LAN Switching And Wireless

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ssv2
S
Ssv2
Community Contributor
Quizzes Created: 2 | Total Attempts: 379
| Attempts: 152 | Questions: 83
Please wait...
Question 1 / 83
0 %
0/100
Score 0/100
1. What advantage does SSH offer over Telnet when remotely connecting to a device?

Explanation

SSH offers the advantage of encryption over Telnet when remotely connecting to a device. This means that the data transmitted between the client and the server is encrypted, making it difficult for unauthorized individuals to intercept and understand the information being exchanged. In contrast, Telnet sends data in plain text, which can be easily intercepted and read by anyone with access to the network. Encryption provided by SSH ensures the confidentiality and integrity of the data, enhancing the security of the remote connection.

Submit
Please wait...
About This Quiz
LAN Switching And Wireless - Quiz

The 'LAN Switching and Wireless' quiz assesses knowledge in hierarchical network design, convergence of network services, and network analysis. It covers key aspects like traffic control, security policies, and benefits of integrating data, voice, and video, essential for networking professionals.

Personalize your quiz and earn a certificate with your name on it!
2. A switch that uses MAC addresses to forward frames operates at which layer of the OSI model?

Explanation

A switch that uses MAC addresses to forward frames operates at Layer 2 of the OSI model. Layer 2, also known as the Data Link layer, is responsible for the reliable transfer of data between network devices on the same local network. Switches use MAC addresses to identify the source and destination of data frames and forward them accordingly. This layer ensures that data is delivered error-free and in the correct order within a local network.

Submit
3. Refer tot he exhibit.   What does this error message signify?

Explanation

This error message signifies that the data of one of the parameters entered in the command is incorrect.

Submit
4. Define:  Telnet attacks

Explanation

not-available-via-ai

Submit
5. Which method of network authentication provides the highest level of security?

Explanation

WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) provides the highest level of security among the given options. WPA-PSK uses a strong encryption algorithm and requires a pre-shared key (password) to authenticate and access the network. This method ensures that only authorized users with the correct key can connect to the network, making it more secure compared to OPEN, SHARED, and WPA methods.

Submit
6. What mechanism is used to achieve the separation between VLANs as they cross a trunk link?

Explanation

The mechanism used to achieve the separation between VLANs as they cross a trunk link is VLAN tagging using the 802.1Q protocol. This protocol adds a tag to each Ethernet frame, indicating the VLAN to which it belongs. This allows switches to identify and separate the VLAN traffic as it traverses the trunk link, ensuring that frames from different VLANs remain isolated and do not interfere with each other.

Submit
7. What is the effect of entering the banner login #Authorized Personnel Only!# command?

Explanation

The effect of entering the "banner login #Authorized Personnel Only!#" command is that "Authorized Personnel Only!" will appear before the username and password login prompts for any connection.

Submit
8. Define port density

Explanation

Port density refers to the number of ports available on a single switch. It determines the capacity of the switch to connect multiple devices or networks simultaneously. A higher port density means that more devices can be connected to the switch, allowing for greater scalability and flexibility in network configurations. This is particularly important in large-scale networks where a large number of devices need to be connected and managed efficiently. Therefore, port density is a crucial factor to consider when designing and implementing network infrastructure.

Submit
9. Choose the correct description :  Access Point

Explanation

An access point is a device that connects multiple wireless clients or stations to the wired LAN. It acts as a central hub, allowing wireless devices to connect to a wired network and access its resources. This enables multiple devices to connect to the internet or share files and data within the network.

Submit
10. Refer to the exhibit.    What is the recommended overlap between the 2 wireless access to provide proper connectivity for users?

Explanation

The recommended overlap between the 2 wireless access points to provide proper connectivity for users is 10-15%. This means that there should be a 10-15% overlap in coverage between the two access points to ensure seamless connectivity for users as they move between the two areas. This overlap helps to prevent any gaps in coverage and ensures that users do not experience any disruptions in their connection as they transition between the two access points.

Submit
11. Match the authentication method to the correct encryption algorithm or security protocol it would use. OPEN

Explanation

The authentication method "Disabled" does not use any encryption algorithm or security protocol. It means that no authentication is required, and therefore, no encryption algorithm or security protocol is used.

Submit
12. Which 3 options correctly associate a layer of the hierarchical design model with its function? (choose 3)

Explanation

The Distribution layer in the hierarchical design model is responsible for traffic control and implementing security policies. It acts as a middle layer between the Core and Access layers. The Access layer serves as the interface for end devices, providing connectivity and access to the network. Lastly, the Core layer functions as the high-speed backbone, handling the bulk of the network traffic and ensuring efficient communication between different parts of the network.

Submit
13. What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch?

