 802.11-based wireless networks. It is a security protocol that ensures secure access and data transmission over Wi-Fi networks. WPA uses encryption and authentication methods to protect the network from unauthorized access and attacks. It provides a stronger and more secure alternative to the previous security protocol, WEP (Wired Equivalent Privacy).
42.
How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?
Correct Answer
B. The frames are assigned to the native VLAN.
Explanation
When a switch configured for 802.1Q trunking receives untagged frames on a trunk port, it assigns them to the native VLAN. The native VLAN is a default VLAN that carries untagged traffic. This allows the switch to handle frames that are not tagged with a VLAN identifier. By assigning these frames to the native VLAN, the switch ensures that they are treated as part of the correct VLAN and can be forwarded appropriately within the network.
43.
Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?
Correct Answer
C. SSH encrypts all remote management communications whereas Telnet does not.
Explanation
It is advisable for a network administrator to use SSH instead of Telnet when managing switches because SSH encrypts all remote management communications, providing a secure way to access and manage the switches. On the other hand, Telnet does not encrypt any data, making it vulnerable to eavesdropping and unauthorized access. By using SSH, sensitive information such as login credentials and commands are protected from being intercepted and compromised. This ensures the confidentiality and integrity of the remote management communications.
44.
What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)
Correct Answer(s)
A. Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment.
B. The physical interface of the router must be connected to a trunk link on the adjacent switch.
Explanation
To configure inter-VLAN routing using the router-on-a-stick model, two requirements must be met. Firstly, each subinterface should have its own IP address, subnet mask, and unique VLAN assignment. This allows the router to route traffic between different VLANs. Secondly, the physical interface of the router must be connected to a trunk link on the adjacent switch. This is necessary to carry traffic from multiple VLANs over a single physical connection. By meeting these requirements, the router can effectively route traffic between different VLANs using the router-on-a-stick model.
45.
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Correct Answer
C. Change the channel on AP-B to 6 or 11
Explanation
Changing the channel on AP-B to 6 or 11 will fix the connectivity problem. This is because AP-A and AP-B should be on different channels to avoid interference. By changing the channel on AP-B to either 6 or 11, it will ensure that there is no overlap in the wireless channels being used by the access points, improving the overall connectivity for users A and B.
46.
What is a function or characteristic of the native VLAN?
Correct Answer
A. It is the VLAN that supports untagged traffic on an 802.1Q trunk.
Explanation
The native VLAN is the VLAN that supports untagged traffic on an 802.1Q trunk. This means that any traffic that is not tagged with a VLAN ID will be treated as belonging to the native VLAN. This allows devices that do not support VLAN tagging to communicate on the trunk. It is important to configure the native VLAN consistently on both ends of the trunk to ensure proper communication.
47.
Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)
Correct Answer(s)
A. An IEEE standard trunking protocol is in use.
B. Interface Fa0/1 has been configured with subinterfaces
E. The configuration is appropriate for a router-on-a-stick network design.
Explanation
The correct answer options are:
1. An IEEE standard trunking protocol is in use: This is indicated by the presence of the "switchport mode trunk" command in the configuration, which enables trunking on the interface.
2. Interface Fa0/1 has been configured with subinterfaces: This is indicated by the presence of the "interface Fa0/1.3" command, which creates a subinterface on Fa0/1.
3. The configuration is appropriate for a router-on-a-stick network design: This can be inferred from the presence of the subinterface and the trunking protocol, which are commonly used in router-on-a-stick setups.
48.
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)
Correct Answer(s)
A. After the end of the jam signal, a backoff algorithm is invoked.
E. If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.
Explanation
When Host 1 and Host 4 transmit data at the same time, a collision will occur on the network. After the collision, a jam signal is sent to notify all hosts on the network. After the jam signal ends, a backoff algorithm is invoked. This algorithm randomly selects a backoff time for each host involved in the collision. The hosts then wait for their backoff time to expire before attempting to transmit again. If a host has data to transmit after its backoff period, it will check to determine if the line is idle before transmitting to avoid another collision. This process helps to manage the network and prevent further collisions.
49.
What is the purpose of VTP pruning?
Correct Answer
A. To restrict traffic on specified trunk lines
Explanation
VTP pruning is used to restrict traffic on specified trunk lines. By enabling VTP pruning, unnecessary broadcast and multicast traffic is prevented from being sent across trunk links to switches that do not require it. This helps to optimize network bandwidth and improve network performance by reducing the amount of unnecessary traffic on trunk lines.
50.
What operational change will occur if an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g?
Correct Answer
B. The 802.11g clients will operate at reduced speeds.
Explanation
When an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g, the operational change that will occur is that the 802.11g clients will operate at reduced speeds. This is because the access point will need to support the slower 802.11b standard in order to accommodate the 802.11b client. As a result, the overall network performance will be impacted, causing the 802.11g clients to experience reduced speeds.