CISCO CCNA Certifications_ CCNA 3_Module 7 (1130907)
Текст из файла
CISCO CCNA Certifications: CCNA 3:Module 7SEARCH BLOGFLAG BLOGNext Blog»Create Blog | Sign InCISCO CCNA CERTIFICATIONSMONDAY, 11 AUGUST 2008CCNA 3:Module 7Options With Highlight Colours are Correct Answer1. Which two conditions have favored adoption of802.11g over 802.11a? (Choose two.)Team Fortress 2ServersGet your affordablehigh quality voiceand game servertoday!GaloreGameServers.Com802.11a suffers from a shorter range than 802.11g.The 2.4 GHz frequency band is not as crowded as the 5 GHzband.802.11a is more susceptible to RF interference from commoncommercial items.802.11a uses a more expensive modulation technique than802.11g.802.11g is backward compatible with 802.11b, but 802.11ais not.Free PeopleSearchFree PeopleSearch.
FindAnyone. Find AnyE Mail Address.Affiliate.www.people---search.com2. Which two statements concerning network securityare accurate? (Choose two.)802.11i uses 3DES for encryption.Open authentication uses no client or AP verification.The 802.11i protocol is functionally identical to WPA.802.11i incorporates a RADIUS server for enterpriseauthentication.A wireless client first associates with an AP and thenauthenticates for network access.3. Which installation method will allow connectivity fora new wireless network?Instant InternetIncome.You can finallychange your life.Replace yourincome withinternet.dianeh.wsYour Ad Here!BIDVERTISER ADSset up WEP on the access point onlyset up open access on both the access point and each deviceconnected to itBLOG ARCHIVEset up full encryption on the access point while leaving each▼ 2008 (90)device connected to the network openset up full encryption on each device of the WLAN while▼ August (37)leaving the access point settings openCISCO CCNA netacad 4semester Questions4.
Refer to the exhibit. When configuring the wireless640 802 CCNA RecommendReadingsaccess point, which setting does the networkadministrator use to configure the unique identifier thathttp://cisco-ccna-certifications.blogspot.com/2008/08/ccna-3module-7.html[10/29/2008 3:25:33 PM]CCNA 2 v4.0 downloadCISCO CCNA Certifications: CCNA 3:Module 7client devices use to distinguish this wireless networkCCNA3 v4.0 downloadfrom others?Network ModeCCNA4 v4.0 download(updated21/7/2008)Network Name (SSID)CCNA 3:Module 7Radio BandCCNA 3:Module 6Wide ChannelCCNA 3:Module 5Standard ChannelCCNA 3:Module 4CCNA 3:Module 35.
Which two statements are true regarding wirelessCCNA 3:Module 2security? (Choose two.)CCNA 3:Module 1MAC address filtering prevents the contents of wirelessframes from being viewable.CCNA 2:Final Set 3Providing a wireless client with the network key allows anCCNA 2:Final Set 2available network to be visible.CCNA 2:Module 11Disabling an access point from broadcasting the SSIDCCNA 2:Module 10prevents the access point from being discovered.CCNA 2:Module 9Default SSIDs on specific manufacturer APs are generallyCCNA 2:Module 8known and may permit hostile wireless connections.CCNA 2:Module 7Manually adding a network and setting the known SSID on aCCNA 2:Module 6wireless client makes the network visible even if the SSID isCCNA 2:Module 5not being broadcast.CCNA 2:Module 46. Wireless users on a network complain about poorCCNA 2:Module 3performance within a small area of a room.
MovingCCNA 2:Module 2away from this area in any direction improvesCCNA 2:Module 1performance dramatically. What is the first step inCCNA 1:Finaldesigning a solution to this problem?CCNA 1:Module 11This might be RF channel overlap, so the technician shouldCCNA 1:Module 10verify the channels in use on each wireless access point andCCNA 1:Module 9change to non-overlapping channels.CCNA 1:Module 8The RF power settings might be set too low on the wirelessCCNA 1:Module 7access points servicing the room.
Increase the RF outputCCNA 1:Module 6power on all wireless access points.Install a new wireless access point in this center area toCCNA 1:Module 5provide coverage.CCNA 1:Module 4Verify that the wireless access points have sufficient in-lineCCNA 1:Module 3power and connectivity to the wired network.CCNA 1:Module 2CCNA 1:Module 17. Which three devices do many wireless routersincorporate? (Choose three.)gateway for connecting to other network infrastructuresbuilt-in Ethernet switchnetwork management station► July (13)► June (13)► May (27)VTP serverwireless access pointVPN concentrator8. Which access method does a wireless access pointLABELSCCNA 1 UPDATED (12)CCNA 2 UPDATED (12)http://cisco-ccna-certifications.blogspot.com/2008/08/ccna-3module-7.html[10/29/2008 3:25:33 PM]CISCO CCNA Certifications: CCNA 3:Module 7use to allow for multiple user connectivity andCCNA 3 UPDATED (7)distributed access?CCNA tieng viet (1)CSMA/CDCCNA1 (16)token passingCCNA2 (20)CSMA/CACCNA3 (10)polling9.
