Sponsor

Advertisment

CCNA 3 – Chapter 4 – Exam Answer 2016 100%

Monday, March 14, 2016

CCNA 3 – Chapter 4 – Wireless LANs Exam Answer 2016 100%

1.Which type of management frame may regularly be broadcast by an AP?

  • probe request
  • probe response
  • beacon
  • authentication

2.Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?

  • WPS
  • MITM
  • SPS
  • MIMO

3.Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

  • access point
  • Ethernet switch
  • RADIUS authentication server
  • repeater
  • WLAN controller

4.Fill in the blank. Do not use abbreviations.
Ad hoc wireless topologies sometimes can use a feature calledtethering to enable a smartphone to create a personal hotspot.

5.Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability of 802.11 products?

  • IEEE
  • Wi-Fi Alliance
  • FCC
  • ITU-R

6.What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

  • directional
  • dish
  • omnidirectional
  • Yagi

7.What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate in a corporate environment?

  • Controller-based APs are used in the corporate environment, and they are server-dependent devices that require an initial configuration to operate.
  • Some corporate AP models can operate in either autonomous mode or controller-based mode.
  • Autonomous APs are used only in the home environment, and they incorporate the functions of a router, switch, and AP into one device.
  • Cisco corporate APs do not support PoE.

8.Place the following actions in the order in which they occur in a shared key authentication process. (Not all options are used.)

CCNA-3-Chapter-4-Exam-Answer
Place the following actions in the order in which they occur in a shared key authentication process. (Not all options are used.)

9.Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?

  • BSS
  • ESS
  • ad hoc WLAN
  • IBISS
  • WiFi Direct

10.A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?

  • control frame
  • management frame
  • beacon frame
  • data frame

11.A WLAN user wants to allocate an optimal amount of bandwidth to a specific online game. What is a Linksys Smart Wi-Fi tool that will allow the user to do this?

  • Speed Test
  • Bandwidth Prioritization
  • Widgets
  • Media Prioritization 

12.During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP?

  • probing
  • encryption
  • authentication
  • discovery
  • association

13.For which discovery mode will an AP generate the most traffic on a WLAN?

  • open mode
  • active mode
  • passive mode
  • mixed mode

14.What is an advantage of SSID cloaking?

  • Clients will have to manually identify the SSID to connect to the network.
  • It is the best way to secure a wireless network.
  • It provides free Internet access in public locations where knowing the SSID is of no concern.
  • SSIDs are very difficult to discover because APs do not broadcast them.

15.If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)

  • 1
  • 3
  • 5
  • 6
  • 8
  • 11

16.Match the type of attack to its description. (Not all options are used.)

CCNA-3-Chapter-4-Exam-Answer
CCNA 3 – Chapter 4 – Wireless LANs Exam Answer 2016 100%

17.Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)

  • 802.11b
  • 802.11n
  • 802.11ac
  • 802.11a
  • 802.11g

18.Which security mode is the least secure choice when a home wireless router is configured?

  • WPA2
  • WPA2-Personal
  • WPA
  • WEP

19.A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this?

  • Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
  • Change to WPA2 authentication.
  • Upgrade the firmware on the AP.
  • Deploy a Wi-Fi Range Extender.

20.A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

  • Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
  • Upgrade the firmware on the wireless access point.
  • Replace the wireless NICs on the computers that are experiencing slow connections.
  • Disable DHCP on the access point and assign static addresses to the wireless clients.

21.An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

  • denial of service
  • spoofing
  • cracking
  • rogue access point

22.Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What is the SSID of the connected network and which message is displayed in the browser window?

  • SSID: Home-Net
    Message:Congratulations! You were able to connect it!
  • SSID: Home-Network
    Message: Good job!
  • SSID: Home-Network
    Message: Well done!
  • SSID: Home-Net
    Message:Congratulations! You did it!

23.Which statement defines the control frame operation between two stations?

  • A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.
  • After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.
  • A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.
  • If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection.

24.What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment?

  • It is used in a full-duplex environment to detect collisions.
  • It allows the client to change transmission channels.
  • It is used to send data over a half-duplex connection.
  • It allows a client to detect whether or not a channel is clear prior to transmission.

