LAN Switching And Wireless

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ssv2
S
Ssv2
Community Contributor
Quizzes Created: 2 | Total Attempts: 374
| Attempts: 147
SettingsSettings
Please wait...
  • 1/83 Questions

    What advantage does SSH offer over Telnet when remotely connecting to a device?

    • Encryption
    • More connection lines
    • Connection-oriented services
    • Username and password authentication
Please wait...
About This Quiz

The 'LAN Switching and Wireless' quiz assesses knowledge in hierarchical network design, convergence of network services, and network analysis. It covers key aspects like traffic control, security policies, and benefits of integrating data, voice, and video, essential for networking professionals.

LAN Switching And Wireless - Quiz

Quiz Preview

  • 2. 

    A switch that uses MAC addresses to forward frames operates at which layer of the OSI model?

    • Layer 1

    • Layer 2

    • Layer 3

    • Layer 4

    • Layer 5

    • Layer 6

    Correct Answer
    A. Layer 2
    Explanation
    A switch that uses MAC addresses to forward frames operates at Layer 2 of the OSI model. Layer 2, also known as the Data Link layer, is responsible for the reliable transfer of data between network devices on the same local network. Switches use MAC addresses to identify the source and destination of data frames and forward them accordingly. This layer ensures that data is delivered error-free and in the correct order within a local network.

    Rate this question:

  • 3. 

    Refer tot he exhibit.   What does this error message signify?

    • A parameter is missing

    • The command was entered in the wrong CLI mode

    • The data of one of the parameters is incorrect

    • The command is ambiguous

    Correct Answer
    A. The data of one of the parameters is incorrect
    Explanation
    This error message signifies that the data of one of the parameters entered in the command is incorrect.

    Rate this question:

  • 4. 

    Define:  Telnet attacks

    • Broadcasting requests for IP addresses with spoofed MAC addresses

    • Using proprietary Cisco protocols to gain info about a switch

    • The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses

    • Using brute force password attacks to gain access to a switch

    Correct Answer
    A. Using brute force password attacks to gain access to a switch
  • 5. 

    Which method of network authentication provides the highest level of security?

    • OPEN

    • SHARED

    • WPA

    • WPA-PSK

    Correct Answer
    A. WPA-PSK
    Explanation
    WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) provides the highest level of security among the given options. WPA-PSK uses a strong encryption algorithm and requires a pre-shared key (password) to authenticate and access the network. This method ensures that only authorized users with the correct key can connect to the network, making it more secure compared to OPEN, SHARED, and WPA methods.

    Rate this question:

  • 6. 

    What mechanism is used to achieve the separation between VLANs as they cross a trunk link?

    • VLAN tagging using 802.1Q protocol

    • VLAN tagging using 802.1p protocol

    • VLAN multiplexing

    • VLAN set as native VLAN

    Correct Answer
    A. VLAN tagging using 802.1Q protocol
    Explanation
    The mechanism used to achieve the separation between VLANs as they cross a trunk link is VLAN tagging using the 802.1Q protocol. This protocol adds a tag to each Ethernet frame, indicating the VLAN to which it belongs. This allows switches to identify and separate the VLAN traffic as it traverses the trunk link, ensuring that frames from different VLANs remain isolated and do not interfere with each other.

    Rate this question:

  • 7. 

    What is the effect of entering the banner login #Authorized Personnel Only!# command?

    • #Authorized Personnel Only!# appears after the user logs in

    • Authorized Personnel Only! appears only when the user makes a Telnet connection

    • #Authorized Personnel Only!# appears only when the user enters global config mode

    • Authorized Personnel Only! appears before the username and password login prompts for any connection

    Correct Answer
    A. Authorized Personnel Only! appears before the username and password login prompts for any connection
    Explanation
    The effect of entering the "banner login #Authorized Personnel Only!#" command is that "Authorized Personnel Only!" will appear before the username and password login prompts for any connection.

    Rate this question:

  • 8. 

    Define port density

    • Number of ports available on a single switch

    • Data rate that each port on the switch is capable of attaining

    • Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second

    • Ability to utilize multiple switch ports concurrently for higher throughput data communication

    Correct Answer
    A. Number of ports available on a single switch
    Explanation
    Port density refers to the number of ports available on a single switch. It determines the capacity of the switch to connect multiple devices or networks simultaneously. A higher port density means that more devices can be connected to the switch, allowing for greater scalability and flexibility in network configurations. This is particularly important in large-scale networks where a large number of devices need to be connected and managed efficiently. Therefore, port density is a crucial factor to consider when designing and implementing network infrastructure.

