CCNA_3_UPD (1130970)
Текст из файла
CISCO CCNA Certifications: CCNA 3 UPDATEDfile:///D:/botalka/%D1%81%D0%B8%D1%81%D1%8C%D0%BA...CISCO CCNA CertificationsHomeEntries (RSS)Ads by AdBriteComments (RSS)Ads by AdBriteOfficial Cisco TrainingCCNA / CCNP / CCVP / CCIE Start from Any Datewww.koenig-solutions.comIELTS ExamAim for a high IELTS Score. Online study course and practicetests.www.scottsenglish.comCCENT Class $295Self-Paced Training Class Led By CCIEs! Try It For Free Nowwww.InternetworkExpert.comВидео-уроки от MicrosoftОнлайн-доклады по Windows 7, Vista, XP, Office 2007www.techdays.ruAdvertise on thissiteСтр. 1 из 17Powered ByAdBriteAdvertise on thissiteElement Netwrx CiscoVisit Element Save On Cisco 50% off Save $Buy Used CiscoElement NetwrxPowered ByAdBritewww.elementnetwrx.comCNC Router Hanter TechCNC/Laser Cutter한터테크놀러지 국산조각기/라우터 CNC Router/Engraverwww.hanter.krFastPulse / LasermetricsPockels cells, Q-switches & Drivers E-O Laser Pulse Pickers &Choppersfastpulse.comEthernet switchRuggedCom Reliability & Performance For the HarshestEnvironmentswww.RuggedCom.com05:36CCNA 3:Module 7Ads by AdBritePOSTED BY ADMINOptions With Highlight Colours are Correct Answer1.
Which two conditions have favored adoption of 802.11g over 802.11a?(Choose two.)802.11a suffers from a shorter range than 802.11g.The 2.4 GHz frequency band is not as crowded as the 5 GHz band.802.11a is more susceptible to RF interference from common commercial items.802.11a uses a more expensive modulation technique than 802.11g.802.11g is backward compatible with 802.11b, but 802.11a is not.2.
Which two statements concerning network security are accurate?(Choose two.)802.11i uses 3DES for encryption.Open authentication uses no client or AP verification.The 802.11i protocol is functionally identical to WPA.802.11i incorporates a RADIUS server for enterprise authentication.A wireless client first associates with an AP and then authenticates for networkaccess.Advertise on thissitePowered ByAdBrite3. Which installation method will allow connectivity for a new wirelessnetwork?set up WEP on the access point onlyset up open access on both the access point and each device connected to itset up full encryption on the access point while leaving each device connected to thenetwork openset up full encryption on each device of the WLAN while leaving the access pointsettings open4.
Refer to the exhibit. When configuring the wireless access point, whichsetting does the network administrator use to configure the uniqueidentifier that client devices use to distinguish this wireless network fromothers?Network ModeNetwork Name (SSID)Radio BandWide Channel01.04.2009 0:46CISCO CCNA Certifications: CCNA 3 UPDATEDfile:///D:/botalka/%D1%81%D0%B8%D1%81%D1%8C%D0%BA...Standard Channel5.
Which two statements are true regarding wireless security? (Choosetwo.)MAC address filtering prevents the contents of wireless frames from being viewable.Providing a wireless client with the network key allows an available network to bevisible.Disabling an access point from broadcasting the SSID prevents the access point frombeing discovered.Default SSIDs on specific manufacturer APs are generally known and may permithostile wireless connections.Manually adding a network and setting the known SSID on a wireless client makesthe network visible even if the SSID is not being broadcast.6.
Wireless users on a network complain about poor performance within asmall area of a room. Moving away from this area in any direction improvesperformance dramatically. What is the first step in designing a solution tothis problem?This might be RF channel overlap, so the technician should verify the channels in useon each wireless access point and change to non-overlapping channels.The RF power settings might be set too low on the wireless access points servicingthe room. Increase the RF output power on all wireless access points.Install a new wireless access point in this center area to provide coverage.Verify that the wireless access points have sufficient in-line power and connectivityto the wired network.7.
Which three devices do many wireless routers incorporate? (Choosethree.)gateway for connecting to other network infrastructuresbuilt-in Ethernet switchnetwork management stationVTP serverwireless access pointVPN concentratorYour Ad Here8. Which access method does a wireless access point use to allow formultiple user connectivity and distributed access?CSMA/CDtoken passingCSMA/CApollingYour Ad HereCategoriesCCNA 1 UPDATED (12)CCNA 2 UPDATED (12)Cisco Ccna Test YourselfInc.