Explanation

The port capacity of a single port on a 48-port Gigabit Ethernet switch would be 1000 Mbps. This is because Gigabit Ethernet supports a data transfer rate of 1000 Mbps, and each port on the switch is capable of handling this speed. Therefore, the correct answer is 1000 Mbps.

Submit
14. Refer to the exhibit.  Brand new switches with empty CAM tables are interconnected via a trunk link.  All hosts on both switches are configured with the VLAN memberships shown.  How is a frame sent from Host A forwarded to Host B?

Explanation

When a frame is sent from Host A, Switch SW1 will tag the frame with VLAN 10 and flood the frame to all hosts on Switch SW2 that are members of VLAN 10. This means that the frame will only be forwarded to the hosts on Switch SW2 that have VLAN 10 configured as their VLAN membership. The other options are incorrect because they either flood the frame to all hosts attached to SW1 (regardless of VLAN membership) or flood the frame to all hosts attached to both switches (regardless of VLAN membership).

Submit
15. Choose the correct VLAN port membership statement to the correct option listed: voice VLAN port membership

Explanation

This statement correctly describes the configuration of a voice VLAN port membership. It states that the access port is attached to an IP phone and is configured to use one VLAN for voice traffic and another VLAN for data traffic. This configuration allows for separate VLANs to be used for voice and data traffic, ensuring efficient and secure communication.

Submit
16. Define:  CDP attacks

Explanation

CDP attacks refer to the act of using proprietary Cisco protocols to gain information about a switch. Cisco Discovery Protocol (CDP) is a network protocol used by Cisco devices to share information about themselves with other devices on the network. In a CDP attack, an attacker leverages these protocols to gather details about the targeted switch, such as its configuration, neighboring devices, and other network-related information. This unauthorized access can potentially compromise the security and integrity of the network.

Submit
17. Trouble shooting:  Match the trouble shooting issue with the correct description Native VLAN mismatch

Explanation

The correct answer is that the VLAN configured for untagged frames is not the same on two switches connected by a trunk. This means that the switches are not properly communicating because they are expecting different VLANs for untagged frames. This can cause connectivity issues and a mismatch in the native VLAN can prevent the trunk from forming.

Submit
18. Choose the correct description :  Wireless NIC

Explanation

The correct answer is "encodes a data stream onto an RF signal using the configured modulation technique." This description accurately explains the function of a Wireless NIC, which is to encode data onto a radio frequency signal using a specific modulation technique. This allows wireless clients or stations to connect to a wired LAN without the need for physical cables.

Submit
19. Which 2 steps are required for a wireless client to associate with an access point? (choose 2)

Explanation

To associate with an access point, a wireless client needs to go through two steps. The first step is wireless client authentication, where the client verifies its identity to the access point. This is typically done through a password or other credentials. The second step is wireless client association, where the client connects to the access point and establishes a network connection. This allows the client to communicate with other devices on the network.

Submit
20. Match the authentication method to the correct encryption algorithm or security protocol it would use. WPA

Explanation

TKIP (Temporal Key Integrity Protocol) is an authentication method commonly used in Wi-Fi networks. It is designed to provide data encryption and integrity checks for enhanced security. TKIP uses the RC4 encryption algorithm to encrypt data packets, making it more secure than the older WEP (Wired Equivalent Privacy) protocol. In contrast, AES (Advanced Encryption Standard) is another encryption algorithm used for securing data, but it is not associated with TKIP. Therefore, TKIP is the correct authentication method to match with the encryption algorithm RC4.

Submit
21. Choose the correct description for the given term: switchport mode access

Explanation

The "switchport mode access" command is used to disable trunk mode on a port. Trunk mode allows for the transmission of multiple VLANs over a single link, while access mode is used to connect a device to a specific VLAN. By setting the switchport mode to access, the port is configured to not function as a trunk and will only transmit traffic for a single VLAN.

Submit
22. Define: DHCP starvation

Explanation

DHCP starvation refers to the act of broadcasting requests for IP addresses with spoofed MAC addresses. This means that the attacker is sending fake requests for IP addresses using MAC addresses that they have manipulated or falsified. By doing this, the attacker can exhaust the available IP addresses in the DHCP pool, preventing legitimate devices from obtaining an IP address and causing a denial of service. This technique is commonly used in network attacks to disrupt network connectivity and cause inconvenience to users.

Submit
23. With respect to network design, what is convergence?

Explanation

Convergence in network design refers to the process of combining conventional data, voice, and video on a common network. This means that instead of having separate networks for each type of communication, they are all integrated into one network infrastructure. This allows for more efficient and cost-effective communication as well as easier management and troubleshooting.

