[{"_component":"text","_classes":"no-element-backgrounds","_isOptional":false,"_isAvailable":true,"title":"Text","displayTitle":"","_headingLevel":1,"body":"<h1><span><span style=\"color:#ffffff\"><span>Checkpoint Exam: L2 Security and WLANs Exam</span></span></span></h1>","_id":"2078d853b3b94c2a8b387dfed130440f","_parentId":"02315194620649018ac22fcc46406513","_type":"component","_layout":"left","_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":false,"_isCompletionIndicatorEnabled":false},"_search":{"_isEnabled":true,"keywords":""},"instruction":""},{"_component":"text","_classes":"","_isOptional":false,"_isAvailable":true,"title":"Checkpoint Exam: L2 Security and WLANs Exam","displayTitle":"","body":"<p>This exam will cover material from Modules 10 - 13 of the CCNA2 - Switching, Routing and Wireless Essentials v7.0 (SRWE) curriculum.<br /><br />&#169; 2023, Cisco Systems, Inc.</p>","_id":"542c946f44be468c80e9cacb2dde831f","_parentId":"37e14498d3b244d6a24467134fe144b7","_type":"component","_layout":"full","_onScreen":{"_isEnabled":true,"_classes":"animated fadeIn","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":false,"_isCompletionIndicatorEnabled":false},"_mentor":{"_isEnabled":false,"_registeredMentors":[]},"_search":{"_isEnabled":true,"keywords":""},"_healthGauge":{"_isEnabled":false,"_onCorrectValue":1,"_onPartiallyCorrectValue":1,"_onIncorrectValue":1},"instruction":""},{"_component":"text","_classes":"background-colour3 remove-padding-top no-element-backgrounds","_isOptional":false,"_isAvailable":true,"title":"Text","displayTitle":"","body":"<p><span style=\"color:#ffffff\">Scroll to begin<i class=\"fa fa-arrow-circle-down\"> </i></span></p>","_id":"d9f757368fdb419788f4d3f4c18df8e4","_parentId":"ca1659d7a39245daa875f18e4b78b2ae","_type":"component","_layout":"left","_onScreen":{"_isEnabled":true,"_classes":"animated pulse infinite","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":false,"_isCompletionIndicatorEnabled":false},"_search":{"_isEnabled":true,"keywords":""},"instruction":""},{"_component":"adaptiveStartScreen","_classes":"assessment-start-screen","_isOptional":false,"_isAvailable":true,"_isHidden":false,"_isVisible":true,"_ariaLevel":0,"_disableAccessibilityState":false,"title":"","displayTitle":"","body":"","_id":"76de799266984b38b5fe5b6b9900d7d1","_parentId":"c4c3b3222e9a44129be4125368393971","_type":"component","_layout":"full","secureAssessmentV2":true,"_labels":{"_topContainer":{"topIcon":{"src":"./assets/complete-mark.svg","alt":"alt text"},"title":"Congratulations","description":"You have successfully completed the My Knowledge Check activity.","preSubText":"You can view My Knowledge Check History by clicking on the ","afterSubText":"button.","viewDiagnosticBtnLabel":"My Knowledge Check History","preSkillText":"If you would like, you can retake the","preSkillTextBtnLabel":"My Knowledge Check","viewDiagnosticBtnIcon":{"src":"./assets/bars.svg","alt":"alt text"}},"_introScreen":{"bottomIcon":{"src":"./assets/thinking.png","alt":"alt text"},"title":"","moduleTitle":"Checkpoint Exam: L2 Security and WLANs Exam","description":"","instructionTitle":"Instructions:","instructionDesc":"<p><ul><li>The exam consists of <b><span class='secure-question-count'>30</span></b> questions and <b><span class='secure-passing-score'>70</span></b>% is required to pass.</li><li>You have <b><span class='secure-attempts'>unlimited</span> <span class='secure-attempt-text'>attempts</span> </b>to pass the exam.</li> <li class='secure-dynamic-time'>You have <b><span class='secure-time'>no</span></b> per attempt to pass the exam.</li><li class='secure-static-intruction'>You have <b>no</b> time limit per attempt to pass the exam.</li><li class='secure-note'>Your responses will be automatically submitted once the given time has elapsed.</li></ul></p>","startTestBtnLabel":"Start"}}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><img loading=\"eager\" src=\"en-US/assets/i357055n1v1.png\" alt=\"Router R1 connects to switch S1 port Fa0/24 through the Fa0/1 interface. The S1 Fa0/2 port is used to connect the host labeled PC1. The following command output is given: S1# show port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action                            (Count)             (Count)        (Count) ----------------------------------------------------------------------------------------------------         Fa0/1                    1                  0                      0              Shutdown         Fa0/2                    1                  1                      1              Shutdown ------------------------------------------------------------------------------------------------ Total Addresses in System (excluding one mac per port)        : 0 Max Addresses limit in System (excluding one mac per port) : 8192 S1#\" style=\"min-width: 50%;\"></p><p><span style=\"color:#000000\">Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the <b>switchport port-security mac-address 0023.189d.6456</b> command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?</span></p>","_id":"55843ab2e31c41228a8d283819f7ef59","_parentId":"a43cb7bde89042f38f300d356d5a0352","_type":"component","_layout":"full","_ravennaSourceID":"179950","_smvWiseScoring":{"ident":"it_179950","outcomes":{"decvar":[{"_varname":"562350","_maxvalue":1,"title":"correctness of response"},{"_varname":"595914","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"562350","_view":"All","interpret":"1 point for Option 40 points for any other option"},{"_varname":"595914","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"The connection between S1 and PC1 is via a crossover cable.","_shouldBeSelected":false,"feedback":""},{"text":"The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface.","_shouldBeSelected":false,"feedback":""},{"text":"S1 has been configured with a <b>switchport port-security aging</b> command.","_shouldBeSelected":false,"feedback":""},{"text":"The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The security violation counter for Fa0/2 has been incremented (evidenced by the 1 in the SecurityViolation column). The most secure addresses allowed on port Fa0/2 is 1 and that address was manually entered. Therefore, PC1 must have a different MAC address than the one configured for port Fa0/2. Connections between end devices and the switch, as well as connections between a router and a switch, are made with a straight-through cable.","_incorrect":{"final":"The security violation counter for Fa0/2 has been incremented (evidenced by the 1 in the SecurityViolation column). The most secure addresses allowed on port Fa0/2 is 1 and that address was manually entered. Therefore, PC1 must have a different MAC address than the one configured for port Fa0/2. Connections between end devices and the switch, as well as connections between a router and a switch, are made with a straight-through cable.","notFinal":""},"_partlyCorrect":{"final":"The security violation counter for Fa0/2 has been incremented (evidenced by the 1 in the SecurityViolation column). The most secure addresses allowed on port Fa0/2 is 1 and that address was manually entered. Therefore, PC1 must have a different MAC address than the one configured for port Fa0/2. Connections between end devices and the switch, as well as connections between a router and a switch, are made with a straight-through cable.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?</span></p>","_id":"95c8ea05ba8f4715946a765f38d34f58","_parentId":"6a54032139164f7692d5d25ca1be5ea1","_type":"component","_layout":"full","_ravennaSourceID":"208131","_smvWiseScoring":{"ident":"it_208131","outcomes":{"decvar":[{"_varname":"470755","_maxvalue":1,"title":"correctness of response"},{"_varname":"470991","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"470755","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"470991","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Configure encryption on the wireless router and the connected wireless devices.","_shouldBeSelected":false,"feedback":""},{"text":"Disable the wireless network SSID broadcast.","_shouldBeSelected":false,"feedback":""},{"text":"Change the default user-name and password of the wireless router.","_shouldBeSelected":true,"feedback":""},{"text":"Enable MAC address filtering on the wireless router.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network.","_incorrect":{"final":"The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network.","notFinal":""},"_partlyCorrect":{"final":"The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator is required to upgrade wireless access to end users in a building.&#160;To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?</span></p>","_id":"e6cb258d22904617a45b6d3f8a764ef6","_parentId":"955a457cbdb846918c1153482d046324","_type":"component","_layout":"full","_ravennaSourceID":"209838","_smvWiseScoring":{"ident":"it_209838","outcomes":{"decvar":[{"_varname":"479549","_maxvalue":1,"title":"correctness of response"},{"_varname":"479550","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"479549","_view":"All","interpret":"1 point for Option 20 points for any other option"},{"_varname":"479550","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"802.11n","_shouldBeSelected":false,"feedback":""},{"text":"802.11ac","_shouldBeSelected":true,"feedback":""},{"text":"802.11g","_shouldBeSelected":false,"feedback":""},{"text":"802.11b","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"802.11ac provides data rates up to 1.3 Gb/s and is still backward compatible with 802.11a/b/g/n devices. 802.11g and 802.11n are older standards that cannot reach speeds over 1Gb/s. 802.11ad is a newer standard that can offer theoretical speeds of up to 7 Gb/s.","_incorrect":{"final":"802.11ac provides data rates up to 1.3 Gb/s and is still backward compatible with 802.11a/b/g/n devices. 802.11g and 802.11n are older standards that cannot reach speeds over 1Gb/s. 802.11ad is a newer standard that can offer theoretical speeds of up to 7 Gb/s.","notFinal":""},"_partlyCorrect":{"final":"802.11ac provides data rates up to 1.3 Gb/s and is still backward compatible with 802.11a/b/g/n devices. 802.11g and 802.11n are older standards that cannot reach speeds over 1Gb/s. 802.11ad is a newer standard that can offer theoretical speeds of up to 7 Gb/s.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><img loading=\"eager\" src=\"en-US/assets/i211261v1n1_211261.jpg\" alt=\"A PC connects to an IP phone that connects to a switch through port Fa0/2.\" style=\"min-width: 50%;\"></p><p><span style=\"color:#000000\">Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?<ul><li>No one is allowed to disconnect the IP phone or the PC and connect some other wired device.</li><li>If a different device is connected, port Fa0/2 is shut down.</li><li>The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.</li></ul></span></p>","_id":"9be484feb6b14d5bac1d4fb0387fa348","_parentId":"88377fe47ac34393ba865bf5f20e2740","_type":"component","_layout":"full","_ravennaSourceID":"211261","_smvWiseScoring":{"ident":"it_211261","outcomes":{"decvar":[{"_varname":"486790","_maxvalue":1,"title":"correctness of response"},{"_varname":"490446","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"486790","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"490446","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"SWA(config-if)# <b>switchport port-security</b><br />SWA(config-if)# <b>switchport port-security mac-address sticky</b><br />","_shouldBeSelected":false,"feedback":""},{"text":"SWA(config-if)# <b>switchport port-security mac-address sticky</b><br />SWA(config-if)# <b>switchport port-security maximum 2</b><br />","_shouldBeSelected":false,"feedback":""},{"text":"SWA(config-if)# <b>switchport port-security</b><br />SWA(config-if)# <b>switchport port-security maximum 2</b><br />SWA(config-if)# <b>switchport port-security mac-address sticky</b><br />","_shouldBeSelected":true,"feedback":""},{"text":"SWA(config-if)# <b>switchport port-security</b><br />SWA(config-if)# <b>switchport port-security maximum 2</b><br />SWA(config-if)# <b>switchport port-security mac-address sticky</b><br />SWA(config-if)# <b>switchport port-security violation restrict</b><br />","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The default mode for a port security violation is to shut down the port so the <b>switchport port-security violation</b> command is not necessary. The <b>switchport port-security</b> command must be entered with no additional options to enable port security for the port. Then, additional port security options can be added.","_incorrect":{"final":"The default mode for a port security violation is to shut down the port so the <b>switchport port-security violation</b> command is not necessary. The <b>switchport port-security</b> command must be entered with no additional options to enable port security for the port. Then, additional port security options can be added.","notFinal":""},"_partlyCorrect":{"final":"The default mode for a port security violation is to shut down the port so the <b>switchport port-security violation</b> command is not necessary. The <b>switchport port-security</b> command must be entered with no additional options to enable port security for the port. Then, additional port security options can be added.