    Rate this question:

  • 9. 

    Choose the correct description :  Access Point

    • Connects multiple wireless clients or stations to the wired LAN

    • Connects 2 separated, isolated wired networks together

    • Encodes a data stream onto an RF signal using the configd modulation technique

    Correct Answer
    A. Connects multiple wireless clients or stations to the wired LAN
    Explanation
    An access point is a device that connects multiple wireless clients or stations to the wired LAN. It acts as a central hub, allowing wireless devices to connect to a wired network and access its resources. This enables multiple devices to connect to the internet or share files and data within the network.

    Rate this question:

  • 10. 

    Refer to the exhibit.    What is the recommended overlap between the 2 wireless access to provide proper connectivity for users?

    • 5 - 10%

    • 10 -15%

    • 15 - 20%

    • 20 - 25%

    Correct Answer
    A. 10 -15%
    Explanation
    The recommended overlap between the 2 wireless access points to provide proper connectivity for users is 10-15%. This means that there should be a 10-15% overlap in coverage between the two access points to ensure seamless connectivity for users as they move between the two areas. This overlap helps to prevent any gaps in coverage and ensures that users do not experience any disruptions in their connection as they transition between the two access points.

    Rate this question:

  • 11. 

    Match the authentication method to the correct encryption algorithm or security protocol it would use. OPEN

    • AES

    • Disabled

    • RC4

    • TKIP

    Correct Answer
    A. Disabled
    Explanation
    The authentication method "Disabled" does not use any encryption algorithm or security protocol. It means that no authentication is required, and therefore, no encryption algorithm or security protocol is used.

    Rate this question:

  • 12. 

    Which 3 options correctly associate a layer of the hierarchical design model with its function? (choose 3)

    • Core -- interface for end devices

    • Distribution -- traffic control and security policies

    • Access -- interface for end devices

    • Distribution -- high-speed backbone

    • Core -- high-speed backbone

    • Access -- implementation of security policies

    Correct Answer(s)
    A. Distribution -- traffic control and security policies
    A. Access -- interface for end devices
    A. Core -- high-speed backbone
    Explanation
    The Distribution layer in the hierarchical design model is responsible for traffic control and implementing security policies. It acts as a middle layer between the Core and Access layers. The Access layer serves as the interface for end devices, providing connectivity and access to the network. Lastly, the Core layer functions as the high-speed backbone, handling the bulk of the network traffic and ensuring efficient communication between different parts of the network.

    Rate this question:

  • 13. 

    What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch?

    • 48 Gbps

    • 10 Mbps

    • 1000 Mbps

    • 100 Mbps

    Correct Answer
    A. 1000 Mbps
    Explanation
    The port capacity of a single port on a 48-port Gigabit Ethernet switch would be 1000 Mbps. This is because Gigabit Ethernet supports a data transfer rate of 1000 Mbps, and each port on the switch is capable of handling this speed. Therefore, the correct answer is 1000 Mbps.

    Rate this question:

  • 14. 

    Refer to the exhibit.  Brand new switches with empty CAM tables are interconnected via a trunk link.  All hosts on both switches are configured with the VLAN memberships shown.  How is a frame sent from Host A forwarded to Host B?

    • Switch SW1 floods the message from Host A to all hosts attached to SW1

    • Switch SW1 floods the message from Host A to all hosts attached to both switches

    • Switch SW1 tags the frame with VLAN 10 and floods the frame to all hosts on switch SW2

    • Switch SW1 tags the frame with VLAN 10 and floods the frame to all hosts on switch SW2 that are members of VLAN 10

    Correct Answer
    A. Switch SW1 tags the frame with VLAN 10 and floods the frame to all hosts on switch SW2 that are members of VLAN 10
    Explanation
    When a frame is sent from Host A, Switch SW1 will tag the frame with VLAN 10 and flood the frame to all hosts on Switch SW2 that are members of VLAN 10. This means that the frame will only be forwarded to the hosts on Switch SW2 that have VLAN 10 configured as their VLAN membership. The other options are incorrect because they either flood the frame to all hosts attached to SW1 (regardless of VLAN membership) or flood the frame to all hosts attached to both switches (regardless of VLAN membership).