Submit
24. Define link aggregation

Explanation

Link aggregation refers to the ability of a switch to utilize multiple ports simultaneously in order to achieve higher throughput for data communication. By combining the bandwidth of multiple ports, link aggregation allows for increased data transfer rates and improved network performance. This technique is commonly used in scenarios where high data throughput is required, such as in server clusters or for connecting network switches together.

Submit
25. Choose the correct term for the description given:   displays info about a specific VLAN

Explanation

The correct term for the description given, which displays information about a specific VLAN, is "show vlan id". This command specifically shows the details of a particular VLAN by specifying its ID. The other options, such as "show vlan", "show vlan brief", "show interface f0/1 switchport", and "show interface f0/1", do not specifically display information about a specific VLAN.

Submit
26. Choose the correct VLAN port membership statement to the correct option listed: Static VLAN port membership

Explanation

This statement describes static VLAN port membership, which refers to a port on a switch that maintains its assigned VLAN configuration until it is changed manually. This means that the VLAN assigned to the port remains the same unless an administrator manually modifies it.

Submit
27. Define:  MAC address flooding

Explanation

MAC address flooding is a technique used by attackers to overwhelm a switch's Content Addressable Memory (CAM) table with a large number of invalid MAC addresses. By flooding the switch with these addresses, the attacker aims to exhaust the memory resources of the switch, causing it to fail or behave unpredictably. This can lead to a denial of service (DoS) attack, as legitimate network traffic may be dropped or delayed due to the switch's inability to handle the flood of MAC addresses.

Submit
28. Why do cordless devices, such as cordless phones, sometimes interfere with wireless access points?

Explanation

Cordless devices, such as cordless phones, sometimes interfere with wireless access points because they operate at similar frequencies. This similarity in frequencies can lead to signal interference and loss of connectivity for wireless devices trying to connect with an access point.

Submit
29. Switch 1 and Switch 2 are both configd with ports in the Marketing, Sales, Production, and Admin VLANs.  Each VLAN contains 12 users.  How many different subnetworks are needed to address VLANs?

Explanation

To address the VLANs, each VLAN with 12 users needs to be assigned a unique subnet. Since there are 4 VLANs (Marketing, Sales, Production, and Admin), there will be 4 different subnets needed to address each VLAN. Therefore, the correct answer is 4.

Submit
30. Choose the correct term for the description given:   displays detailed info about all VLANs on the switch

Explanation

The correct answer is "show vlan" because this command displays detailed information about all VLANs on the switch. The other options either display information about a specific VLAN (show vlan id), a summary of VLAN information (show vlan brief), or information about a specific interface (show interface f0/1 switchport or show interface f0/1).

Submit
31. Define wire speed

Explanation

Wire speed refers to the maximum data rate that each port on a switch is capable of achieving. It quantifies the performance of the switch by measuring how much data it can process per second. This means that the switch can handle data at its maximum capacity without any loss or delay. Therefore, the correct answer is the data rate that each port on the switch is capable of attaining.

Submit
32. Refer to the exhibit.  Host C is unable to transfer data because it does not have the MAC address of the destination host.  If Host C sends out at ARP request, which of the other hosts will see this message?

Explanation

When Host C sends out an ARP request, it broadcasts the request to all hosts on the network. This means that all other hosts connected to the same network segment will see the ARP request. In this case, Host B is the only other host connected to the same network segment as Host C, so it is the only host that will see the ARP request from Host C.

Submit
33. Choose the correct description for the given term: switchport mode dynamic desirable

Explanation

The "switchport mode dynamic desirable" command configures the port to negotiate a trunk. This means that the port will actively try to form a trunk link with the neighboring switch by sending Dynamic Trunking Protocol (DTP) packets. If the neighboring switch also supports trunking and is configured to negotiate, a trunk link will be established between the switches.

Submit
34. What are some of the features of the AccessLayer? (Choose 3)

Explanation

The Access Layer is responsible for connecting end devices to the network. Power over Ethernet (PoE) allows the Access Layer switches to provide power to devices such as IP phones or wireless access points through the Ethernet cable. VLANs (Virtual Local Area Networks) help in logically segmenting the network into smaller broadcast domains, improving security and efficiency. Port security allows the Access Layer switches to restrict access to specific devices by binding MAC addresses to specific ports, preventing unauthorized access. These three features are commonly found in Access Layer switches to enhance network functionality and security.

Submit
35. Match the authentication method to the correct encryption algorithm or security protocol it would use. WPA2

Explanation

AES (Advanced Encryption Standard) is the correct encryption algorithm for WPA2 (Wi-Fi Protected Access 2). WPA2 uses AES as the encryption algorithm to secure wireless networks. AES is a symmetric encryption algorithm that provides strong security and is widely used in various applications, including Wi-Fi security. It replaces the older and less secure encryption algorithms like RC4 and TKIP, which were used in previous versions of Wi-Fi security protocols. Therefore, the correct answer is AES.