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><img loading=\"eager\" src=\"en-US/assets/i211262v1n1_211262_v2.png\" alt=\"The following words are displayed: ATC_S2# show port-security interface fastethernet 0/3 Port Security              : Enabled Port Status                : Secure-up Violation Mode             : Shutdown Aging Time                 : 0 mins Aging Type                 : Absolute SecureStatic Address Aging : Disabled Maximum MAC Addresses      : 2 Total MAC Addresses        : 1 Configured MAC Addresses   : 0 Sticky MAC Addresses       : 1 Last Source Address:Vlan   : 00D0.D3B6.C26B:10 Security Violation Count   : 0\" style=\"min-width: 50%;\"></p><p><span style=\"color:#000000\">Refer to the exhibit. What can be determined about port security from the information that is shown?</span></p>","_id":"3a0636bff25844258c3c367f6941abbe","_parentId":"fb8ea3aa4c7842a7b39d69a3d6bd6246","_type":"component","_layout":"full","_ravennaSourceID":"211262","_smvWiseScoring":{"ident":"it_211262","outcomes":{"decvar":[{"_varname":"487480","_maxvalue":1,"title":"correctness of response"},{"_varname":"490447","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"487480","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"490447","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"The port has been shut down.","_shouldBeSelected":false,"feedback":""},{"text":"The port has two attached devices.","_shouldBeSelected":false,"feedback":""},{"text":"The port violation mode is the default for any port that has port security enabled.","_shouldBeSelected":true,"feedback":""},{"text":"The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The <i>Port Security</i> line simply shows a state of <i>Enabled</i> if the <b>switchport port-security</b> command (with no options) has been entered for a particular switch port. If a port security violation had occurred, a different error message appears such as <i>Secure-shutdown</i>. The maximum number of MAC addresses supported is 50. The <i>Maximum MAC Addresses</i> line is used to show how many MAC addresses can be learned (2 in this case). The <i>Sticky MAC Addresses</i> line shows that only one device has been attached and learned automatically by the switch. This configuration could be used when a port is shared by two cubicle-sharing personnel who bring in separate laptops.","_incorrect":{"final":"The <i>Port Security</i> line simply shows a state of <i>Enabled</i> if the <b>switchport port-security</b> command (with no options) has been entered for a particular switch port. If a port security violation had occurred, a different error message appears such as <i>Secure-shutdown</i>. The maximum number of MAC addresses supported is 50. The <i>Maximum MAC Addresses</i> line is used to show how many MAC addresses can be learned (2 in this case). The <i>Sticky MAC Addresses</i> line shows that only one device has been attached and learned automatically by the switch. This configuration could be used when a port is shared by two cubicle-sharing personnel who bring in separate laptops.","notFinal":""},"_partlyCorrect":{"final":"The <i>Port Security</i> line simply shows a state of <i>Enabled</i> if the <b>switchport port-security</b> command (with no options) has been entered for a particular switch port. If a port security violation had occurred, a different error message appears such as <i>Secure-shutdown</i>. The maximum number of MAC addresses supported is 50. The <i>Maximum MAC Addresses</i> line is used to show how many MAC addresses can be learned (2 in this case). The <i>Sticky MAC Addresses</i> line shows that only one device has been attached and learned automatically by the switch. This configuration could be used when a port is shared by two cubicle-sharing personnel who bring in separate laptops.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of management frame may regularly be broadcast by an AP?</span></p>","_id":"62ae88c70f8447d9af17499a1f783bc2","_parentId":"a766b8e27865480780de90c0b3a06b11","_type":"component","_layout":"full","_ravennaSourceID":"217880","_smvWiseScoring":{"ident":"it_217880","outcomes":{"decvar":[{"_varname":"498780","_maxvalue":1,"title":"correctness of response"},{"_varname":"511466","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"498780","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"511466","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Beacon","_shouldBeSelected":true,"feedback":""},{"text":"Probe request","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""},{"text":"Probe response","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Beacons are the only management frame that may regularly be broadcast by an AP. Probing, authentication, and association frames are used only during the association (or reassociation) process.","_incorrect":{"final":"Beacons are the only management frame that may regularly be broadcast by an AP. Probing, authentication, and association frames are used only during the association (or reassociation) process.","notFinal":""},"_partlyCorrect":{"final":"Beacons are the only management frame that may regularly be broadcast by an AP. Probing, authentication, and association frames are used only during the association (or reassociation) process.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What is an advantage of SSID cloaking?​</span></p>","_id":"5e7ee455c2dc4fe69df5eb403c0c4c4c","_parentId":"fc93e0fa6d02401087e5fa759f5163e3","_type":"component","_layout":"full","_ravennaSourceID":"217885","_smvWiseScoring":{"ident":"it_217885","outcomes":{"decvar":[{"_varname":"503286","_maxvalue":1,"title":"correctness of response"},{"_varname":"511469","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"503286","_view":"All","interpret":"1 point for Option 20 points for any other option"},{"_varname":"511469","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"It provides free Internet access in public locations where knowing the SSID is of no concern.","_shouldBeSelected":false,"feedback":""},{"text":"Clients will have to manually identify the SSID to connect to the network.​","_shouldBeSelected":true,"feedback":""},{"text":"SSIDs are very difficult to discover because APs do not broadcast them.​","_shouldBeSelected":false,"feedback":""},{"text":"It is the best way to secure a wireless network.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered. The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.","_incorrect":{"final":"SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered. The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.","notFinal":""},"_partlyCorrect":{"final":"SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered. The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?</span></p>","_id":"f83d6303fa6f4c8d9217622fb211f276","_parentId":"06b34e5c8c7247aa9a83b969ae9f9ba6","_type":"component","_layout":"full","_ravennaSourceID":"217912","_smvWiseScoring":{"ident":"it_217912","outcomes":{"decvar":[{"_varname":"500293","_maxvalue":1,"title":"correctness of response"}],"interpretvar":[{"_varname":"500293","_view":"All","interpret":"1 point for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Accidental interference","_shouldBeSelected":true,"feedback":""},{"text":"Improperly configured devices","_shouldBeSelected":false,"feedback":""},{"text":"Interception of data","_shouldBeSelected":false,"feedback":""},{"text":"Rogue access points","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Denial of service attacks can be the result of improperly configured devices which can disable the WLAN. Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN. Man-in-the-middle attacks can allow an attacker to intercept data. Rogue access points can allow unauthorized users to access the wireless network.","_incorrect":{"final":"Denial of service attacks can be the result of improperly configured devices which can disable the WLAN. Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN. Man-in-the-middle attacks can allow an attacker to intercept data. Rogue access points can allow unauthorized users to access the wireless network.","notFinal":""},"_partlyCorrect":{"final":"Denial of service attacks can be the result of improperly configured devices which can disable the WLAN. Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN. Man-in-the-middle attacks can allow an attacker to intercept data. Rogue access points can allow unauthorized users to access the wireless network.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?</span></p>","_id":"6007b1e325324144b0bdf7d1099b715e","_parentId":"959ad1ddbdf74c4cb8dac5de5c7565d7","_type":"component","_layout":"full","_ravennaSourceID":"217917","_smvWiseScoring":{"ident":"it_217917","outcomes":{"decvar":[{"_varname":"505042","_maxvalue":1,"title":"correctness of response"},{"_varname":"511482","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"505042","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"511482","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Omnidirectional","_shouldBeSelected":true,"feedback":""},{"text":"Directional","_shouldBeSelected":false,"feedback":""},{"text":"Yagi","_shouldBeSelected":false,"feedback":""},{"text":"Dish","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Omnidirectional antennas send the radio signals in a 360 degree pattern around the antenna. This provides coverage to devices situated anywhere around the access point. Dishes, directional, and Yagi antennas focus the radio signals in a single direction, making them less suitable for covering large, open areas.","_incorrect":{"final":"Omnidirectional antennas send the radio signals in a 360 degree pattern around the antenna. This provides coverage to devices situated anywhere around the access point. Dishes, directional, and Yagi antennas focus the radio signals in a single direction, making them less suitable for covering large, open areas.","notFinal":""},"_partlyCorrect":{"final":"Omnidirectional antennas send the radio signals in a 360 degree pattern around the antenna. This provides coverage to devices situated anywhere around the access point. Dishes, directional, and Yagi antennas focus the radio signals in a single direction, making them less suitable for covering large, open areas.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)</span></p>","_id":"cc16fd4b1bb54bfea6e12530ef9de5ee","_parentId":"5aca323d423f4bc9a65ab2ae7121bb1f","_type":"component","_layout":"full","_ravennaSourceID":"221222","_smvWiseScoring":{"ident":"it_221222","outcomes":{"decvar":[{"_varname":"516591","_maxvalue":1,"title":"correctness of response"},{"_varname":"522035","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"516591","_view":"All","interpret":"1 point for Option 3, Option 50 points for any other option"},{"_varname":"522035","_view":"All","interpret":"Option 3 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Sending an ARP request","_shouldBeSelected":false,"feedback":""},{"text":"Delivering a broadcast frame","_shouldBeSelected":false,"feedback":""},{"text":"Transmitting a probe request","_shouldBeSelected":true,"feedback":""},{"text":"Initiating a three-way handshake","_shouldBeSelected":false,"feedback":""},{"text":"Receiving a broadcast beacon frame","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":2,"_feedback":{"title":"","correct":"Two methods can be used by a wireless device to discover and register with an access point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that contains the SSID and other wireless settings. In active mode, the wireless device must be manually configured for the SSID, and then the device broadcasts a probe request.","_incorrect":{"final":"Two methods can be used by a wireless device to discover and register with an access point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that contains the SSID and other wireless settings. In active mode, the wireless device must be manually configured for the SSID, and then the device broadcasts a probe request.","notFinal":""},"_partlyCorrect":{"final":"Two methods can be used by a wireless device to discover and register with an access point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that contains the SSID and other wireless settings. In active mode, the wireless device must be manually configured for the SSID, and then the device broadcasts a probe request.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?