    Rate this question:

  • 15. 

    Choose the correct VLAN port membership statement to the correct option listed: voice VLAN port membership

    • Access port attached to a PC, config'd to use one VLAN for voice traffic and another VLAN for data traffic

    • Port on a switch that maintanis its assigned VLAN config'd until it is changed manually

    • Port on a switch using VMPS and associates a port to a VLAN based on the destination MAC address

    • Port on a switch that can change the manually assigned VLAN config'd dynamically

    • Access port attached to an IP phone, config'd to use one VLAN for voice traffic and another VLAN for data traffic

    • Port on a switch using VMPS and associates a port to a VLAN based on the source MAC address

    Correct Answer
    A. Access port attached to an IP phone, config'd to use one VLAN for voice traffic and another VLAN for data traffic
    Explanation
    This statement correctly describes the configuration of a voice VLAN port membership. It states that the access port is attached to an IP phone and is configured to use one VLAN for voice traffic and another VLAN for data traffic. This configuration allows for separate VLANs to be used for voice and data traffic, ensuring efficient and secure communication.

    Rate this question:

  • 16. 

    Define:  CDP attacks

    • Broadcasting requests for IP addresses with spoofed MAC addresses

    • Using proprietary Cisco protocols to gain info about a switch

    • The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses

    • Using brute force password attacks to gain access to a switch

    Correct Answer
    A. Using proprietary Cisco protocols to gain info about a switch
    Explanation
    CDP attacks refer to the act of using proprietary Cisco protocols to gain information about a switch. Cisco Discovery Protocol (CDP) is a network protocol used by Cisco devices to share information about themselves with other devices on the network. In a CDP attack, an attacker leverages these protocols to gather details about the targeted switch, such as its configuration, neighboring devices, and other network-related information. This unauthorized access can potentially compromise the security and integrity of the network.

    Rate this question:

  • 17. 

    Trouble shooting:  Match the trouble shooting issue with the correct description Native VLAN mismatch

    • Both switches are configured to dynamic auto and will not negotiate a link

    • Not all the VLANs needed are allowed to traverse a trunk

    • Two VLANs are sharing the same address space

    • The VLAN configured for untagged frames is not the same on two switches connected by a trunk

    Correct Answer
    A. The VLAN configured for untagged frames is not the same on two switches connected by a trunk
    Explanation
    The correct answer is that the VLAN configured for untagged frames is not the same on two switches connected by a trunk. This means that the switches are not properly communicating because they are expecting different VLANs for untagged frames. This can cause connectivity issues and a mismatch in the native VLAN can prevent the trunk from forming.

    Rate this question:

  • 18. 

    Choose the correct description :  Wireless NIC

    • Connects multiple wireless clients or stations to the wired LAN

    • Connects 2 separated, isolated wired networks together

    • Encodes a data stream onto an RF signal using the configd modulation technique

    Correct Answer
    A. Encodes a data stream onto an RF signal using the configd modulation technique
    Explanation
    The correct answer is "encodes a data stream onto an RF signal using the configured modulation technique." This description accurately explains the function of a Wireless NIC, which is to encode data onto a radio frequency signal using a specific modulation technique. This allows wireless clients or stations to connect to a wired LAN without the need for physical cables.

    Rate this question:

  • 19. 

    Which 2 steps are required for a wireless client to associate with an access point? (choose 2)

    • IP addressing

    • Wireless address translation

    • Wireless client authentication

    • Channel identification

    • Wireless client association

    Correct Answer(s)
    A. Wireless client authentication
    A. Wireless client association
    Explanation
    To associate with an access point, a wireless client needs to go through two steps. The first step is wireless client authentication, where the client verifies its identity to the access point. This is typically done through a password or other credentials. The second step is wireless client association, where the client connects to the access point and establishes a network connection. This allows the client to communicate with other devices on the network.

    Rate this question:

  • 20. 