Submit
36. Trouble shooting: Match the trouble shooting issue with the correct description VLAN subnet conflict

Explanation

The given answer suggests that the issue is with two VLANs sharing the same address space. This means that both VLANs have been assigned the same IP address range, causing a conflict. This can lead to connectivity issues and communication problems between devices in these VLANs. To resolve this, the VLANs should be reconfigured with unique IP address ranges to avoid any conflicts.

Submit
37. Match the wireless standard to the correct description. 802.11b

Explanation

802.11b is a wireless standard that specifies data rates of 1, 2, 5.5, and 11 Mbps. These data rates are achieved by using differently sized spreading sequences specified in the Direct Sequence Spread Spectrum (DSSS) modulation technique. DSSS spreads the signal over a wider frequency band, which helps to improve signal quality and reduce interference. By using different spreading sequences, 802.11b is able to achieve different data rates.

Submit
38. To help ensure a secure wireless network, most enterprise networks should follow which IEEE standard?

Explanation

The IEEE standard 802.11i, also known as WPA2 (Wi-Fi Protected Access 2), is specifically designed to provide strong encryption and security measures for wireless networks. It uses advanced encryption algorithms like AES (Advanced Encryption Standard) to protect data transmission and prevent unauthorized access. Therefore, choosing 802.11i helps to ensure a secure wireless network for enterprise environments.

Submit
39. Choose the correct description for:  Switchport port-security maximum

Explanation

The correct answer is "defines the number of MAC addresses associated with a port." This option explains that the "Switchport port-security maximum" command is used to specify the maximum number of MAC addresses that can be associated with a port. It does not mention anything about dropping frames, sending notifications, or making the port errdisabled. Additionally, it does not mention storing dynamically learned MAC addresses in the running config.

Submit
40. Which 2 items contribute to the security of a WLAN?

Explanation

WPA2 and AES contribute to the security of a WLAN. WPA2 is a security protocol that provides encryption and authentication for wireless networks, making it difficult for unauthorized users to access the network. AES (Advanced Encryption Standard) is a cryptographic algorithm used to secure data transmission over the network, ensuring that the information remains confidential and protected from unauthorized access. Both WPA2 and AES work together to enhance the security of a WLAN by encrypting data and providing secure authentication methods.

Submit
41. Choose the correct description for the given term: switchport mode trunk

Explanation

This command "switchport mode trunk" configures the port as a permanent 802.1q trunk. This means that the port will always operate as a trunk and will not negotiate or send DTP (Dynamic Trunking Protocol) packets.

Submit
42. What are some of the features of the Core Layer? (Choose 3)

Explanation

The Core Layer is responsible for high-speed backbone connectivity in a network. Layer 3 support is a feature of the Core Layer as it enables routing between different networks. Redundant components are also a feature of the Core Layer to ensure high availability and fault tolerance. 10 Gigabit Ethernet is another feature of the Core Layer as it provides fast and efficient data transmission.

Submit
43. Refer to the exhibit.   An Ethernet switch has developed the MAC address table shown in blue.  What action will the switch take when it receives the frame shown below the MAC address table?

Explanation

Based on the MAC address table shown in blue, the switch has learned that the destination MAC address in the frame corresponds to interface 1. Therefore, the switch will forward the frame out of interface 1.

Submit
44. What is a feature offered by all stackable switches?

Explanation

A feature offered by all stackable switches is a fully redundant backplane. This means that the switch has multiple physical connections between its modules, allowing for seamless communication and data transfer even if one of the connections fails. This redundancy ensures high availability and reliability in the network, as it eliminates a single point of failure.

Submit
45. Choose the correct description for:  Switchport port-security violation shutdown

Explanation

This answer is correct because when the "Switchport port-security violation shutdown" command is configured on a switch port, frames with unknown source addresses will cause the port to go into an "errdisabled" state. This means that the port is effectively shut down and no traffic is allowed through. Additionally, a notification is sent to the network administrator to alert them of the violation.

Submit
46. Choose the correct description for:  Switchport port-security mac-address sticky

Explanation

The "Switchport port-security mac-address sticky" command allows dynamically learned MAC addresses to be stored in the running config.

Submit
47. Refer to the exhibit.    How many colision and broadcast domains are presented in the network?

Explanation

Based on the given exhibit, we can determine the number of collision and broadcast domains in the network. A collision domain is a network segment where collisions can occur between devices. In this case, there are 12 collision domains because there are 12 separate network segments shown in the exhibit.

A broadcast domain is a network segment where broadcast packets are sent to all devices. We can identify the number of broadcast domains by looking at the routers or layer 3 devices in the network. In this case, there are 5 broadcast domains because there are 5 routers or layer 3 devices shown in the exhibit.