</span></p>","_id":"be01211ab36d4014a5706555e4a3ee10","_parentId":"d8a1b2398bf44f818b92ee049e306e33","_type":"component","_layout":"full","_ravennaSourceID":"221230","_smvWiseScoring":{"ident":"it_221230","outcomes":{"decvar":[{"_varname":"512682","_maxvalue":1,"title":"correctness of response"},{"_varname":"522090","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"512682","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"522090","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Ad hoc","_shouldBeSelected":false,"feedback":""},{"text":"Hotspot","_shouldBeSelected":false,"feedback":""},{"text":"Infrastructure","_shouldBeSelected":true,"feedback":""},{"text":"Mixed mode","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Ad hoc mode (also known as independent basic service set or IBSS) is used in a peer-to-peer wireless network such as when Bluetooth is used. A variation of the ad hoc topology exists when a smart phone or tablet with cellular data access is enabled to create a personal wireless hotspot. Mixed mode allows older wireless NICs to attach to an access point that can use a newer wireless standard.","_incorrect":{"final":"Ad hoc mode (also known as independent basic service set or IBSS) is used in a peer-to-peer wireless network such as when Bluetooth is used. A variation of the ad hoc topology exists when a smart phone or tablet with cellular data access is enabled to create a personal wireless hotspot. Mixed mode allows older wireless NICs to attach to an access point that can use a newer wireless standard.","notFinal":""},"_partlyCorrect":{"final":"Ad hoc mode (also known as independent basic service set or IBSS) is used in a peer-to-peer wireless network such as when Bluetooth is used. A variation of the ad hoc topology exists when a smart phone or tablet with cellular data access is enabled to create a personal wireless hotspot. Mixed mode allows older wireless NICs to attach to an access point that can use a newer wireless standard.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What is a wireless security mode that requires a RADIUS server to authenticate wireless users?</span></p>","_id":"5df291fc67884052808b04f7e3e22c05","_parentId":"00989d4ccae649e592c13a678e823d9f","_type":"component","_layout":"full","_ravennaSourceID":"221233","_smvWiseScoring":{"ident":"it_221233","outcomes":{"decvar":[{"_varname":"512419","_maxvalue":1,"title":"correctness of response"},{"_varname":"522091","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"512419","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"522091","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Enterprise","_shouldBeSelected":true,"feedback":""},{"text":"Personal","_shouldBeSelected":false,"feedback":""},{"text":"Shared key","_shouldBeSelected":false,"feedback":""},{"text":"WEP","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"WPA and WPA2 come in two types: personal and enterprise. Personal is used in home and small office networks. Shared key allows three different authentication techniques: (1) WEP, (2) WPA, and (3) 802.11i/WPA2. WEP is an encryption method.","_incorrect":{"final":"WPA and WPA2 come in two types: personal and enterprise. Personal is used in home and small office networks. Shared key allows three different authentication techniques: (1) WEP, (2) WPA, and (3) 802.11i/WPA2. WEP is an encryption method.","notFinal":""},"_partlyCorrect":{"final":"WPA and WPA2 come in two types: personal and enterprise. Personal is used in home and small office networks. Shared key allows three different authentication techniques: (1) WEP, (2) WPA, and (3) 802.11i/WPA2. WEP is an encryption method.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which authentication method stores usernames and passwords in the router and is ideal for small networks?</span></p>","_id":"fad472ce030a4e148e193805dc306bfb","_parentId":"77d7a05696674cc58cc7ba89d02ccccf","_type":"component","_layout":"full","_ravennaSourceID":"228165","_smvWiseScoring":{"ident":"it_228165","outcomes":{"decvar":[{"_varname":"556667","_maxvalue":1,"title":"correctness of response"},{"_varname":"556668","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"556667","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"556668","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Local AAA","_shouldBeSelected":true,"feedback":""},{"text":"Local AAA over RADIUS","_shouldBeSelected":false,"feedback":""},{"text":"Local AAA over TACACS+","_shouldBeSelected":false,"feedback":""},{"text":"Server-based AAA","_shouldBeSelected":false,"feedback":""},{"text":"Server-based AAA over RADIUS","_shouldBeSelected":false,"feedback":""},{"text":"Server-based AAA over TACACS+","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.","_incorrect":{"final":"In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.","notFinal":""},"_partlyCorrect":{"final":"In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?</span></p>","_id":"5943a31406ef4b74b7e3fb137a7f01dd","_parentId":"c3ae900712424f7691445f7f9e1255b7","_type":"component","_layout":"full","_ravennaSourceID":"228183","_smvWiseScoring":{"ident":"it_228183","outcomes":{"decvar":[{"_varname":"537537","_maxvalue":1,"title":"correctness of response"},{"_varname":"537538","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"537537","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"537538","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Auditing","_shouldBeSelected":false,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"Authorization","_shouldBeSelected":true,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"One of the components in AAA is authorization. After a user is authenticated through AAA, authorization services determine which resources the user can access and which operations the user is allowed to perform.","_incorrect":{"final":"One of the components in AAA is authorization. After a user is authenticated through AAA, authorization services determine which resources the user can access and which operations the user is allowed to perform.","notFinal":""},"_partlyCorrect":{"final":"One of the components in AAA is authorization. After a user is authenticated through AAA, authorization services determine which resources the user can access and which operations the user is allowed to perform.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><img loading=\"eager\" src=\"en-US/assets/i235949v1n1_updated94485.png\" alt=\"The exhibit consists of a graphic with a switch labeled S1 and a PC labeled PC1. Switch S1 port Fa0/12 connects to PC1. Under PC1 is the MAC address 000b.bd1b.05ae. The following commands are under the graphic: S1(config)# interface fastethernet 0/12 S1(config-if)# switchport mode access  S1(config-if)# switchport port-security S1(config-if)# switchport port-security maximum 1 S1(config-if)# switchport port-security 000d.bd1b.0245\" style=\"min-width: 50%;\"></p><p><span style=\"color:#000000\">Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch&#160;S1 with the applied configuration?</span></p>","_id":"4510a8cc1bcd48bcb4b9591315d66a2c","_parentId":"82fb16269d41425682cfa8e675bcec85","_type":"component","_layout":"full","_ravennaSourceID":"235949","_smvWiseScoring":{"ident":"it_235949","outcomes":{"decvar":[{"_varname":"585940","_maxvalue":1,"title":"correctness of response"},{"_varname":"585941","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"585940","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"585941","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Frames from PC1 will be dropped, and a log message will be created.","_shouldBeSelected":false,"feedback":""},{"text":"Frames from PC1 will be dropped, and there will be no log of the violation.","_shouldBeSelected":false,"feedback":""},{"text":"Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.","_shouldBeSelected":true,"feedback":""},{"text":"Frames from PC1 will be forwarded to its destination, and a log entry will be created.","_shouldBeSelected":false,"feedback":""},{"text":"Frames from PC1 will be forwarded to its destination, but a log entry will not be created.","_shouldBeSelected":false,"feedback":""},{"text":"Frames from PC1 will be forwarded since the <b>switchport port-security violation</b> command is missing.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Manual configuration of the single allowed MAC address has been entered for port fa0/12. PC1 has a different MAC address and when attached will cause the port to shut down (the default action), a log message to be automatically created, and the violation counter to increment. The default action of shutdown is recommended because the restrict option might fail if an attack is underway.","_incorrect":{"final":"Manual configuration of the single allowed MAC address has been entered for port fa0/12. PC1 has a different MAC address and when attached will cause the port to shut down (the default action), a log message to be automatically created, and the violation counter to increment. The default action of shutdown is recommended because the restrict option might fail if an attack is underway.","notFinal":""},"_partlyCorrect":{"final":"Manual configuration of the single allowed MAC address has been entered for port fa0/12. PC1 has a different MAC address and when attached will cause the port to shut down (the default action), a log message to be automatically created, and the violation counter to increment. The default action of shutdown is recommended because the restrict option might fail if an attack is underway.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)</span></p>","_id":"bc229283b7c440c59a8b760ecb11d3aa","_parentId":"f721e5627ad34c219f5eae854a233ebc","_type":"component","_layout":"full","_ravennaSourceID":"236861","_smvWiseScoring":{"ident":"it_236861","outcomes":{"decvar":[{"_varname":"577395","_maxvalue":1,"title":"correctness of response"},{"_varname":"577396","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"577395","_view":"All","interpret":"1 point for Option 2, Option 50 points for any other option"},{"_varname":"577396","_view":"All","interpret":"Option 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"NTP","_shouldBeSelected":false,"feedback":""},{"text":"TACACS+","_shouldBeSelected":true,"feedback":""},{"text":"SSH","_shouldBeSelected":false,"feedback":""},{"text":"HTTPS","_shouldBeSelected":false,"feedback":""},{"text":"RADIUS","_shouldBeSelected":true,"feedback":""},{"text":"CHAP","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":2,"_feedback":{"title":"","correct":"By using TACACS+ or RADIUS, AAA can authenticate users from a database of usernames and passwords stored centrally on a server such as a Cisco ACS server.","_incorrect":{"final":"By using TACACS+ or RADIUS, AAA can authenticate users from a database of usernames and passwords stored centrally on a server such as a Cisco ACS server.","notFinal":""},"_partlyCorrect":{"final":"By using TACACS+ or RADIUS, AAA can authenticate users from a database of usernames and passwords stored centrally on a server such as a Cisco ACS server.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)</span></p>","_id":"f7d747c791e04c47aa8ce5eb5aaafb1c","_parentId":"1046d3a1cfa349fe8d479fb9193950dd","_type":"component","_layout":"full","_ravennaSourceID":"247474","_smvWiseScoring":{"ident":"it_247474","outcomes":{"decvar":[{"_varname":"610142","_maxvalue":1,"title":"correctness of response"},{"_varname":"610143","_maxvalue":3,"title":"correctness of response"}],"interpretvar":[{"_varname":"610142","_view":"All","interpret":"1 point for Option 1, Option 2, Option 50 points for any other option"},{"_varname":"610143","_view":"All","interpret":"Option 1, Option 2, and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"SSID","_shouldBeSelected":true,"feedback":""},{"text":"AP password","_shouldBeSelected":true,"feedback":""},{"text":"Antenna frequency","_shouldBeSelected":false,"feedback":""},{"text":"Wireless beacon time","_shouldBeSelected":false,"feedback":""},{"text":"Wireless network password","_shouldBeSelected":true,"feedback":""},{"text":"Wireless client operating system password","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":3,"_feedback":{"title":"","correct":"As soon as an AP is taken out of a box, the default device password, SSID, and security parameters (wireless network password) should be set. The frequency of a wireless antenna can be adjusted, but doing so is not required. The beacon time is not normally configured. The wireless client operating system password is not affected by the configuration of a home wireless network.","_incorrect":{"final":"As soon as an AP is taken out of a box, the default device password, SSID, and security parameters (wireless network password) should be set. The frequency of a wireless antenna can be adjusted, but doing so is not required. The beacon time is not normally configured. The wireless client operating system password is not affected by the configuration of a home wireless network.","notFinal":""},"_partlyCorrect":{"final":"As soon as an AP is taken out of a box, the default device password, SSID, and security parameters (wireless network password) should be set. The frequency of a wireless antenna can be adjusted, but doing so is not required. The beacon time is not normally configured. The wireless client operating system password is not affected by the configuration of a home wireless network.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?</span></p>","_id":"7c1069804c93476986ac9004d36166d4","_parentId":"254be3d9ec6b4857999e0599827e215e","_type":"component","_layout":"full","_ravennaSourceID":"254753","_smvWiseScoring":{"ident":"it_254753","outcomes":{"decvar":[{"_varname":"641407","_maxvalue":1,"title":"correctness of response"},{"_varname":"641408","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"641407","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"641408","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Off","_shouldBeSelected":false,"feedback":""},{"text":"Restrict","_shouldBeSelected":false,"feedback":""},{"text":"Protect","_shouldBeSelected":true,"feedback":""},{"text":"Shutdown","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"On a Cisco switch, an interface can be configured for one of three violation modes, specifying the action to be taken if a violation occurs:<br /><ul><li><b>Protect</b> - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.