    Match the authentication method to the correct encryption algorithm or security protocol it would use. WPA

    • AES

    • Disabled

    • RC4

    • TKIP

    Correct Answer
    A. TKIP
    Explanation
    TKIP (Temporal Key Integrity Protocol) is an authentication method commonly used in Wi-Fi networks. It is designed to provide data encryption and integrity checks for enhanced security. TKIP uses the RC4 encryption algorithm to encrypt data packets, making it more secure than the older WEP (Wired Equivalent Privacy) protocol. In contrast, AES (Advanced Encryption Standard) is another encryption algorithm used for securing data, but it is not associated with TKIP. Therefore, TKIP is the correct authentication method to match with the encryption algorithm RC4.

    Rate this question:

  • 21. 

    Choose the correct description for the given term: switchport mode access

    • Configures the port to negotiate a trunk

    • Configures the trunk to not send DTP packets

    • Configures the port as a permanent 802.1q trunk

    • Disables trunk mode

    Correct Answer
    A. Disables trunk mode
    Explanation
    The "switchport mode access" command is used to disable trunk mode on a port. Trunk mode allows for the transmission of multiple VLANs over a single link, while access mode is used to connect a device to a specific VLAN. By setting the switchport mode to access, the port is configured to not function as a trunk and will only transmit traffic for a single VLAN.

    Rate this question:

  • 22. 

    With respect to network design, what is convergence?

    • Implementation of standard equipment sets for LAN design

    • Implementation of core-distribution-access design model for all sites in an enterprise

    • A point in the network where all traffic "converges" before transmission to the destination, normally the core switch

    • Combining conventional data with voice and video on a common network

    Correct Answer
    A. Combining conventional data with voice and video on a common network
    Explanation
    Convergence in network design refers to the process of combining conventional data, voice, and video on a common network. This means that instead of having separate networks for each type of communication, they are all integrated into one network infrastructure. This allows for more efficient and cost-effective communication as well as easier management and troubleshooting.

    Rate this question:

  • 23. 

    Define: DHCP starvation

    • Broadcasting requests for IP addresses with spoofed MAC addresses

    • Using proprietary Cisco protocols to gain info about a switch

    • The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses

    • Using brute force password attacks to gain access to a switch

    Correct Answer
    A. Broadcasting requests for IP addresses with spoofed MAC addresses
    Explanation
    DHCP starvation refers to the act of broadcasting requests for IP addresses with spoofed MAC addresses. This means that the attacker is sending fake requests for IP addresses using MAC addresses that they have manipulated or falsified. By doing this, the attacker can exhaust the available IP addresses in the DHCP pool, preventing legitimate devices from obtaining an IP address and causing a denial of service. This technique is commonly used in network attacks to disrupt network connectivity and cause inconvenience to users.

    Rate this question:

  • 24. 

    Define link aggregation

    • Number of ports available on a single switch

    • Data rate that each port on the switch is capable of attaining

    • Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second

    • Ability to utilize multiple switch ports concurrently for higher throughput data communication

    Correct Answer
    A. Ability to utilize multiple switch ports concurrently for higher throughput data communication
    Explanation
    Link aggregation refers to the ability of a switch to utilize multiple ports simultaneously in order to achieve higher throughput for data communication. By combining the bandwidth of multiple ports, link aggregation allows for increased data transfer rates and improved network performance. This technique is commonly used in scenarios where high data throughput is required, such as in server clusters or for connecting network switches together.

    Rate this question:

  • 25. 

    Choose the correct term for the description given:   displays info about a specific VLAN

    • Show vlan id

    • Show vlan

    • Show vlan brief

    • Show interface f0/1 switchpot

    • Show interface f0/1

    Correct Answer
    A. Show vlan id
    Explanation
    The correct term for the description given, which displays information about a specific VLAN, is "show vlan id". This command specifically shows the details of a particular VLAN by specifying its ID. The other options, such as "show vlan", "show vlan brief", "show interface f0/1 switchport", and "show interface f0/1", do not specifically display information about a specific VLAN.

    Rate this question:

  • 26. 

    Choose the correct VLAN port membership statement to the correct option listed: Static VLAN port membership

    • Access port attached to a PC, config'd to use one VLAN for voice traffic and another VLAN for data traffic

    • Port on a switch that maintanis its assigned VLAN config'd until it is changed manually

    • Port on a switch using VMPS and associates a port to a VLAN based on the destination MAC address

    • Port on a switch that can change the manually assigned VLAN config'd dynamically

    • Access port attached to an IP phone, config'd to use one VLAN for voice traffic and another VLAN for data traffic

    • Port on a switch using VMPS and associates a port to a VLAN based on the source MAC address

    Correct Answer
    A. Port on a switch that maintanis its assigned VLAN config'd until it is changed manually
    Explanation
    This statement describes static VLAN port membership, which refers to a port on a switch that maintains its assigned VLAN configuration until it is changed manually. This means that the VLAN assigned to the port remains the same unless an administrator manually modifies it.