Submit
48. Match the wireless standard to the correct description. 802.11a

Explanation

802.11a uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range. This means that the wireless standard operates on a higher frequency band, which results in less interference from other devices. However, obstacles such as walls or furniture can hinder the signal and reduce the range of the wireless network.

Submit
49. Refer to the exhibit.   Host 1 is connected to port 0/4 with an IP address of  192.168.1.22/28.  Host 2 is connected to port 0/5 with an IP address of 192.168.1.33/28.  Host 3 is connected to port 0/6 with and IP address of 192.168.1.30/28. Select the 3 statements that describe the success of pinging from one host to another.

Explanation

Host 1 and Host 2 are on the same subnet with IP addresses 192.168.1.22/28 and 192.168.1.33/28 respectively. However, they are not in the same network range as the subnet mask is /28. The network range for this subnet is from 192.168.1.16 to 192.168.1.31. Therefore, Host 1 cannot ping Host 2. On the other hand, Host 1 and Host 3 are in the same network range and can communicate with each other. Host 2 and Host 3 are not in the same network range and cannot ping each other.

Submit
50. Which 2 characteristics describe the Core Layer of the hierarchical network design model? (Choose 2)

Explanation

The Core Layer of the hierarchical network design model is responsible for the rapid forwarding of traffic and ensuring redundant paths. It is designed to provide high-speed connectivity between different network segments and to enable efficient and fast communication between devices. Redundant paths help to ensure network reliability and minimize downtime by providing alternative routes for traffic in case of link failures. Rapid forwarding of traffic ensures that data is quickly and efficiently transmitted across the network, reducing latency and improving overall performance.

Submit
51. What does pressing Ctrl+P on the command line do?

Explanation

Pressing Ctrl+P on the command line allows the user to access the command history buffer. This means that it will display the previous command that was entered, allowing the user to easily recall and reuse commands without having to retype them. This can be a time-saving feature, especially when working with complex or lengthy commands.

Submit
52. Define forwarding rate

Explanation

The term "forwarding rate" refers to the processing capabilities of a switch, specifically measuring the performance of the switch by determining how much data it can process per second. It quantifies the ability of the switch to efficiently forward data packets, indicating its processing speed and efficiency. This metric is important in evaluating the performance and capacity of a switch, as a higher forwarding rate indicates a more powerful and capable switch in terms of data processing.

Submit
53. What function is performed by a Cisco access level switch?

Explanation

A Cisco access level switch performs the function of providing Power over Ethernet (PoE). This means that it can supply power to connected devices such as IP phones, wireless access points, or security cameras, eliminating the need for separate power sources. This feature is particularly useful in situations where it may be difficult or impractical to provide individual power sources to each device.

Submit
54. Match the wireless standard to the correct description. 802.11n

Explanation

802.11n uses multiple radios and antennae at endpoints, each broadcasting on the same frequency to establish multiple streams. This allows for higher data rates and improved performance compared to previous wireless standards. By utilizing multiple streams, 802.11n can achieve faster and more reliable wireless connections, making it suitable for applications that require high bandwidth, such as video streaming or online gaming.

Submit
55. At which layer of the OSI model do wireless access points operate?

Explanation

Wireless access points operate at the data link layer of the OSI model. This layer is responsible for the reliable transfer of data between nodes on a network. Wireless access points use protocols such as Ethernet to connect devices to a wireless network, and they handle tasks such as error detection and correction, as well as controlling access to the network through techniques like MAC address filtering.

Submit
56. Choose all characteristics of Extended Range VLAN

Explanation

Extended Range VLANs are VLANs with IDs ranging from 1006 to 4094. These VLANs are not learned by VTP (VLAN Trunking Protocol), which means they are not propagated to other switches in the network. Additionally, Extended Range VLANs do not have a default management VLAN assigned to them. All ports are not automatically members of Extended Range VLANs by default. Lastly, these VLANs contain reserved IDs for Token Ring and FDDI, which are older networking technologies.

Submit
57. Choose the correct description for:  Switchport port-security violation restrict

Explanation

Switchport port-security violation restrict is a feature that drops frames with unknown source addresses and sends a notification. This means that if a frame with an unknown source address is detected, it will be dropped and the network administrator will be notified about the violation. This helps to ensure network security by preventing unauthorized devices from accessing the network.

Submit
58. Which WLAN client settings would be reviewed to resolve encryption problems with the access point?

Explanation

To resolve encryption problems with the access point, reviewing the wireless association properties of the WLAN client settings would be necessary. These properties include the authentication method, encryption type, and passphrase. By checking these settings, any misconfigurations or mismatches with the access point's encryption settings can be identified and corrected, ensuring a secure and encrypted connection between the client and the access point.