</li><li><b>Restrict</b> - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.</li><li><b>Shutdown</b> - The interface immediately becomes error-disabled and the port LED is turned off.</li></ul>","_incorrect":{"final":"On a Cisco switch, an interface can be configured for one of three violation modes, specifying the action to be taken if a violation occurs:<br /><ul><li><b>Protect</b> - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.</li><li><b>Restrict</b> - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.</li><li><b>Shutdown</b> - The interface immediately becomes error-disabled and the port LED is turned off.</li></ul>","notFinal":""},"_partlyCorrect":{"final":"On a Cisco switch, an interface can be configured for one of three violation modes, specifying the action to be taken if a violation occurs:<br /><ul><li><b>Protect</b> - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.</li><li><b>Restrict</b> - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.</li><li><b>Shutdown</b> - The interface immediately becomes error-disabled and the port LED is turned off.</li></ul>","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?</span></p>","_id":"ececb2470718414396d9a4b10bea18bd","_parentId":"85c650e01ddb447084bc7ba8fe326555","_type":"component","_layout":"full","_ravennaSourceID":"257122","_smvWiseScoring":{"ident":"it_257122","outcomes":{"decvar":[{"_varname":"641847","_maxvalue":1,"title":"correctness of response"},{"_varname":"641848","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"641847","_view":"All","interpret":"1 point for Option 40 points for any other option"},{"_varname":"641848","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Auto secure MAC addresses","_shouldBeSelected":false,"feedback":""},{"text":"Dynamic secure MAC addresses","_shouldBeSelected":false,"feedback":""},{"text":"Static secure MAC addresses","_shouldBeSelected":false,"feedback":""},{"text":"Sticky secure MAC addresses","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or manually configured and then stored in the address table and added to the running configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored only in the address table.","_incorrect":{"final":"With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or manually configured and then stored in the address table and added to the running configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored only in the address table.","notFinal":""},"_partlyCorrect":{"final":"With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or manually configured and then stored in the address table and added to the running configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored only in the address table.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)</span></p>","_id":"80af701282be4fbe8ac10394393f5aa2","_parentId":"02cb10554c514beb9fd3399292078818","_type":"component","_layout":"full","_ravennaSourceID":"269024","_smvWiseScoring":{"ident":"it_269024","outcomes":{"decvar":[{"_varname":"861680","_maxvalue":1,"title":"correctness of response"}],"interpretvar":[{"_varname":"861680","_view":"All","interpret":"1 point for Option 1, Option 50 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"802.11a","_shouldBeSelected":true,"feedback":""},{"text":"802.11b","_shouldBeSelected":false,"feedback":""},{"text":"802.11g","_shouldBeSelected":false,"feedback":""},{"text":"802.11n","_shouldBeSelected":false,"feedback":""},{"text":"802.11ac","_shouldBeSelected":true,"feedback":""},{"text":"802.11ad","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":2,"_feedback":{"title":"","correct":"The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.","_incorrect":{"final":"The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.","notFinal":""},"_partlyCorrect":{"final":"The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What device is considered a supplicant during the 802.1X authentication process?</span></p>","_id":"e4224c01e63f4450a69ec2cadd4ed03b","_parentId":"a8383ff0aec1484fbc649caa6810a6e6","_type":"component","_layout":"full","_ravennaSourceID":"271972","_smvWiseScoring":{"ident":"it_271972","outcomes":{"decvar":[{"_varname":"673557","_maxvalue":1,"title":"correctness of response"},{"_varname":"673558","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"673557","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"673558","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"The client that is requesting authentication","_shouldBeSelected":true,"feedback":""},{"text":"The switch that is controlling network access","_shouldBeSelected":false,"feedback":""},{"text":"The authentication server that is performing client authentication","_shouldBeSelected":false,"feedback":""},{"text":"The router that is serving as the default gateway","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The devices involved in the 802.1X authentication process are as follows:<ul><li>The supplicant, which is the client that is requesting network access</li><li>The authenticator, which is the switch that the client is connecting to and that is actually controlling physical network access</li><li>The authentication server, which performs the actual authentication</li></ul>","_incorrect":{"final":"The devices involved in the 802.1X authentication process are as follows:<ul><li>The supplicant, which is the client that is requesting network access</li><li>The authenticator, which is the switch that the client is connecting to and that is actually controlling physical network access</li><li>The authentication server, which performs the actual authentication</li></ul>","notFinal":""},"_partlyCorrect":{"final":"The devices involved in the 802.1X authentication process are as follows:<ul><li>The supplicant, which is the client that is requesting network access</li><li>The authenticator, which is the switch that the client is connecting to and that is actually controlling physical network access</li><li>The authentication server, which performs the actual authentication</li></ul>","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?</span></p>","_id":"5557caf5d26d4beb8ef6a1e592998ba0","_parentId":"e66d36962798496bb769c166bfd268fe","_type":"component","_layout":"full","_ravennaSourceID":"271993","_smvWiseScoring":{"ident":"it_271993","outcomes":{"decvar":[{"_varname":"673491","_maxvalue":1,"title":"correctness of response"},{"_varname":"673492","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"673491","_view":"All","interpret":"1 point for Option 20 points for any other option"},{"_varname":"673492","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Accessibility","_shouldBeSelected":false,"feedback":""},{"text":"Accounting","_shouldBeSelected":true,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"One of the components in AAA is accounting. After a user is authenticated through AAA, AAA servers keep a detailed log of exactly what actions the authenticated user takes on the device.","_incorrect":{"final":"One of the components in AAA is accounting. After a user is authenticated through AAA, AAA servers keep a detailed log of exactly what actions the authenticated user takes on the device.","notFinal":""},"_partlyCorrect":{"final":"One of the components in AAA is accounting. After a user is authenticated through AAA, AAA servers keep a detailed log of exactly what actions the authenticated user takes on the device.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?</span></p>","_id":"941559f92167431091b6f604cf585813","_parentId":"b082adb8d5c14faaa000420cdaf6ac24","_type":"component","_layout":"full","_ravennaSourceID":"272057","_smvWiseScoring":{"ident":"it_272057","outcomes":{"decvar":[{"_varname":"674538","_maxvalue":1,"title":"correctness of response"},{"_varname":"674539","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"674538","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"674539","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Preventing rogue switches from being added to the network","_shouldBeSelected":true,"feedback":""},{"text":"Protecting against Layer 2 loops","_shouldBeSelected":false,"feedback":""},{"text":"Enforcing the placement of root bridges","_shouldBeSelected":false,"feedback":""},{"text":"Preventing buffer overflow attacks","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"BPDU guard immediately error-disables a port that receives a BPDU. This prevents rogue switches from being added to the network. BPDU guard should only be applied to all end-user ports.","_incorrect":{"final":"BPDU guard immediately error-disables a port that receives a BPDU. This prevents rogue switches from being added to the network. BPDU guard should only be applied to all end-user ports.","notFinal":""},"_partlyCorrect":{"final":"BPDU guard immediately error-disables a port that receives a BPDU. This prevents rogue switches from being added to the network. BPDU guard should only be applied to all end-user ports.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What is the result of a DHCP starvation attack?</span></p>","_id":"9eb42edf180f4146b5eaa3147471b776","_parentId":"ad2cf27657f5425b95d4eac16e501f24","_type":"component","_layout":"full","_ravennaSourceID":"272134","_smvWiseScoring":{"ident":"it_272134","outcomes":{"decvar":[{"_varname":"674659","_maxvalue":1,"title":"correctness of response"},{"_varname":"674660","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"674659","_view":"All","interpret":"1 point for Option 10 points for any other option"},{"_varname":"674660","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Legitimate clients are unable to lease IP addresses.","_shouldBeSelected":true,"feedback":""},{"text":"Clients receive IP address assignments from a rogue DHCP server.","_shouldBeSelected":false,"feedback":""},{"text":"The attacker provides incorrect DNS and default gateway information to clients.","_shouldBeSelected":false,"feedback":""},{"text":"The IP addresses assigned to legitimate clients are hijacked.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.","_incorrect":{"final":"DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.","notFinal":""},"_partlyCorrect":{"final":"DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?</span></p>","_id":"98dcb25af7864757bb6e48b28fd4b266","_parentId":"c2f1d1cc7e884da5b24331f31cf0e580","_type":"component","_layout":"full","_ravennaSourceID":"272332","_smvWiseScoring":{"ident":"it_272332","outcomes":{"decvar":[{"_varname":"678291","_maxvalue":1,"title":"correctness of response"},{"_varname":"678292","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"678291","_view":"All","interpret":"1 point for Option 20 points for any other option"},{"_varname":"678292","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Use the open standard LLDP rather than CDP.","_shouldBeSelected":false,"feedback":""},{"text":"Disable both protocols on all interfaces where they are not required.","_shouldBeSelected":true,"feedback":""},{"text":"Use the default router settings for CDP and LLDP.","_shouldBeSelected":false,"feedback":""},{"text":"Enable CDP on edge devices, and enable LLDP on interior devices.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.​","_incorrect":{"final":"Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.​","notFinal":""},"_partlyCorrect":{"final":"Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.​","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?</span></p>","_id":"26c6663e600840748a9efe242241567b","_parentId":"451f7d47c02e4e8399a44f57c0bf07b8","_type":"component","_layout":"full","_ravennaSourceID":"272345","_smvWiseScoring":{"ident":"it_272345","outcomes":{"decvar":[{"_varname":"678321","_maxvalue":1,"title":"correctness of response"},{"_varname":"678322","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"678321","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"678322","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"DTP spoofing","_shouldBeSelected":false,"feedback":""},{"text":"DHCP spoofing","_shouldBeSelected":false,"feedback":""},{"text":"VLAN double-tagging","_shouldBeSelected":true,"feedback":""},{"text":"DHCP starvation","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack, but VLAN double tagging works even if trunk ports are disabled. Changing the native VLAN from the default to an unused VLAN reduces the possibility of this type of attack. DHCP spoofing and DHCP starvation exploit vulnerabilities in the DHCP message exchange.​","_incorrect":{"final":"Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack, but VLAN double tagging works even if trunk ports are disabled. Changing the native VLAN from the default to an unused VLAN reduces the possibility of this type of attack. DHCP spoofing and DHCP starvation exploit vulnerabilities in the DHCP message exchange.​","notFinal":""},"_partlyCorrect":{"final":"Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack, but VLAN double tagging works even if trunk ports are disabled. Changing the native VLAN from the default to an unused VLAN reduces the possibility of this type of attack. DHCP spoofing and DHCP starvation exploit vulnerabilities in the DHCP message exchange.