    Rate this question:

  • 27. 

    Define:  MAC address flooding

    • Broadcasting requests for IP addresses with spoofed MAC addresses

    • Using proprietary Cisco protocols to gain info about a switch

    • The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses

    • Using brute force password attacks to gain access to a switch

    Correct Answer
    A. The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses
    Explanation
    MAC address flooding is a technique used by attackers to overwhelm a switch's Content Addressable Memory (CAM) table with a large number of invalid MAC addresses. By flooding the switch with these addresses, the attacker aims to exhaust the memory resources of the switch, causing it to fail or behave unpredictably. This can lead to a denial of service (DoS) attack, as legitimate network traffic may be dropped or delayed due to the switch's inability to handle the flood of MAC addresses.

    Rate this question:

  • 28. 

    Why do cordless devices, such as cordless phones, sometimes interfere with wireless access points?

    • These devices operate at similar frequencies

    • These devices operate at the same frequencies and have higher RF power settings

    • These devices flood the entire frequency spectrum with low power noise, which may cause loss of signal for wireless devices trying to connect with an access point

    • The signal from the cordless device is non-polarized and combines with the access point polarized signal, thus reducing overall signal strength.

    Correct Answer
    A. These devices operate at similar frequencies
    Explanation
    Cordless devices, such as cordless phones, sometimes interfere with wireless access points because they operate at similar frequencies. This similarity in frequencies can lead to signal interference and loss of connectivity for wireless devices trying to connect with an access point.

    Rate this question:

  • 29. 

    Switch 1 and Switch 2 are both configd with ports in the Marketing, Sales, Production, and Admin VLANs.  Each VLAN contains 12 users.  How many different subnetworks are needed to address VLANs?

    • 1

    • 2

    • 4

    • 8

    • 12

    • 24

    Correct Answer
    A. 4
    Explanation
    To address the VLANs, each VLAN with 12 users needs to be assigned a unique subnet. Since there are 4 VLANs (Marketing, Sales, Production, and Admin), there will be 4 different subnets needed to address each VLAN. Therefore, the correct answer is 4.

    Rate this question:

  • 30. 

    Choose the correct term for the description given:   displays detailed info about all VLANs on the switch

    • Show vlan id

    • Show vlan

    • Show vlan brief

    • Show interface f0/1 switchpot

    • Show interface f0/1

    Correct Answer
    A. Show vlan
    Explanation
    The correct answer is "show vlan" because this command displays detailed information about all VLANs on the switch. The other options either display information about a specific VLAN (show vlan id), a summary of VLAN information (show vlan brief), or information about a specific interface (show interface f0/1 switchport or show interface f0/1).

    Rate this question:

  • 31. 

    Define wire speed

    • Number of ports available on a single switch

    • Data rate that each port on the switch is capable of attaining

    • Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second

    • Ability to utilize multiple switch ports concurrently for higher throughput data communication

    Correct Answer
    A. Data rate that each port on the switch is capable of attaining
    Explanation
    Wire speed refers to the maximum data rate that each port on a switch is capable of achieving. It quantifies the performance of the switch by measuring how much data it can process per second. This means that the switch can handle data at its maximum capacity without any loss or delay. Therefore, the correct answer is the data rate that each port on the switch is capable of attaining.

    Rate this question:

  • 32. 

    Refer to the exhibit.  Host C is unable to transfer data because it does not have the MAC address of the destination host.  If Host C sends out at ARP request, which of the other hosts will see this message?

    • Host A

    • Host B

    • Host A and B

    • Host A and D

    • Host B and D

    • Host A, B, and D

    Correct Answer
    A. Host B
    Explanation
    When Host C sends out an ARP request, it broadcasts the request to all hosts on the network. This means that all other hosts connected to the same network segment will see the ARP request. In this case, Host B is the only other host connected to the same network segment as Host C, so it is the only host that will see the ARP request from Host C.

    Rate this question:

  • 33. 