Submit
59. What are 2 options to consider when configuring a trunk btween 2 switches? (choose 2)

Explanation

When configuring a trunk between two switches, there are two options to consider. Firstly, port security cannot be configured on the trunk interfaces. Port security is a feature used to restrict access to a switch port based on MAC address, which is not applicable for trunk interfaces. Secondly, the native VLAN must be the same on both ends of the trunk. The native VLAN is the VLAN that is untagged on a trunk link and must match on both switches to ensure proper communication.

Submit
60. Refer to the exhibit.   What can be determined from the command output?

Explanation

From the command output, it can be determined that the system has 32 LB (Long Bytes) of NVRAM.

Submit
61. Choose the correct term for the description given:   displays VLAN info about a specific port

Explanation

The correct term for the description given is "show interface f0/1 switchpot". This command displays VLAN information about a specific port, in this case, port f0/1.

Submit
62. Match the wireless standard to the correct description. 802.11g

Explanation

The correct answer explains that 802.11g uses the 802.11 MAC (Media Access Control) protocol, but with higher data rates in the 2.4 GHz ISM (Industrial, Scientific, and Medical) band by utilizing the OFDM (Orthogonal Frequency Division Multiplexing) modulation technique. This means that 802.11g can achieve faster data transfer speeds compared to previous standards, while still using the same MAC protocol and operating within the 2.4 GHz frequency band. OFDM allows for more efficient data transmission by dividing the signal into multiple subcarriers, reducing interference and increasing overall performance.

Submit
63. Which 2 combinations of 802.11b RF channels would allow 2 wireless APs to operate simultaneoulsy in the same room with no channel overlap? (choose 2)

Explanation

not-available-via-ai

Submit
64. Which term is used for products that are tested to be interoperable in both PSK and 802.11X/Extensible Authentication Protocol (EAP) operation for authentication?

Explanation

Enterprise mode is the term used for products that are tested to be interoperable in both PSK and 802.11X/Extensible Authentication Protocol (EAP) operation for authentication. This mode is typically used in larger organizations where a centralized authentication server, such as a RADIUS server, is used to authenticate users. It allows for more secure and flexible authentication methods, such as certificate-based authentication, compared to the simpler pre-shared key (PSK) authentication used in personal mode.

Submit
65. Choose the correct description for the given term: switchport nonegotiate

Explanation

The "switchport nonegotiate" command is used to configure the trunk to not send Dynamic Trunking Protocol (DTP) packets. DTP is a Cisco proprietary protocol used to negotiate trunking on a link between two switches. By using this command, the switch will not send DTP packets and will not attempt to negotiate trunking with the neighboring switch. This effectively disables DTP and prevents the switch from automatically forming a trunk with the neighboring switch.

Submit
66. Which 3 statements are true about hosts configured in the same VLAN? (choose 3)

Explanation

not-available-via-ai

Submit
67. Trouble shooting: Match the trouble shooting issue with the correct description incorrect VLAN list

Explanation

The correct answer is "not all the VLANs needed are allowed to traverse a trunk." This means that the issue with the troubleshooting is that not all the VLANs that are required are allowed to pass through the trunk connection between the switches. This could be a configuration issue where certain VLANs are not included in the allowed VLAN list for the trunk.

Submit
68. What factor may complicate user communities analysis?

Explanation

User communities analysis may be complicated because application usage is not always limited to specific departments or physical locations. This means that users from different departments or locations may be using the same applications, making it difficult to analyze user behavior based on department or location.

Submit
69. A 12-port switch has been configd to support 3 VLANs named Sales, Marketing, and Finance.  Each VLAN spans 4 ports on the switch.  The network admin has deleted the Marketing VLAN from the switch.  What 2 statements describe the status of the ports associated with this VLAN? (choose 2)

Explanation

The ports are inactive because the Marketing VLAN has been deleted from the switch configuration. However, the ports will remain part of the Marketing VLAN until they are reassigned to another VLAN.

Submit
70. Choose all characteristics of Static VLAN

Explanation

Static VLANs are a type of VLAN where each port is associated with a specific VLAN. This means that each port is assigned to a particular VLAN and remains in that VLAN until manually changed. Manual configuration of port assignments is required for static VLANs, as the administrator needs to specify which ports belong to which VLANs. Additionally, when users move, static VLANs require administrator interaction to update the port assignments for the moved users. This means that there is more administrative overhead involved when users are moved in a static VLAN environment.

Submit
71. Choose the correct description for:  Switchport port-security violation protect

Explanation

The correct description for "Switchport port-security violation protect" is that frames with unknown source addresses are dropped and no notification is sent. This means that if a frame enters the switch with a source address that is not recognized or allowed, the switch will discard the frame and not send any notification about it. This helps to protect the network from unauthorized devices or potential security threats.