​","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_id":"f066529d859c480ba658e4dd64dd6e8e","_parentId":"73f1a13e381f4c24ac9c43be194a043b","_type":"component","_component":"objectMatching","_classes":"","_layout":"full","title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Match each functional component of AAA with its description. </span></p>","instruction":"","_attempts":1,"_isRandom":true,"_shouldDisplayAttempts":false,"_shouldResetAllAnswers":true,"_questionWeight":1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_recordInteraction":true,"_isQuestionRandom":true,"_isAnswerRandom":false,"_categoryTitle":"Categories:","_optionTitle":"Options:","_defaultAnswerBGColor":"#F2F2F2","placeholder":"Please select an option","_ravennaSourceID":"274527","_smvWiseScoring":{"ident":"it_274527","outcomes":{"decvar":[{"_varname":"obs0","_maxvalue":2,"title":"Options matched to the correct selection."},{"_varname":"status","_maxvalue":0,"title":"status"}],"interpretvar":[{"_varname":"obs0","_view":"All","interpret":"Click on the question mark at the bottom of the item for the correct answer.There is no partial credit."},{"_varname":"status","_view":"All","interpret":"status"}]}},"_items":[{"question":"Authorization","answer":"Determines what resources users can access or the operations they are allowed to perform","questionBGColor":"#F9D8D6"},{"question":"Authentication","answer":"Proves that users are who they say they are","questionBGColor":"#D6CDEA"},{"question":"Accounting","answer":"Records what users do and what they access","questionBGColor":"#F9EBDF"}],"_feedback":{"title":"","correct":"<p>Place the options in the following order:</p><table class='table-feedback'><tr> <td>authorization</td><td>determines what resources users can access or the operations they are allowed to perform</td></tr><tr> <td>authentication</td><td>Proves that users are who they say they are</td></tr><tr> <td>accounting</td><td>Records what users do and what they access</td></tr></table>","_incorrect":{"final":"<p>Place the options in the following order:</p><table class='table-feedback'><tr> <td>authorization</td><td>determines what resources users can access or the operations they are allowed to perform</td></tr><tr> <td>authentication</td><td>Proves that users are who they say they are</td></tr><tr> <td>accounting</td><td>Records what users do and what they access</td></tr></table>","notFinal":"<p>Place the options in the following order:</p><table class='table-feedback'><tr> <td>authorization</td><td>determines what resources users can access or the operations they are allowed to perform</td></tr><tr> <td>authentication</td><td>Proves that users are who they say they are</td></tr><tr> <td>accounting</td><td>Records what users do and what they access</td></tr></table>"},"_partlyCorrect":{"final":"","notFinal":""}},"_comment":"","_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""},"_pageLevelProgress":{"_isEnabled":true},"_menuTOC":{"_isEnabled":false},"_courseProgress":{"_isEnabled":true}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?</span></p>","_id":"3e81b5fd2c454c3b93e9962ac32da011","_parentId":"2d23b872acfb45b1aa55e222ac8b7900","_type":"component","_layout":"full","_ravennaSourceID":"275573","_smvWiseScoring":{"ident":"it_275573","outcomes":{"decvar":[{"_varname":"691959","_maxvalue":1,"title":"correctness of response"},{"_varname":"691960","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"691959","_view":"All","interpret":"1 point for Option 40 points for any other option"},{"_varname":"691960","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"To disable broadcasting of the SSID","_shouldBeSelected":false,"feedback":""},{"text":"To enable different 802.11 standards","_shouldBeSelected":false,"feedback":""},{"text":"To provide stronger security modes","_shouldBeSelected":false,"feedback":""},{"text":"To avoid interference from nearby wireless devices","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Channels 1, 6, and 11 are selected because they are 5 channels apart. thus minimizing the interference with adjacent channels. A channel frequency can interfere with channels on either side of the main frequency. All wireless devices need to be used on nonadjacent channels.","_incorrect":{"final":"Channels 1, 6, and 11 are selected because they are 5 channels apart. thus minimizing the interference with adjacent channels. A channel frequency can interfere with channels on either side of the main frequency. All wireless devices need to be used on nonadjacent channels.","notFinal":""},"_partlyCorrect":{"final":"Channels 1, 6, and 11 are selected because they are 5 channels apart. thus minimizing the interference with adjacent channels. A channel frequency can interfere with channels on either side of the main frequency. All wireless devices need to be used on nonadjacent channels.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?</span></p>","_id":"443cc435d9484c6088bedf361239a3ed","_parentId":"da488ea025e84566bf349c2086fc9e62","_type":"component","_layout":"full","_ravennaSourceID":"278579","_smvWiseScoring":{"ident":"it_278579","outcomes":{"decvar":[{"_varname":"861679","_maxvalue":1,"title":"correctness of response"}],"interpretvar":[{"_varname":"861679","_view":"All","interpret":"1 point for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Active","_shouldBeSelected":true,"feedback":""},{"text":"Mixed","_shouldBeSelected":false,"feedback":""},{"text":"Open","_shouldBeSelected":false,"feedback":""},{"text":"Passive","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Active is a mode used to configure an access point so that clients must know the SSID to connect to the access point. APs and wireless routers can operate in a mixed mode meaning that that multiple wireless standards are supported. Open is an authentication mode for an access point that has no impact on the listing of available wireless networks for a client. When an access point is configured in passive mode, the SSID is broadcast so that the name of wireless network will appear in the listing of available networks for clients.","_incorrect":{"final":"Active is a mode used to configure an access point so that clients must know the SSID to connect to the access point. APs and wireless routers can operate in a mixed mode meaning that that multiple wireless standards are supported. Open is an authentication mode for an access point that has no impact on the listing of available wireless networks for a client. When an access point is configured in passive mode, the SSID is broadcast so that the name of wireless network will appear in the listing of available networks for clients.","notFinal":""},"_partlyCorrect":{"final":"Active is a mode used to configure an access point so that clients must know the SSID to connect to the access point. APs and wireless routers can operate in a mixed mode meaning that that multiple wireless standards are supported. Open is an authentication mode for an access point that has no impact on the listing of available wireless networks for a client. When an access point is configured in passive mode, the SSID is broadcast so that the name of wireless network will appear in the listing of available networks for clients.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?</span></p>","_id":"0e5b1f621ef143f294de49d5a6e14eab","_parentId":"560d1b3bab6e480b9c661556ab015673","_type":"component","_layout":"full","_ravennaSourceID":"278582","_smvWiseScoring":{"ident":"it_278582","outcomes":{"decvar":[{"_varname":"861678","_maxvalue":1,"title":"correctness of response"}],"interpretvar":[{"_varname":"861678","_view":"All","interpret":"1 point for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Replace the wireless NICs on the computers that are experiencing slow connections.","_shouldBeSelected":false,"feedback":""},{"text":"Split the traffic between the 2.4 GHz and 5 GHz frequency bands.","_shouldBeSelected":true,"feedback":""},{"text":"Disable DHCP on the access point and assign static addresses to the wireless clients.","_shouldBeSelected":false,"feedback":""},{"text":"Upgrade the firmware on the wireless access point.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Because some users are complaining about the network being too slow, the correct option would be to split the traffic so that there are two networks using different frequencies at the same time. Replacing the wireless NICs will not necessarily correct the network being slow and it could be expensive for the company. DHCP versus static addressing should have no impact of the network being slow and it would be a huge task to have all users assigned static addressing for their wireless connection. Upgrading the firmware on the wireless access point is always a good idea. However, if some of the users are experiencing a slow network connection, it is likely that this would not substantially improve network performance.","_incorrect":{"final":"Because some users are complaining about the network being too slow, the correct option would be to split the traffic so that there are two networks using different frequencies at the same time. Replacing the wireless NICs will not necessarily correct the network being slow and it could be expensive for the company. DHCP versus static addressing should have no impact of the network being slow and it would be a huge task to have all users assigned static addressing for their wireless connection. Upgrading the firmware on the wireless access point is always a good idea. However, if some of the users are experiencing a slow network connection, it is likely that this would not substantially improve network performance.","notFinal":""},"_partlyCorrect":{"final":"Because some users are complaining about the network being too slow, the correct option would be to split the traffic so that there are two networks using different frequencies at the same time. Replacing the wireless NICs will not necessarily correct the network being slow and it could be expensive for the company. DHCP versus static addressing should have no impact of the network being slow and it would be a huge task to have all users assigned static addressing for their wireless connection. Upgrading the firmware on the wireless access point is always a good idea. However, if some of the users are experiencing a slow network connection, it is likely that this would not substantially improve network performance.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)</span></p>","_id":"466d8dbb6add47128e90f79a177ab436","_parentId":"a7090b8db137420ea08f2b87a114019a","_type":"component","_layout":"full","_ravennaSourceID":"278602","_smvWiseScoring":{"ident":"it_278602","outcomes":{"decvar":[{"_varname":"697540","_maxvalue":1,"title":"correctness of response"},{"_varname":"697541","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"697540","_view":"All","interpret":"1 point for Option 1, Option 30 points for any other option"},{"_varname":"697541","_view":"All","interpret":"Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Ensure that the wireless NIC is enabled.","_shouldBeSelected":true,"feedback":""},{"text":"Ensure that the laptop antenna is attached.","_shouldBeSelected":false,"feedback":""},{"text":"Ensure that the wireless SSID is chosen.","_shouldBeSelected":true,"feedback":""},{"text":"Ensure that the correct network media is selected.","_shouldBeSelected":false,"feedback":""},{"text":"Ensure that the NIC is configured for the proper frequency.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":2,"_feedback":{"title":"","correct":"A wireless laptop normally does not have an antenna attached unless a repair has recently been implemented. If the wireless NIC is enabled, the correct media, radio, will be used. When the NIC detects an access point, the correct frequency is automatically used.","_incorrect":{"final":"A wireless laptop normally does not have an antenna attached unless a repair has recently been implemented. If the wireless NIC is enabled, the correct media, radio, will be used. When the NIC detects an access point, the correct frequency is automatically used.","notFinal":""},"_partlyCorrect":{"final":"A wireless laptop normally does not have an antenna attached unless a repair has recently been implemented. If the wireless NIC is enabled, the correct media, radio, will be used. When the NIC detects an access point, the correct frequency is automatically used.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?