    Choose the correct description for the given term: switchport mode dynamic desirable

    • Configures the port to negotiate a trunk

    • Configures the trunk to not send DTP packets

    • Configures the port as a permanent 802.1q trunk

    • Disables trunk mode

    Correct Answer
    A. Configures the port to negotiate a trunk
    Explanation
    The "switchport mode dynamic desirable" command configures the port to negotiate a trunk. This means that the port will actively try to form a trunk link with the neighboring switch by sending Dynamic Trunking Protocol (DTP) packets. If the neighboring switch also supports trunking and is configured to negotiate, a trunk link will be established between the switches.

    Rate this question:

  • 34. 

    What are some of the features of the AccessLayer? (Choose 3)

    • PoE

    • VLANs

    • 10 Gigabit Ethernet

    • Redundant components

    • Layer 3 support

    • Port security

    Correct Answer(s)
    A. PoE
    A. VLANs
    A. Port security
    Explanation
    The Access Layer is responsible for connecting end devices to the network. Power over Ethernet (PoE) allows the Access Layer switches to provide power to devices such as IP phones or wireless access points through the Ethernet cable. VLANs (Virtual Local Area Networks) help in logically segmenting the network into smaller broadcast domains, improving security and efficiency. Port security allows the Access Layer switches to restrict access to specific devices by binding MAC addresses to specific ports, preventing unauthorized access. These three features are commonly found in Access Layer switches to enhance network functionality and security.

    Rate this question:

  • 35. 

    Match the authentication method to the correct encryption algorithm or security protocol it would use. WPA2

    • AES

    • Disabled

    • RC4

    • TKIP

    Correct Answer
    A. AES
    Explanation
    AES (Advanced Encryption Standard) is the correct encryption algorithm for WPA2 (Wi-Fi Protected Access 2). WPA2 uses AES as the encryption algorithm to secure wireless networks. AES is a symmetric encryption algorithm that provides strong security and is widely used in various applications, including Wi-Fi security. It replaces the older and less secure encryption algorithms like RC4 and TKIP, which were used in previous versions of Wi-Fi security protocols. Therefore, the correct answer is AES.

    Rate this question:

  • 36. 

    Trouble shooting: Match the trouble shooting issue with the correct description VLAN subnet conflict

    • Both switches are configured to dynamic auto and will not negotiate a link

    • Not all the VLANs needed are allowed to traverse a trunk

    • Two VLANs are sharing the same address space

    • The VLAN configured for untagged frames is not the same on two switches connected by a trunk

    Correct Answer
    A. Two VLANs are sharing the same address space
    Explanation
    The given answer suggests that the issue is with two VLANs sharing the same address space. This means that both VLANs have been assigned the same IP address range, causing a conflict. This can lead to connectivity issues and communication problems between devices in these VLANs. To resolve this, the VLANs should be reconfigured with unique IP address ranges to avoid any conflicts.

    Rate this question:

  • 37. 

    Match the wireless standard to the correct description. 802.11b

    • Specifies data rates of 1, 2, 5.5, and 11 Mbps due to differently sized spreading sequences specified in the DSSS modulation technique

    • Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range

    • Uses multiple radios and antennae at endpoints, each broadcasting on the same freq to establish multiple streams

    • Uses the 802.11 MAC, but with higher data rates in the 2.4 GHx ISM band by using the OFDM modulation technique

    Correct Answer
    A. Specifies data rates of 1, 2, 5.5, and 11 Mbps due to differently sized spreading sequences specified in the DSSS modulation technique
    Explanation
    802.11b is a wireless standard that specifies data rates of 1, 2, 5.5, and 11 Mbps. These data rates are achieved by using differently sized spreading sequences specified in the Direct Sequence Spread Spectrum (DSSS) modulation technique. DSSS spreads the signal over a wider frequency band, which helps to improve signal quality and reduce interference. By using different spreading sequences, 802.11b is able to achieve different data rates.

    Rate this question:

  • 38. 

    To help ensure a secure wireless network, most enterprise networks should follow which IEEE standard?

    • 802.11 a

    • 802.11 b

    • 802.11 c

    • 802.11 i

    Correct Answer
    A. 802.11 i
    Explanation
    The IEEE standard 802.11i, also known as WPA2 (Wi-Fi Protected Access 2), is specifically designed to provide strong encryption and security measures for wireless networks. It uses advanced encryption algorithms like AES (Advanced Encryption Standard) to protect data transmission and prevent unauthorized access. Therefore, choosing 802.11i helps to ensure a secure wireless network for enterprise environments.