Submit
72. Choose all characteristics of Dynamic VLAN

Explanation

Dynamic VLANs allow ports to work out their own configuration, meaning that when a device is connected to a port, it automatically becomes associated with a specific VLAN based on its characteristics. This eliminates the need for manual configuration of port assignments by the administrator. Dynamic VLANs also result in less administrative overhead when users are moved, as the VLAN assignment is based on the device's characteristics rather than its physical location. Additionally, the configuration of dynamic VLANs is based on a database, which contains the necessary information for VLAN assignment.

Submit
73. Choose all characteristics of VLAN 1

Explanation

VLAN 1 is the default management VLAN in a network. It is automatically created on all switches and is used for managing the switch. All ports on a switch are members of VLAN 1 by default, meaning that they are part of this VLAN unless configured otherwise. VLAN 1 does not participate in VTP (VLAN Trunking Protocol) updates, so it is not learned by VTP. It does not contain reserved VLANs for Token Ring and FDDI, which are actually in the range of VLANs 1006-4094.

Submit
74. Trouble shooting: Match the trouble shooting issue with the correct description Trunk mode mismatch

Explanation

The correct answer suggests that the issue in the troubleshooting scenario is that both switches are configured to dynamic auto and will not negotiate a link. This means that the switches are not able to establish a connection because they are both set to automatically negotiate the link, resulting in a mismatch. To resolve this issue, the switches should be reconfigured to a compatible mode, such as dynamic desirable or trunk mode.

Submit
75. What are the analysis actions for User Communities?  (Choose 3)

Explanation

The analysis actions for User Communities include determining the workstation ports required for a department, assessing the intensity of use of a department's application server, and anticipating department port growth. These actions help in understanding the network and infrastructure requirements for a department, ensuring that there are enough resources to support the users and their applications.

Submit
76. Choose the correct VLAN port membership statement to the correct option listed: Dynamic VLAN port membership

Explanation

not-available-via-ai

Submit
77. Match the authentication method to the correct encryption algorithm or security protocol it would use. WEP

Explanation

RC4 is the correct encryption algorithm that would be used for the authentication method of WEP. WEP (Wired Equivalent Privacy) is a security protocol used to secure wireless networks. RC4 (Rivest Cipher 4) is a symmetric encryption algorithm that was commonly used in WEP to encrypt the data transmitted over the network. However, RC4 is now considered to be weak and vulnerable to attacks, and it is recommended to use more secure encryption algorithms like AES (Advanced Encryption Standard) instead. Therefore, the correct answer is RC4.

Submit
78. Choose the correct description :  Wireless Router

Explanation

The correct answer is "connects 2 separated, isolated wired networks together." A wireless router can bridge two separate wired networks together, allowing devices connected to each network to communicate with each other. This is useful in situations where there are multiple wired networks in a location, and wireless connectivity is needed between them.

Submit
79. Choose all characteristics of Normal Range VLAN

Explanation

The Normal Range VLAN includes VLANs numbered from 1 to 1005. It also contains reserved VLANs for Token Ring and FDDI. These VLANs are not learned by VTP, meaning they are not propagated or advertised by the VLAN Trunking Protocol. This range does not include VLANs numbered from 1006 to 4094. Additionally, the Normal Range VLAN has all ports as members by default.

Submit
80. What are the analysis actions for Data Stores and Data Servers?  (Choose 4)

Explanation

The analysis actions for Data Stores and Data Servers include considering network attached storage, data backed up to tape, amount of traffic for a SAN, and amount of server-to-server traffic. These actions help in evaluating and determining the storage and backup requirements, as well as the network traffic and communication patterns between servers. This analysis is crucial for ensuring efficient data management and optimal performance of the data storage and server infrastructure.

Submit
81. Which 3 statements are true about the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) technology? (choose 3)

Explanation

The first statement is true because in CSMA/CD, each station continuously listens for traffic on the medium to determine when gaps between frame transmissions occur and then sends the frame. The second statement is true because stations in an Ethernet LAN domain can begin transmitting anytime they detect that the network is quiet (no traffic). The fourth statement is true because if a collision occurs in an Ethernet LAN domain, transmitting stations stop transmitting and wait a random length of time before attempting to retransmit the frame.

Submit
82. Which 3 WLAN client authentication types require a preprogrammed network key to be set on the client? (choose 3)

Explanation

The three WLAN client authentication types that require a preprogrammed network key to be set on the client are SHARED with data encryption algorithm WEP, WPA-PSK with data encryption algorithm TKIP, and WPA2-PSK with data encryption algorithm AES. These authentication types rely on a pre-shared key (PSK) that is configured on both the client and the access point. This key is used to authenticate the client and establish a secure connection between the client and the network. The other authentication types mentioned do not require a preprogrammed network key and use different methods for authentication and encryption.