Why is security so important in wireless networks?Wireless networks are typically slower than wired networks.CCNA4 (8)Cisco Exploration 4.0 (3)ebook CCNA (2)Televisions and other devices can interfere with wirelessEbooK_tool_CCNA (7)signals.key_CCNA v4 (3)Wireless networks broadcast data over a medium that allowskey_CCNA4 (13)easy access.Labpro (2)Environmental factors such as thunderstorms can affectwireless networks.10. Which wireless technology standard provides themost compatibility with older wireless standards, buthas greater performance?802.11a802.11b802.11g802.11n11. Which two statements characterize wirelessnetwork security? (Choose two.)A rogue access point represents a security risk for the localnetwork.Wireless networks offer the same security features as wirednetworks.Using encryption prevents unauthorized clients fromassociating with an access point.An attacker needs physical access to at least one networkdevice to launch an attack.With SSID broadcast disabled, an attacker must sniff theSSID before being able to connect.12.
Which network design process identifies where toplace access points?site surveyrisk assessmentscalability designnetwork protocol analysis13. What wireless security feature allows a networkadministrator to configure an access point withwireless NIC unique identifiers so that only these NICscan connect to the wireless network?http://cisco-ccna-certifications.blogspot.com/2008/08/ccna-3module-7.html[10/29/2008 3:25:33 PM]CISCO CCNA Certifications: CCNA 3:Module 7authenticationSSID broadcastingMAC address filteringEAP (Extensible Authentication Protocol)Radius (Remote Authentication Dial-In User Service)14. What will a wireless client transmit to discover theavailable WLAN networks?beaconpasswordprobe requestassociation request15. In a WLAN network, why should wireless accesspoints be implemented with each access point using adifferent channel?to keep users segregated on separate subnetsto control the amount of bandwidth that is utilizedto keep signals from interfering with each otherto keep traffic secure16.
What purpose does authentication serve in aWLAN?converts clear text data before transmissionindicates which channel the data should flow ondetermines that the correct host is utilizing the networkallows the host to choose which channel to use17. What occurs when a rogue access point is added toa WLAN?Authorized access points can transmit excess traffic to rogueaccess points to help alleviate congestion.Unauthorized users can gain access to internal servers, thuscausing a security hole.All traffic that uses the same channel as the rogue accesspoint will be encrypted.All traffic that uses the same channel as the rogue accesspoint will be required to authenticate.18.
What procedure can prevent man-in-the-middleattacks?Force all devices on a WLAN to authenticate and monitor forany unknown devices.Enable access points to send an SSID to each devicewanting to use the network.Configure MAC filtering on all authorized access points.Disable SSID broadcasts.http://cisco-ccna-certifications.blogspot.com/2008/08/ccna-3module-7.html[10/29/2008 3:25:33 PM]CISCO CCNA Certifications: CCNA 3:Module 719. Which function is provided by a wireless accesspoint?dynamically assigns an IP address to the hostprovides local DHCP servicesconverts data from 802.11 to 802.3 frame encapsulationprovides a gateway for connecting to other networks20.
Which major problem does CSMA/CA overcome inwireless networks?bandwidth saturationprivacy concernsmedia contentiondevice interoperability21. What does a wireless access point use to allowWLAN clients to learn which networks are available in agiven area?association responsebeaconkeyprobe requestPOSTED BY SNOWANGEL AT 05:36LABELS: CCNA 3 UPDATED0 COMMENTS:Post a CommentNewer PostHomeOlder PostSubscribe to: Post Comments (Atom)http://cisco-ccna-certifications.blogspot.com/2008/08/ccna-3module-7.html[10/29/2008 3:25:33 PM].
Характеристики
Тип файла PDF
PDF-формат наиболее широко используется для просмотра любого типа файлов на любом устройстве. В него можно сохранить документ, таблицы, презентацию, текст, чертежи, вычисления, графики и всё остальное, что можно показать на экране любого устройства. Именно его лучше всего использовать для печати.
Например, если Вам нужно распечатать чертёж из автокада, Вы сохраните чертёж на флешку, но будет ли автокад в пункте печати? А если будет, то нужная версия с нужными библиотеками? Именно для этого и нужен формат PDF - в нём точно будет показано верно вне зависимости от того, в какой программе создали PDF-файл и есть ли нужная программа для его просмотра.