</span></p>","_id":"f58bd8a57c5f48db966560129755564c","_parentId":"4c04f9620d3042adbb8b3641f1b7f096","_type":"component","_layout":"full","_ravennaSourceID":"278612","_smvWiseScoring":{"ident":"it_278612","outcomes":{"decvar":[{"_varname":"697560","_maxvalue":1,"title":"correctness of response"},{"_varname":"697561","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"697560","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"697561","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"The 5 GHz band has a greater range and is therefore likely to be interference-free.","_shouldBeSelected":false,"feedback":""},{"text":"Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.","_shouldBeSelected":false,"feedback":""},{"text":"The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.","_shouldBeSelected":true,"feedback":""},{"text":"The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Wireless range is determined by the access point antenna and output power, not the frequency band that is used. In this scenario it is stated that all users have wireless NICs that comply with the latest standard, and so all can access the 5 GHz band. Although some users may find it inconvenient to switch to the 5 Ghz band to access streaming services, it is the greater number of channels, not just fewer users, that will improve network performance.","_incorrect":{"final":"Wireless range is determined by the access point antenna and output power, not the frequency band that is used. In this scenario it is stated that all users have wireless NICs that comply with the latest standard, and so all can access the 5 GHz band. Although some users may find it inconvenient to switch to the 5 Ghz band to access streaming services, it is the greater number of channels, not just fewer users, that will improve network performance.","notFinal":""},"_partlyCorrect":{"final":"Wireless range is determined by the access point antenna and output power, not the frequency band that is used. In this scenario it is stated that all users have wireless NICs that comply with the latest standard, and so all can access the 5 GHz band. Although some users may find it inconvenient to switch to the 5 Ghz band to access streaming services, it is the greater number of channels, not just fewer users, that will improve network performance.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><img loading=\"eager\" src=\"en-US/assets/i279415v1n1_279415.png\" alt=\"The exhibit shows a network topology. On the top, there are two routers, labeled R1 and R2. Under the two routers, there are two Layer 3 switches, labeled DS1 and DS2, . Under DS1 and DS2, there are three Layer 2 switches, labeled AS1, AS2, and AS3. Both R1 and R2 have two connections, one to DS1 and another to DS2. DS1 and DS2 each has three connections, one to AS1, one to AS2, and one to AS3. PC1 is connected on switch AS1 and PC2 is connected to switch AS2. There is a DHCP server connected on switch AS3.\" style=\"min-width: 50%;\"></p><p><span style=\"color:#000000\">Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?</span></p>","_id":"c66cd77054a643f1a594bccc3a29137d","_parentId":"27bc5bd6bbd3444d8ba1a43768a27763","_type":"component","_layout":"full","_ravennaSourceID":"279415","_smvWiseScoring":{"ident":"it_279415","outcomes":{"decvar":[{"_varname":"700133","_maxvalue":1,"title":"correctness of response"},{"_varname":"700134","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"700133","_view":"All","interpret":"1 point for Option 40 points for any other option"},{"_varname":"700134","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"1","_shouldBeSelected":false,"feedback":""},{"text":"3","_shouldBeSelected":false,"feedback":""},{"text":"5","_shouldBeSelected":false,"feedback":""},{"text":"7","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The DHCP snooping configuration includes building the DHCP Snooping Binding Database and assigning necessary trusted ports on switches. A trusted port points to the legitimate DHCP servers. In this network design, because the DHCP server is attached to AS3, seven switch ports should be assigned as trusted ports, one on AS3 toward the DHCP server, one on DS1 toward AS3, one on DS2 toward AS3, and two connections on both AS1 and AS2 (toward DS1 and DS2), for a total of seven.","_incorrect":{"final":"The DHCP snooping configuration includes building the DHCP Snooping Binding Database and assigning necessary trusted ports on switches. A trusted port points to the legitimate DHCP servers. In this network design, because the DHCP server is attached to AS3, seven switch ports should be assigned as trusted ports, one on AS3 toward the DHCP server, one on DS1 toward AS3, one on DS2 toward AS3, and two connections on both AS1 and AS2 (toward DS1 and DS2), for a total of seven.","notFinal":""},"_partlyCorrect":{"final":"The DHCP snooping configuration includes building the DHCP Snooping Binding Database and assigning necessary trusted ports on switches. A trusted port points to the legitimate DHCP servers. In this network design, because the DHCP server is attached to AS3, seven switch ports should be assigned as trusted ports, one on AS3 toward the DHCP server, one on DS1 toward AS3, one on DS2 toward AS3, and two connections on both AS1 and AS2 (toward DS1 and DS2), for a total of seven.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What are three techniques for mitigating VLAN attacks? (Choose three.)</span></p>","_id":"3e95db4a668b4899b6831393949b4f41","_parentId":"357a87d3e8d94913a7a5e985c37ebef0","_type":"component","_layout":"full","_ravennaSourceID":"288023","_smvWiseScoring":{"ident":"it_288023","outcomes":{"decvar":[{"_varname":"731376","_maxvalue":1,"title":"correctness of response"},{"_varname":"731377","_maxvalue":3,"title":"correctness of response"}],"interpretvar":[{"_varname":"731376","_view":"All","interpret":"1 point for Option 1, Option 2, Option 30 points for any other option"},{"_varname":"731377","_view":"All","interpret":"Option 1, Option 2, and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Disable DTP.","_shouldBeSelected":true,"feedback":""},{"text":"Enable trunking manually.","_shouldBeSelected":true,"feedback":""},{"text":"Set the native VLAN to an unused VLAN.","_shouldBeSelected":true,"feedback":""},{"text":"Enable BPDU guard.","_shouldBeSelected":false,"feedback":""},{"text":"Enable Source Guard.","_shouldBeSelected":false,"feedback":""},{"text":"Use private VLANs.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":3,"_feedback":{"title":"","correct":"Mitigating a VLAN attack can be done by disabling Dynamic Trunking Protocol (DTP), manually setting ports to trunking mode, and by setting the native VLAN of trunk links to VLANs not in use.","_incorrect":{"final":"Mitigating a VLAN attack can be done by disabling Dynamic Trunking Protocol (DTP), manually setting ports to trunking mode, and by setting the native VLAN of trunk links to VLANs not in use.","notFinal":""},"_partlyCorrect":{"final":"Mitigating a VLAN attack can be done by disabling Dynamic Trunking Protocol (DTP), manually setting ports to trunking mode, and by setting the native VLAN of trunk links to VLANs not in use.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?</span></p>","_id":"614cdcd0fbba4d878aba5f16e3a59dc4","_parentId":"5f313e2971b44cf4a7503d783a4e66b4","_type":"component","_layout":"full","_ravennaSourceID":"331793","_smvWiseScoring":{"ident":"it_331793","outcomes":{"decvar":[{"_varname":"824997","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"824997","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Restrict","_shouldBeSelected":false,"feedback":""},{"text":"Disabled","_shouldBeSelected":false,"feedback":""},{"text":"Protect","_shouldBeSelected":false,"feedback":""},{"text":"Shutdown","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"If no violation mode is specified when port security is enabled on a switch port, then the security violation mode defaults to shutdown.","_incorrect":{"final":"If no violation mode is specified when port security is enabled on a switch port, then the security violation mode defaults to shutdown.","notFinal":""},"_partlyCorrect":{"final":"If no violation mode is specified when port security is enabled on a switch port, then the security violation mode defaults to shutdown.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?</span></p>","_id":"1a241e658df44d57acabee4c666790dc","_parentId":"ae031ed1c7be42728c8854cd634828e1","_type":"component","_layout":"full","_ravennaSourceID":"349010","_smvWiseScoring":{"ident":"it_349010","outcomes":{"decvar":[{"_varname":"860671","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"860671","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"SCP","_shouldBeSelected":false,"feedback":""},{"text":"SSH","_shouldBeSelected":true,"feedback":""},{"text":"TFTP","_shouldBeSelected":false,"feedback":""},{"text":"SNMP","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.","_incorrect":{"final":"Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.","notFinal":""},"_partlyCorrect":{"final":"Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)</span></p>","_id":"8e82530993ad40c9b9882ea5e7dcf24e","_parentId":"8b27196693b8478c8ea75087308fbe50","_type":"component","_layout":"full","_ravennaSourceID":"349014","_smvWiseScoring":{"ident":"it_349014","outcomes":{"decvar":[{"_varname":"860751","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"860751","_view":"All","interpret":"Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Port Security","_shouldBeSelected":true,"feedback":""},{"text":"IP Source Guard","_shouldBeSelected":false,"feedback":""},{"text":"DHCP Snooping","_shouldBeSelected":true,"feedback":""},{"text":"Web Security Appliance","_shouldBeSelected":false,"feedback":""},{"text":"Dynamic ARP Inspection","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":2,"_feedback":{"title":"","correct":"Cisco provides solutions to help mitigate Layer 2 attacks including these:<br /><ul><li><b>IP Source Guard (IPSG)</b> - prevents MAC and IP address spoofing attacks</li><li><b>Dynamic ARP Inspection (DAI)</b> - prevents ARP spoofing and ARP poisoning attacks</li><li><b>DHCP Snooping</b> - prevents DHCP starvation and SHCP spoofing attacks</li><li><b>Port Security</b> - prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks</li></ul>Web Security Appliance (WSA) is a mitigation technology for web-based threats.","_incorrect":{"final":"Cisco provides solutions to help mitigate Layer 2 attacks including these:<br /><ul><li><b>IP Source Guard (IPSG)</b> - prevents MAC and IP address spoofing attacks</li><li><b>Dynamic ARP Inspection (DAI)</b> - prevents ARP spoofing and ARP poisoning attacks</li><li><b>DHCP Snooping</b> - prevents DHCP starvation and SHCP spoofing attacks</li><li><b>Port Security</b> - prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks</li></ul>Web Security Appliance (WSA) is a mitigation technology for web-based threats.","notFinal":""},"_partlyCorrect":{"final":"Cisco provides solutions to help mitigate Layer 2 attacks including these:<br /><ul><li><b>IP Source Guard (IPSG)</b> - prevents MAC and IP address spoofing attacks</li><li><b>Dynamic ARP Inspection (DAI)</b> - prevents ARP spoofing and ARP poisoning attacks</li><li><b>DHCP Snooping</b> - prevents DHCP starvation and SHCP spoofing attacks</li><li><b>Port Security</b> - prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks</li></ul>Web Security Appliance (WSA) is a mitigation technology for web-based threats.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which statement describes the behavior of a switch when the MAC address table is full?</span></p>","_id":"4a9871f1eb0f4b4cb1b3ce0a75ea79c3","_parentId":"145cbbf168514258b7803fa664705589","_type":"component","_layout":"full","_ravennaSourceID":"349016","_smvWiseScoring":{"ident":"it_349016","outcomes":{"decvar":[{"_varname":"860824","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"860824","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.","_shouldBeSelected":false,"feedback":""},{"text":"It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.","_shouldBeSelected":true,"feedback":""},{"text":"It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.","_shouldBeSelected":false,"feedback":""},{"text":"It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"When the MAC address table is full, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic to all ports only within the local VLAN.","_incorrect":{"final":"When the MAC address table is full, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic to all ports only within the local VLAN.","notFinal":""},"_partlyCorrect":{"final":"When the MAC address table is full, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic to all ports only within the local VLAN.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which feature on a switch makes it vulnerable to VLAN hopping attacks?</span></p>","_id":"60cc5e598edc40049e93eb6797e7ab00","_parentId":"1c7f7437e11246d5a0178e2140113c68","_type":"component","_layout":"full","_ravennaSourceID":"349020","_smvWiseScoring":{"ident":"it_349020","outcomes":{"decvar":[{"_varname":"860774","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"860774","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"The mixed duplex mode enabled for all ports by default","_shouldBeSelected":false,"feedback":""},{"text":"The limited size of content-addressable memory space","_shouldBeSelected":false,"feedback":""},{"text":"Mixed port bandwidth support enabled for all ports by default","_shouldBeSelected":false,"feedback":""},{"text":"The automatic trunking port feature enabled for all ports by default","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic trunking port feature enabled by default on most switch ports.","_incorrect":{"final":"A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic trunking port feature enabled by default on most switch ports.","notFinal":""},"_partlyCorrect":{"final":"A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic trunking port feature enabled by default on most switch ports.