Submit
83. What are convergence benefist?  (Choose 3)

Explanation

Convergence benefits refer to the advantages of combining voice, video, and applications in one computer, combining voice and data network staffs, and simplifying network changes. These benefits include easier management and maintenance, as well as the ability to use conventional voice equipment for new VoIP implementations. Additionally, convergence allows for simplified data network configuration and reduces the quality of service configuration requirements.

Submit
View My Results

Quiz Review Timeline (Updated): Oct 5, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 05, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 28, 2011
    Quiz Created by
    Ssv2
Cancel
  • All
    All (83)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What advantage does SSH offer over Telnet when remotely connecting to...
A switch that uses MAC addresses to forward frames operates at which...
Refer tot he exhibit.   What does this error message...
Define:  Telnet attacks
Which method of network authentication provides the highest level of...
What mechanism is used to achieve the separation between VLANs as they...
What is the effect of entering the banner login #Authorized Personnel...
Define port density
Choose the correct description :  Access Point
Refer to the exhibit.    What is the recommended...
Match the authentication method to the correct encryption algorithm or...
Which 3 options correctly associate a layer of the hierarchical design...
What would be the port capacity of a single port on a 48-port Gigabit...
Refer to the exhibit.  Brand new switches with empty CAM tables...
Choose the correct VLAN port membership statement to the correct...
Define:  CDP attacks
Trouble shooting:  Match the trouble shooting issue with the...
Choose the correct description :  Wireless NIC
Which 2 steps are required for a wireless client to associate with an...
Match the authentication method to the correct encryption algorithm or...
Choose the correct description for the given term:...
Define: DHCP starvation
With respect to network design, what is convergence?
Define link aggregation
Choose the correct term for the description given:  ...
Choose the correct VLAN port membership statement to the correct...
Define:  MAC address flooding
Why do cordless devices, such as cordless phones, sometimes interfere...
Switch 1 and Switch 2 are both configd with ports in the Marketing,...
Choose the correct term for the description given:  ...
Define wire speed
Refer to the exhibit.  Host C is unable to transfer data because...
Choose the correct description for the given term:...
What are some of the features of the AccessLayer? (Choose 3)
Match the authentication method to the correct encryption algorithm or...
Trouble shooting: Match the trouble shooting issue with the correct...
Match the wireless standard to the correct description. 802.11b
To help ensure a secure wireless network, most enterprise networks...
Choose the correct description for:  Switchport port-security...
Which 2 items contribute to the security of a WLAN?
Choose the correct description for the given term:...
What are some of the features of the Core Layer? (Choose 3)
Refer to the exhibit.   An Ethernet switch has developed the...
What is a feature offered by all stackable switches?
Choose the correct description for:  Switchport port-security...
Choose the correct description for:  Switchport port-security...
Refer to the exhibit.    How many colision and...
Match the wireless standard to the correct description. 802.11a
Refer to the exhibit.  ...
Which 2 characteristics describe the Core Layer of the hierarchical...
What does pressing Ctrl+P on the command line do?
Define forwarding rate
What function is performed by a Cisco access level switch?
Match the wireless standard to the correct description. 802.11n
At which layer of the OSI model do wireless access points operate?
Choose all characteristics of Extended Range VLAN
Choose the correct description for:  Switchport port-security...
Which WLAN client settings would be reviewed to resolve encryption...
What are 2 options to consider when configuring a trunk btween 2...
Refer to the exhibit.   What can be determined from the...
Choose the correct term for the description given:  ...
Match the wireless standard to the correct description. 802.11g
Which 2 combinations of 802.11b RF channels would allow 2 wireless APs...
Which term is used for products that are tested to be interoperable in...
Choose the correct description for the given term:...
Which 3 statements are true about hosts configured in the same VLAN?...
Trouble shooting: Match the trouble shooting issue with the correct...
What factor may complicate user communities analysis?
A 12-port switch has been configd to support 3 VLANs named Sales,...
Choose all characteristics of Static VLAN
Choose the correct description for:  Switchport port-security...
Choose all characteristics of Dynamic VLAN
Choose all characteristics of VLAN 1
Trouble shooting: Match the trouble shooting issue with the correct...
What are the analysis actions for User Communities?  (Choose 3)
Choose the correct VLAN port membership statement to the correct...
Match the authentication method to the correct encryption algorithm or...
Choose the correct description :  Wireless Router
Choose all characteristics of Normal Range VLAN
What are the analysis actions for Data Stores and Data Servers? ...
Which 3 statements are true about the Carrier Sense Multiple Access...
Which 3 WLAN client authentication types require a preprogrammed...
What are convergence benefist?  (Choose 3)
Alert!

Advertisement