    Rate this question:

  • 39. 

    Choose the correct description for:  Switchport port-security maximum

    • Frames with unknown source addresses are dropped and notification is sent

    • Frames with unknown source addresses are dropped and no notification is sent

    • Frames with unknown source addresses make the port errdisabled and notification is sent

    • Defines the number of MAC addresses associated with a port

    • Allows dynamically learned MAC addresses to be stored in the running config

    Correct Answer
    A. Defines the number of MAC addresses associated with a port
    Explanation
    The correct answer is "defines the number of MAC addresses associated with a port." This option explains that the "Switchport port-security maximum" command is used to specify the maximum number of MAC addresses that can be associated with a port. It does not mention anything about dropping frames, sending notifications, or making the port errdisabled. Additionally, it does not mention storing dynamically learned MAC addresses in the running config.

    Rate this question:

  • 40. 

    Which 2 items contribute to the security of a WLAN?

    • WPA2

    • Use of multiple channels

    • Hiding the SSID

    • Open authentication

    • AES

    Correct Answer(s)
    A. WPA2
    A. AES
    Explanation
    WPA2 and AES contribute to the security of a WLAN. WPA2 is a security protocol that provides encryption and authentication for wireless networks, making it difficult for unauthorized users to access the network. AES (Advanced Encryption Standard) is a cryptographic algorithm used to secure data transmission over the network, ensuring that the information remains confidential and protected from unauthorized access. Both WPA2 and AES work together to enhance the security of a WLAN by encrypting data and providing secure authentication methods.

    Rate this question:

  • 41. 

    Choose the correct description for the given term: switchport mode trunk

    • Configures the port to negotiate a trunk

    • Configures the trunk to not send DTP packets

    • Configures the port as a permanent 802.1q trunk

    • Disables trunk mode

    Correct Answer
    A. Configures the port as a permanent 802.1q trunk
    Explanation
    This command "switchport mode trunk" configures the port as a permanent 802.1q trunk. This means that the port will always operate as a trunk and will not negotiate or send DTP (Dynamic Trunking Protocol) packets.

    Rate this question:

  • 42. 

    What are some of the features of the Core Layer? (Choose 3)

    • Port security

    • Layer 3 support

    • Redundant components

    • VLANs

    • 10 Gigabit Ethernet

    • PoE

    Correct Answer(s)
    A. Layer 3 support
    A. Redundant components
    A. 10 Gigabit Ethernet
    Explanation
    The Core Layer is responsible for high-speed backbone connectivity in a network. Layer 3 support is a feature of the Core Layer as it enables routing between different networks. Redundant components are also a feature of the Core Layer to ensure high availability and fault tolerance. 10 Gigabit Ethernet is another feature of the Core Layer as it provides fast and efficient data transmission.

    Rate this question:

  • 43. 

    Refer to the exhibit.   An Ethernet switch has developed the MAC address table shown in blue.  What action will the switch take when it receives the frame shown below the MAC address table?

    • Forward the frame out all interfaces

    • Forward the frame out all interfaces except interface 3

    • Discard the frame

    • Forward the frame out interface 1

    • Forward the frame out interface 2

    • Forward the frame out interface 3

    Correct Answer
    A. Forward the frame out interface 1
    Explanation
    Based on the MAC address table shown in blue, the switch has learned that the destination MAC address in the frame corresponds to interface 1. Therefore, the switch will forward the frame out of interface 1.

    Rate this question:

  • 44. 

    What is a feature offered by all stackable switches?

    • Predetermined number of ports

    • Fully redundant backplane

    • Support for Gigabit connectivity

    • Low bandwidth for inter-switch communications

    • PoE capability

    Correct Answer
    A. Fully redundant backplane
    Explanation
    A feature offered by all stackable switches is a fully redundant backplane. This means that the switch has multiple physical connections between its modules, allowing for seamless communication and data transfer even if one of the connections fails. This redundancy ensures high availability and reliability in the network, as it eliminates a single point of failure.

    Rate this question:

  • 45. 