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?</span></p>","_id":"ea4af1348eea46a79b985aa45e9294c7","_parentId":"1f7e0f5419b14298a554d5a1a60f7bef","_type":"component","_layout":"full","_ravennaSourceID":"349021","_smvWiseScoring":{"ident":"it_349021","outcomes":{"decvar":[{"_varname":"860775","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"860775","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Mixed duplex mode enabled for all ports by default","_shouldBeSelected":false,"feedback":""},{"text":"The limited size of content-addressable memory space","_shouldBeSelected":false,"feedback":""},{"text":"The automatic trunking port feature enabled for all ports by default","_shouldBeSelected":false,"feedback":""},{"text":"The native VLAN of the trunking port being the same as a user VLAN","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"A double-tagging (or double-encapsulated) VLAN hopping attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de-encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. This tag allows the frame to be forwarded to a VLAN that the original 802.1Q tag did not specify. An important characteristic of the double-encapsulated VLAN hopping attack is that it works even if trunk ports are disabled, because a host typically sends a frame on a segment that is not a trunk link. This type of attack is unidirectional and works only when the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port.","_incorrect":{"final":"A double-tagging (or double-encapsulated) VLAN hopping attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de-encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. This tag allows the frame to be forwarded to a VLAN that the original 802.1Q tag did not specify. An important characteristic of the double-encapsulated VLAN hopping attack is that it works even if trunk ports are disabled, because a host typically sends a frame on a segment that is not a trunk link. This type of attack is unidirectional and works only when the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port.","notFinal":""},"_partlyCorrect":{"final":"A double-tagging (or double-encapsulated) VLAN hopping attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de-encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. This tag allows the frame to be forwarded to a VLAN that the original 802.1Q tag did not specify. An important characteristic of the double-encapsulated VLAN hopping attack is that it works even if trunk ports are disabled, because a host typically sends a frame on a segment that is not a trunk link. This type of attack is unidirectional and works only when the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator enters the following commands on the switch SW1.<br /><br />SW1(config)# <b>interface range fa0/5 &ndash; 10</b><br />SW1(config-if)# <b>ip dhcp snooping limit rate 6<br /><br /></b>What is the effect after these commands are entered?</span></p>","_id":"df6f86321abb4b3e9b5d6c17a68ef14f","_parentId":"bc620c20196b486b986f642106a46ede","_type":"component","_layout":"full","_ravennaSourceID":"349100","_smvWiseScoring":{"ident":"it_349100","outcomes":{"decvar":[{"_varname":"861502","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861502","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.","_shouldBeSelected":true,"feedback":""},{"text":"FastEthernet ports 5 through 10 can receive up to 6 DHCP messages per second of any type.","_shouldBeSelected":false,"feedback":""},{"text":"If any of the FastEthernet ports 5 through 10 receive more than 6 DHCP messages per second, the port will be shut down.","_shouldBeSelected":false,"feedback":""},{"text":"If any of the FastEthernet ports 5 through 10 receive more than 6 DHCP messages per second, the port will continue to operate and an error message will be sent to the network administrator.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"When DHCP snooping is being configured, the number of DHCP discovery messages that untrusted ports  can receive per second should be rate-limited by using the <b>ip dhcp snooping limit rate</b> interface configuration command. When a port receives more messages than the rate allows, the extra messages will be dropped.","_incorrect":{"final":"When DHCP snooping is being configured, the number of DHCP discovery messages that untrusted ports  can receive per second should be rate-limited by using the <b>ip dhcp snooping limit rate</b> interface configuration command. When a port receives more messages than the rate allows, the extra messages will be dropped.","notFinal":""},"_partlyCorrect":{"final":"When DHCP snooping is being configured, the number of DHCP discovery messages that untrusted ports  can receive per second should be rate-limited by using the <b>ip dhcp snooping limit rate</b> interface configuration command. When a port receives more messages than the rate allows, the extra messages will be dropped.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator is configuring DAI on a switch with the command <b>ip arp inspection validate src-mac</b>. What is the purpose of this configuration command?</span></p>","_id":"998e570aa92f4b1cb142651cb9371a88","_parentId":"8d2afba246834924b50d1ec0dd9d1474","_type":"component","_layout":"full","_ravennaSourceID":"349103","_smvWiseScoring":{"ident":"it_349103","outcomes":{"decvar":[{"_varname":"860927","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"860927","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"It checks the source MAC address in the Ethernet header against the MAC address table.","_shouldBeSelected":false,"feedback":""},{"text":"It checks the source MAC address in the Ethernet header against the user-configured ARP ACLs.","_shouldBeSelected":false,"feedback":""},{"text":"It checks the source MAC address in the Ethernet header against the target MAC address in the ARP body.","_shouldBeSelected":false,"feedback":""},{"text":"It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"DAI can be configured to check for both destination or source MAC and IP addresses:<br /><ul><li><b>Destination MAC</b> - Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body.</li><li><b>Source MAC</b> - Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.</li><li><b>IP address</b> - Checks the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.</li></ul>","_incorrect":{"final":"DAI can be configured to check for both destination or source MAC and IP addresses:<br /><ul><li><b>Destination MAC</b> - Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body.</li><li><b>Source MAC</b> - Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.</li><li><b>IP address</b> - Checks the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.</li></ul>","notFinal":""},"_partlyCorrect":{"final":"DAI can be configured to check for both destination or source MAC and IP addresses:<br /><ul><li><b>Destination MAC</b> - Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body.</li><li><b>Source MAC</b> - Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.</li><li><b>IP address</b> - Checks the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.</li></ul>","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which two commands can be used to enable BPDU guard on a switch? (Choose two.)</span></p>","_id":"1a3f2490baa44948a5a41752300abbcd","_parentId":"722a50a2f529470abdd249d03b70c90c","_type":"component","_layout":"full","_ravennaSourceID":"349108","_smvWiseScoring":{"ident":"it_349108","outcomes":{"decvar":[{"_varname":"861056","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861056","_view":"All","interpret":"Option 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required."}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"S1(config)# <b>spanning-tree bpduguard default</b>","_shouldBeSelected":false,"feedback":""},{"text":"S1(config-if)# <b>spanning-tree bpduguard enable</b>","_shouldBeSelected":true,"feedback":""},{"text":"S1(config-if)# <b>enable spanning-tree bpduguard</b>","_shouldBeSelected":false,"feedback":""},{"text":"S1(config-if)# <b>spanning-tree portfast bpduguard</b>","_shouldBeSelected":false,"feedback":""},{"text":"S1(config)# <b>spanning-tree portfast bpduguard default</b>","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":2,"_feedback":{"title":"","correct":"BPDU guard can be enabled on all PortFast-enabled ports by using the <b>spanning-tree portfast bpduguard default</b> global configuration command. Alternatively, BPDU guard can be enabled on a PortFast-enabled port through the use of  the <b>spanning-tree bpduguard enable</b> interface configuration command.","_incorrect":{"final":"BPDU guard can be enabled on all PortFast-enabled ports by using the <b>spanning-tree portfast bpduguard default</b> global configuration command. Alternatively, BPDU guard can be enabled on a PortFast-enabled port through the use of  the <b>spanning-tree bpduguard enable</b> interface configuration command.","notFinal":""},"_partlyCorrect":{"final":"BPDU guard can be enabled on all PortFast-enabled ports by using the <b>spanning-tree portfast bpduguard default</b> global configuration command. Alternatively, BPDU guard can be enabled on a PortFast-enabled port through the use of  the <b>spanning-tree bpduguard enable</b> interface configuration command.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices. A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?</span></p>","_id":"c79531caafbd4d3189a0f4d094f3df19","_parentId":"8a0d52e1f6a64e50b975bfd82d33b4c6","_type":"component","_layout":"full","_ravennaSourceID":"349376","_smvWiseScoring":{"ident":"it_349376","outcomes":{"decvar":[{"_varname":"861875","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861875","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Change the SSID.","_shouldBeSelected":false,"feedback":""},{"text":"Configure devices to use a different channel.","_shouldBeSelected":false,"feedback":""},{"text":"Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.","_shouldBeSelected":true,"feedback":""},{"text":"Update the firmware on the new router.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band will allow for the 802.11n to use the two bands as two separate wireless networks to help manage the traffic, thus improving wireless performance.","_incorrect":{"final":"Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band will allow for the 802.11n to use the two bands as two separate wireless networks to help manage the traffic, thus improving wireless performance.","notFinal":""},"_partlyCorrect":{"final":"Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band will allow for the 802.11n to use the two bands as two separate wireless networks to help manage the traffic, thus improving wireless performance.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">What is the function provided by CAPWAP protocol in a corporate wireless network?</span></p>","_id":"bb63dc303fcd495a9842f9b2c60b8301","_parentId":"5a05fea8f0494f9697db015c498abc7d","_type":"component","_layout":"full","_ravennaSourceID":"349385","_smvWiseScoring":{"ident":"it_349385","outcomes":{"decvar":[{"_varname":"861673","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861673","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.","_shouldBeSelected":true,"feedback":""},{"text":"CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client.","_shouldBeSelected":false,"feedback":""},{"text":"CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing.","_shouldBeSelected":false,"feedback":""},{"text":"CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"<p>CAPWAP is an IEEE standard protocol that enables a WLC to manage multiple APs and WLANs. CAPWAP is also responsible for the encapsulation and forwarding of WLAN client traffic between an AP and a WLC.</p>","_incorrect":{"final":"<p>CAPWAP is an IEEE standard protocol that enables a WLC to manage multiple APs and WLANs. CAPWAP is also responsible for the encapsulation and forwarding of WLAN client traffic between an AP and a WLC.</p>","notFinal":""},"_partlyCorrect":{"final":"<p>CAPWAP is an IEEE standard protocol that enables a WLC to manage multiple APs and WLANs. CAPWAP is also responsible for the encapsulation and forwarding of WLAN client traffic between an AP and a WLC.</p>","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?