25.Fill in the blank. Use the acronym.
Which encryption protocol is used by the WPA2 shared key authentication technique? AES

Read more ...

CCNA 3 – Chapter 3 – Exam Answer 2016 100%

Monday, March 14, 2016

CCNA 3 – Chapter 3 – Link Aggregation Exam Answer 2016 100%

1.Which three options must match in order to establish an EtherChannel between two directly connected switches? (Choose three.)

  • VLAN memberships of the interfaces that are used for EtherChannel
  • speed of the interfaces that are used for EtherChannel
  • duplex settings of the interfaces that are used for EtherChannel
  • port security settings on the interfaces that used for EtherChannel
  • port numbers that are used for the EtherChannel
  • domain names on the switches

2.What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?

  • add more VLANs to reduce broadcast domains
  • insert a router between the switches
  • increase uplink speed
  • aggregate ports by using EtherChannel

3.

CCNA-3-Chapter-3-Exam-Answer
CCNA 3 – Chapter 3 – Link Aggregation Exam Answer 2016 100%

Refer to the exhibit. Which switching technology would allow each access layer switch link to be aggregated to provide more bandwidth between each Layer 2 switch and the Layer 3 switch?

  • PortFast
  • EtherChannel
  • HSRP
  • trunking

4.Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.)

  • destination IP to destination MAC
  • source IP to destination IP
  • destination MAC to source MAC
  • destination IP to source IP
  • destination MAC to destination IP
  • source MAC to destination MAC

5.What is an advantage of using LACP?

  • decreases the chance of a spanning-tree loop
  • provides a simulated environment for testing link aggregation
  • decreases the amount of configuration that is needed on a switch for EtherChannel
  • increases redundancy to Layer 3 devices
  • allows automatic formation of EtherChannel links

6.Which statement is true regarding the use of PAgP to create EtherChannels?

  • It is Cisco proprietary.
  • It increases the number of ports that are participating in spanning tree.
  • It mandates that an even number of ports (2, 4, 6, etc.) be used for aggregation.
  • It requires full duplex.
  • It requires more physical links than LACP does.

7.Match the description to the correct command. (Not all options are used.)

CCNA-3-Chapter-3-Exam-Answer
Match the description to the correct command. (Not all options are used.)

8.Which statement describes an EtherChannel implementation?

  • PAgP cannot be used in conjunction with EtherChannel.
  • EtherChannel can support up to a maximum of ten separate links.
  • EtherChannel operates only at Layer 2.
  • A trunked port can be part of an EtherChannel bundle.

9.Which PAgP mode combination will establish an EtherChannel?

  • switch 1 set to desirable; switch 2 set to desirable.
  • switch 1 set to auto; switch 2 set to on.
  • switch 1 set to on; switch 2 set to desirable.
  • switch 1 set to auto; switch 2 set to auto.

10.

CCNA-3-Chapter-3-Exam-Answer
CCNA 3 – Chapter 3 – Link Aggregation Exam Answer 2016 100%

Refer to the exhibit. The administrator tried to create an EtherChannel between S1 and the other two switches via the commands that are shown, but was unsuccessful. What is the problem?

  • Traffic can only be sent to two different switches if EtherChannel is implemented on Layer 3 switches.
  • Traffic cannot be sent to two different switches, but only to two different devices like an
  • EtherChannel-enabled server and a switch.
  • Traffic can only be sent to two different switches if EtherChannel is implemented on Gigabit Ethernet interfaces.
  • Traffic cannot be sent to two different switches through the same EtherChannel link.

11.When a range of ports is being configured for EtherChannel, which mode will configure LACP so that it initiates the EtherChannel negotiation?

  • auto
  • passive
  • active
  • desirable

12.As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

  • grouping multiple physical ports to increase bandwidth between two switches
  • providing redundant devices to allow traffic to flow in the event of device failure
  • providing redundant links that dynamically block or forward traffic
  • grouping two devices to share a virtual IP address

13.