    Choose the correct description for:  Switchport port-security violation shutdown

    • Frames with unknown source addresses are dropped and notification is sent

    • Frames with unknown source addresses are dropped and no notification is sent

    • Frames with unknown source addresses make the port errdisabled and notification is sent

    • Defines the number of MAC addresses associated with a port

    • Allows dynamically learned MAC addresses to be stored in the running config

    Correct Answer
    A. Frames with unknown source addresses make the port errdisabled and notification is sent
    Explanation
    This answer is correct because when the "Switchport port-security violation shutdown" command is configured on a switch port, frames with unknown source addresses will cause the port to go into an "errdisabled" state. This means that the port is effectively shut down and no traffic is allowed through. Additionally, a notification is sent to the network administrator to alert them of the violation.

    Rate this question:

  • 46. 

    Choose the correct description for:  Switchport port-security mac-address sticky

    • Frames with unknown source addresses are dropped and notification is sent

    • Frames with unknown source addresses are dropped and no notification is sent

    • Frames with unknown source addresses make the port errdisabled and notification is sent

    • Defines the number of MAC addresses associated with a port

    • Allows dynamically learned MAC addresses to be stored in the running config

    Correct Answer
    A. Allows dynamically learned MAC addresses to be stored in the running config
    Explanation
    The "Switchport port-security mac-address sticky" command allows dynamically learned MAC addresses to be stored in the running config.

    Rate this question:

  • 47. 

    Refer to the exhibit.    How many colision and broadcast domains are presented in the network?

    • 8 collision domains / 2 broadcast domains

    • 8 collision domains / 3 broadcast domains

    • 12 collision domains / 5 broadcast domains

    • 13 collision domains / 2 broadcast domains

    Correct Answer
    A. 12 collision domains / 5 broadcast domains
    Explanation
    Based on the given exhibit, we can determine the number of collision and broadcast domains in the network. A collision domain is a network segment where collisions can occur between devices. In this case, there are 12 collision domains because there are 12 separate network segments shown in the exhibit.

    A broadcast domain is a network segment where broadcast packets are sent to all devices. We can identify the number of broadcast domains by looking at the routers or layer 3 devices in the network. In this case, there are 5 broadcast domains because there are 5 routers or layer 3 devices shown in the exhibit.

    Rate this question:

  • 48. 

    Match the wireless standard to the correct description. 802.11a

    • Specifies data rates of 1, 2, 5.5, and 11 Mbps due to differently sized spreading sequences specified in the DSSS modulation technique

    • Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range

    • Uses multiple radios and antennae at endpoints, each broadcasting on the same freq to establish multiple streams

    • Uses the 802.11 MAC, but with higher data rates in the 2.4 GHx ISM band by using the OFDM modulation technique

    Correct Answer
    A. Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range
    Explanation
    802.11a uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range. This means that the wireless standard operates on a higher frequency band, which results in less interference from other devices. However, obstacles such as walls or furniture can hinder the signal and reduce the range of the wireless network.

    Rate this question:

  • 49. 

    Refer to the exhibit.   Host 1 is connected to port 0/4 with an IP address of  192.168.1.22/28.  Host 2 is connected to port 0/5 with an IP address of 192.168.1.33/28.  Host 3 is connected to port 0/6 with and IP address of 192.168.1.30/28. Select the 3 statements that describe the success of pinging from one host to another.

    • Host 1 can ping Host 2

    • Host 1 cannot ping Host 2

    • Host 1 can ping Host 3

    • Host 1 cannot ping Host 3

    • Host 2 can ping Host 3

    • Host 2 cannot ping Host 3

    Correct Answer(s)
    A. Host 1 cannot ping Host 2
    A. Host 1 can ping Host 3
    A. Host 2 cannot ping Host 3
    Explanation
    Host 1 and Host 2 are on the same subnet with IP addresses 192.168.1.22/28 and 192.168.1.33/28 respectively. However, they are not in the same network range as the subnet mask is /28. The network range for this subnet is from 192.168.1.16 to 192.168.1.31. Therefore, Host 1 cannot ping Host 2. On the other hand, Host 1 and Host 3 are in the same network range and can communicate with each other. Host 2 and Host 3 are not in the same network range and cannot ping each other.

    Rate this question:

Quiz Review Timeline (Updated): Oct 5, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 05, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 28, 2011
    Quiz Created by
    Ssv2
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.