Syngress Medi...Best Price $165.11or Buy NewPrivacy Information9. Why is security so important in wireless networks?Wireless networks are typically slower than wired networks.Televisions and other devices can interfere with wireless signals.Wireless networks broadcast data over a medium that allows easy access.Environmental factors such as thunderstorms can affect wireless networks.10. Which wireless technology standard provides the most compatibilitywith older wireless standards, but has greater performance?802.11a802.11b802.11g802.11n11.
Which two statements characterize wireless network security? (Choosetwo.)A rogue access point represents a security risk for the local network.Wireless networks offer the same security features as wired networks.Using encryption prevents unauthorized clients from associating with an accesspoint.An attacker needs physical access to at least one network device to launch anattack.With SSID broadcast disabled, an attacker must sniff the SSID before being able toconnect.CCNA 3 UPDATED (7)CCNA tieng viet (1)CCNA1 (16)CCNA2 (20)CCNA3 (10)CCNA4 (8)Cisco Exploration 4.0(3)ebook CCNA (2)EbooK_tool_CCNA (7)key_CCNA v4 (3)key_CCNA4 (13)Labpro (2)12.
Which network design process identifies where to place access points?site surveyrisk assessmentscalability designnetwork protocol analysis13. What wireless security feature allows a network administrator toconfigure an access point with wireless NIC unique identifiers so that onlythese NICs can connect to the wireless network?authenticationSSID broadcastingMAC address filteringEAP (Extensible Authentication Protocol)Radius (Remote Authentication Dial-In User Service)14. What will a wireless client transmit to discover the available WLANnetworks?beaconpasswordC ISC O C C NA C e rtific a tio ns - © De s ign by J ins o na .C o nv e rt e d t o Blo gge r by Blo gge r T e m plat e sСтр.
2 из 17TO P01.04.2009 0:46CISCO CCNA Certifications: CCNA 3 UPDATEDfile:///D:/botalka/%D1%81%D0%B8%D1%81%D1%8C%D0%BA...probe requestassociation request15. In a WLAN network, why should wireless access points be implementedwith each access point using a different channel?to keep users segregated on separate subnetsto control the amount of bandwidth that is utilizedto keep signals from interfering with each otherto keep traffic secure16.
What purpose does authentication serve in a WLAN?converts clear text data before transmissionindicates which channel the data should flow ondetermines that the correct host is utilizing the networkallows the host to choose which channel to use17. What occurs when a rogue access point is added to a WLAN?Authorized access points can transmit excess traffic to rogue access points to helpalleviate congestion.Unauthorized users can gain access to internal servers, thus causing a security hole.All traffic that uses the same channel as the rogue access point will be encrypted.All traffic that uses the same channel as the rogue access point will be required toauthenticate.18.
What procedure can prevent man-in-the-middle attacks?Force all devices on a WLAN to authenticate and monitor for any unknown devices.Enable access points to send an SSID to each device wanting to use the network.Configure MAC filtering on all authorized access points.Disable SSID broadcasts.19. Which function is provided by a wireless access point?dynamically assigns an IP address to the hostprovides local DHCP servicesconverts data from 802.11 to 802.3 frame encapsulationprovides a gateway for connecting to other networks20.
Which major problem does CSMA/CA overcome in wireless networks?bandwidth saturationprivacy concernsmedia contentiondevice interoperability21. What does a wireless access point use to allow WLAN clients to learnwhich networks are available in a given area?association responsebeaconkeyprobe requestcomments (0)TOP05:35CCNA 3:Module 6POSTED BY ADMINOptions With Highlight Colours are Correct Answer1. Refer to the exhibit. Which three statements describe the network designshown in the exhibit? (Choose three.)This design will not scale easily.The router merges the VLANs into a single broadcast domain.This design uses more switch and router ports than are necessary.This design exceeds the maximum number of VLANs that can be attached to aswitch.This design requires the use of the ISL or 802.1q protocol on the links between theswitch and the router.If the physical interfaces between the switch and router are operational, the deviceson the different VLANs can communicate through the router.2.
Характеристики
Тип файла PDF
PDF-формат наиболее широко используется для просмотра любого типа файлов на любом устройстве. В него можно сохранить документ, таблицы, презентацию, текст, чертежи, вычисления, графики и всё остальное, что можно показать на экране любого устройства. Именно его лучше всего использовать для печати.
Например, если Вам нужно распечатать чертёж из автокада, Вы сохраните чертёж на флешку, но будет ли автокад в пункте печати? А если будет, то нужная версия с нужными библиотеками? Именно для этого и нужен формат PDF - в нём точно будет показано верно вне зависимости от того, в какой программе создали PDF-файл и есть ли нужная программа для его просмотра.