CCNA-3-Chapter-3-Exam-Answer
CCNA 3 – Chapter 3 – Link Aggregation Exam Answer 2016 100%

Refer to the exhibit. An EtherChannel was configured between switches S1 and S2, but the interfaces do not form an EtherChannel. What is the problem?

  • The switch ports were not configured with speed and duplex mode.
  • The EtherChannel was not configured with the same allowed range of VLANs on each interface.
  • The interface port-channel number has to be different on each switch.
  • The switch ports have to be configured as access ports with each port having a VLAN assigned.

14.Which command will initiate EtherChannel interface configuration mode?

  • interface port-channel interface-identifier
  • interface range interface-identifier
  • channel-group group-identifier
  • interface interface-identifier

15.What is a best practice to use before beginning an EtherChannel implementation?

  • Assign affected interfaces to the management VLAN.
  • Enable each of the affected interfaces.
  • Assign affected interfaces to an unused VLAN.
  • Assign affected interfaces to VLAN 1.
  • Shut down each of the affected interfaces.

16.An EtherChannel link using LACP was formed between two switches, S1 and S2. While verifying the configuration, which mode combination could be utilized on both switches?

  • S1-passive and S2-passive
  • S1-passive and S2-active
  • S1-on and S2-passive
  • S1-on and S2-active

17.Which two protocols are link aggregation protocols? (Choose two.)

  • PAgP
  • EtherChannel
  • RSTP
  • 802.3ad
  • STP

18.When a range of ports is being configured for EtherChannel by the use of PAgP, which mode will form the bundled channel only if the port receives PAgP packets from another device?

  • auto
  • passive
  • active
  • desirable

19.

CCNA-3-Chapter-3-Exam-Answer
CCNA 3 – Chapter 3 – Link Aggregation Exam Answer 2016 100%

Refer to the exhibit. A network administrator has decided that an EtherChannel between ports 0/1 and 0/2 on switches S1 and S2 would help performance. After making the configuration, the administrator notices no performance gain. Based on the output that is shown, what two possible assumptions could a network administrator make? (Choose two.)

  • The EtherChannel bundle is not working.
  • Switch S2 did not use a compatible EtherChannel mode.
  • LACP and PAgP were both used to form the EtherChannel.
  • Switch S2 must be configured so that the maximum number of port channels is increased.
  • The EtherChannel bundle is working.
  • One of the ports on S2 was not configured correctly.

20.Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What are two reasons why the ping messages that are issued from Laptop0 towards Laptop1 are failing? (Choose two.)

  • The wrong cable types are connecting the two switches.
  • The channel group should be configured as a trunk on each switch.
  • The two interfaces on each of the switches belong to different VLANs.
  • The channel group mode is not set correctly on the switches.
  • The interface VLAN 1 is shut down on both switches.

21.The trunk link between two 2960 switches has reached its capacity. How can this be addressed in the most economical way?

  • Combine physical ports into a high-speed logical link by configuring EtherChannel.
  • Increase the speed of the ports.
  • Decrease the size of the inter-switch collision domain by configuring additional VLANs.
  • Create additional broadcast domains by inserting a router between the switches.

22.A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode passive. Which command must be used on SW2 to enable this EtherChannel?

  • SW2(config-if-range)# channel-group 1 mode desirable
  • SW2(config-if-range)# channel-group 1 mode auto
  • SW2(config-if-range)# channel-group 1 mode passive
  • SW2(config-if-range)# channel-group 1 mode active

23.Which statement describes a characteristic of EtherChannel?

  • It can combine up to a maximum of 4 physical links.
  • It can bundle mixed types of 100 Mb/s and 1Gb/s Ethernet links.
  • It consists of multiple parallel links between a switch and a router.
  • It is made by combining multiple physical links that are seen as one link between two switches.

24.What are two advantages of using LACP? (Choose two.)

  • allows use of multivendor devices
  • increases redundancy to Layer 3 devices
  • eliminates the need for the spanning-tree protocol
  • allows automatic formation of EtherChannel links
  • provides a simulated environment for testing link aggregation
  • decreases the amount of configuration that is needed on a switch for EtherChannel

Read more ...