</span></p>","_id":"bdd5fd132cfe4139aae830875674e897","_parentId":"60bc66d1416c4345acce6e5444ea3e93","_type":"component","_layout":"full","_ravennaSourceID":"349473","_smvWiseScoring":{"ident":"it_349473","outcomes":{"decvar":[{"_varname":"861877","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861877","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Rogues","_shouldBeSelected":false,"feedback":""},{"text":"Advanced","_shouldBeSelected":true,"feedback":""},{"text":"Access Points","_shouldBeSelected":false,"feedback":""},{"text":"Network Summary","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The Cisco 3504 WLC dashboard displays when a user logs into the WLC. It provides some basic settings and menus that users can quickly access to implement a variety of common configurations. By clicking the <b>Advanced</b> button, the user will access the advanced <b>Summary</b> page and access all the features of the WLC.","_incorrect":{"final":"The Cisco 3504 WLC dashboard displays when a user logs into the WLC. It provides some basic settings and menus that users can quickly access to implement a variety of common configurations. By clicking the <b>Advanced</b> button, the user will access the advanced <b>Summary</b> page and access all the features of the WLC.","notFinal":""},"_partlyCorrect":{"final":"The Cisco 3504 WLC dashboard displays when a user logs into the WLC. It provides some basic settings and menus that users can quickly access to implement a variety of common configurations. By clicking the <b>Advanced</b> button, the user will access the advanced <b>Summary</b> page and access all the features of the WLC.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">On a Cisco 3504 WLC <b>Summary</b> page (<b>Advanced &gt; Summary</b>), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?</span></p>","_id":"09f38549043642d0bbda08d74bfdedbd","_parentId":"eb861ab52fcc4aaeb17cbaf2912a526d","_type":"component","_layout":"full","_ravennaSourceID":"349474","_smvWiseScoring":{"ident":"it_349474","outcomes":{"decvar":[{"_varname":"861878","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861878","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"WLANs","_shouldBeSelected":true,"feedback":""},{"text":"SECURITY","_shouldBeSelected":false,"feedback":""},{"text":"WIRELESS","_shouldBeSelected":false,"feedback":""},{"text":"MANAGEMENT","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The <b>WLANs</b> tab in the Cisco 3504 WLC advanced <b>Summary</b> page allows a user to access the configuration of WLANs including security, QoS, and policy-mapping.","_incorrect":{"final":"The <b>WLANs</b> tab in the Cisco 3504 WLC advanced <b>Summary</b> page allows a user to access the configuration of WLANs including security, QoS, and policy-mapping.","notFinal":""},"_partlyCorrect":{"final":"The <b>WLANs</b> tab in the Cisco 3504 WLC advanced <b>Summary</b> page allows a user to access the configuration of WLANs including security, QoS, and policy-mapping.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which protocol can be used to monitor the network?</span></p>","_id":"d0f7ded775b04d6499e81039adb6c52f","_parentId":"399a717b4a0a4f159231e09b8cfd73c0","_type":"component","_layout":"full","_ravennaSourceID":"349518","_smvWiseScoring":{"ident":"it_349518","outcomes":{"decvar":[{"_varname":"861863","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861863","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"AAA","_shouldBeSelected":false,"feedback":""},{"text":"SNMP","_shouldBeSelected":true,"feedback":""},{"text":"DHCP","_shouldBeSelected":false,"feedback":""},{"text":"RADIUS","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Simple Network Management Protocol (SNMP) is used to monitor the network.","_incorrect":{"final":"Simple Network Management Protocol (SNMP) is used to monitor the network.","notFinal":""},"_partlyCorrect":{"final":"Simple Network Management Protocol (SNMP) is used to monitor the network.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?</span></p>","_id":"6c101ce905344e34b0792a0f12064cdf","_parentId":"c9a83d9ed8f748eb89ec94a0c5395a30","_type":"component","_layout":"full","_ravennaSourceID":"349520","_smvWiseScoring":{"ident":"it_349520","outcomes":{"decvar":[{"_varname":"861865","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861865","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"DNS","_shouldBeSelected":false,"feedback":""},{"text":"NAT","_shouldBeSelected":true,"feedback":""},{"text":"DHCP","_shouldBeSelected":false,"feedback":""},{"text":"RADIUS","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Any address with the 10 in the first octet is a private IPv4 address and cannot be routed on the internet. The wireless router will use a service called Network Address Translation (NAT) to convert private IPv4 addresses to internet-routable IPv4 addresses for wireless devices to gain access to the internet.","_incorrect":{"final":"Any address with the 10 in the first octet is a private IPv4 address and cannot be routed on the internet. The wireless router will use a service called Network Address Translation (NAT) to convert private IPv4 addresses to internet-routable IPv4 addresses for wireless devices to gain access to the internet.","notFinal":""},"_partlyCorrect":{"final":"Any address with the 10 in the first octet is a private IPv4 address and cannot be routed on the internet. The wireless router will use a service called Network Address Translation (NAT) to convert private IPv4 addresses to internet-routable IPv4 addresses for wireless devices to gain access to the internet.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?</span></p>","_id":"f58df250784d45fba735ef3520198620","_parentId":"e679c2b021c4440f9ce2c6f1e8684a27","_type":"component","_layout":"full","_ravennaSourceID":"349521","_smvWiseScoring":{"ident":"it_349521","outcomes":{"decvar":[{"_varname":"861884","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861884","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"NAT","_shouldBeSelected":false,"feedback":""},{"text":"QoS","_shouldBeSelected":true,"feedback":""},{"text":"DNS","_shouldBeSelected":false,"feedback":""},{"text":"DHCP","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Many wireless routers have an option for configuring quality of service (QoS). By configuring QoS, certain time-sensitive traffic types, such as voice and video, are prioritized over traffic that is not as time-sensitive, such as email and web browsing.","_incorrect":{"final":"Many wireless routers have an option for configuring quality of service (QoS). By configuring QoS, certain time-sensitive traffic types, such as voice and video, are prioritized over traffic that is not as time-sensitive, such as email and web browsing.","notFinal":""},"_partlyCorrect":{"final":"Many wireless routers have an option for configuring quality of service (QoS). By configuring QoS, certain time-sensitive traffic types, such as voice and video, are prioritized over traffic that is not as time-sensitive, such as email and web browsing.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?</span></p>","_id":"d88dc4b3d9004232b8e709105d64395c","_parentId":"5107ae50691c4002a4f387a54de3fe36","_type":"component","_layout":"full","_ravennaSourceID":"349522","_smvWiseScoring":{"ident":"it_349522","outcomes":{"decvar":[{"_varname":"861867","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861867","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"AAA","_shouldBeSelected":false,"feedback":""},{"text":"NAT","_shouldBeSelected":false,"feedback":""},{"text":"SNMP","_shouldBeSelected":false,"feedback":""},{"text":"RADIUS","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Remote Authentication Dial-In User Service (RADIUS) is a protocol and server software that provides user-based authentication for an organization. When a WLAN is configured to use a RADIUS server, users will enter username and password credentials that are verified by the RADIUS server before allowing to the WLAN.","_incorrect":{"final":"Remote Authentication Dial-In User Service (RADIUS) is a protocol and server software that provides user-based authentication for an organization. When a WLAN is configured to use a RADIUS server, users will enter username and password credentials that are verified by the RADIUS server before allowing to the WLAN.","notFinal":""},"_partlyCorrect":{"final":"Remote Authentication Dial-In User Service (RADIUS) is a protocol and server software that provides user-based authentication for an organization. When a WLAN is configured to use a RADIUS server, users will enter username and password credentials that are verified by the RADIUS server before allowing to the WLAN.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which step is required before creating a new WLAN on a Cisco 3500 series WLC?</span></p>","_id":"412d2a0adbcf4098b2a91ccd0926ab25","_parentId":"f3b5393bc54541eebd243e1cb1b276e5","_type":"component","_layout":"full","_ravennaSourceID":"349526","_smvWiseScoring":{"ident":"it_349526","outcomes":{"decvar":[{"_varname":"861869","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861869","_view":"All","interpret":"2 points for Option 20 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Create a new SSID.","_shouldBeSelected":false,"feedback":""},{"text":"Create a new VLAN interface.","_shouldBeSelected":true,"feedback":""},{"text":"Build or have an SNMP server available.","_shouldBeSelected":false,"feedback":""},{"text":"Build or have a RADIUS server available.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Each new WLAN configured on a Cisco 3500 series WLC needs its own VLAN interface. Thus it is required that a new VLAN interface to be created first before a new WLAN can be created.","_incorrect":{"final":"Each new WLAN configured on a Cisco 3500 series WLC needs its own VLAN interface. Thus it is required that a new VLAN interface to be created first before a new WLAN can be created.","notFinal":""},"_partlyCorrect":{"final":"Each new WLAN configured on a Cisco 3500 series WLC needs its own VLAN interface. Thus it is required that a new VLAN interface to be created first before a new WLAN can be created.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?</span></p>","_id":"22950acd010d4f8dbdebe12b072df236","_parentId":"21220d95979a4458bc49f17a89f72720","_type":"component","_layout":"full","_ravennaSourceID":"349528","_smvWiseScoring":{"ident":"it_349528","outcomes":{"decvar":[{"_varname":"861871","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861871","_view":"All","interpret":"2 points for Option 40 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"It allows users to authenticate and access the WLAN.","_shouldBeSelected":false,"feedback":""},{"text":"It is used by the RADIUS server to authenticate WLAN users.","_shouldBeSelected":false,"feedback":""},{"text":"It is used to authenticate and encrypt user data on the WLAN.","_shouldBeSelected":false,"feedback":""},{"text":"It is used to encrypt the messages between the WLC and the RADIUS server.","_shouldBeSelected":true,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The RADIUS protocol uses security features to protect communications between the RADIUS server and clients. A shared secret is the password used between the WLC and the RADIUS server. It is not for end users.","_incorrect":{"final":"The RADIUS protocol uses security features to protect communications between the RADIUS server and clients. A shared secret is the password used between the WLC and the RADIUS server. It is not for end users.","notFinal":""},"_partlyCorrect":{"final":"The RADIUS protocol uses security features to protect communications between the RADIUS server and clients. A shared secret is the password used between the WLC and the RADIUS server. It is not for end users.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?</span></p>","_id":"b25fa21060cc475e8755f5f1fd411889","_parentId":"6188d947bac64530864736901ae00889","_type":"component","_layout":"full","_ravennaSourceID":"349532","_smvWiseScoring":{"ident":"it_349532","outcomes":{"decvar":[{"_varname":"861892","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"861892","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Require all wireless devices to use the 802.11n standard.","_shouldBeSelected":false,"feedback":""},{"text":"Check and keep the firmware of the wireless router updated.","_shouldBeSelected":false,"feedback":""},{"text":"Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.","_shouldBeSelected":true,"feedback":""},{"text":"Add a Wi-Fi range extender to the WLAN and set the AP and the range extender to serve different bands.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"By default, dual-band routers and APs use the same network name on both the 2.4 GHz band and the 5 GHz band. The simplest way to segment traffic is to rename one of the wireless networks.","_incorrect":{"final":"By default, dual-band routers and APs use the same network name on both the 2.4 GHz band and the 5 GHz band. The simplest way to segment traffic is to rename one of the wireless networks.","notFinal":""},"_partlyCorrect":{"final":"By default, dual-band routers and APs use the same network name on both the 2.4 GHz band and the 5 GHz band. The simplest way to segment traffic is to rename one of the wireless networks.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><a class='mcq_activity_download_btn' href='en-US/assets/i350315v1n2_i211254v1n2_211254.pka' target=\"_blank\"><span><material-icon icon='file_download' class=\"download-icon\"></material-icon></span>&nbsp;&nbsp;PT Activity</a></p><p><span style=\"color:#000000\">Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.<br />Which event will take place if there is a port security violation on switch S1 interface Fa0/1?</span></p>","_id":"5160460e5bfc43d18a94610b1103924c","_parentId":"7bc30a9eb0324350946f748be0a15280","_type":"component","_layout":"full","_ravennaSourceID":"350315","_smvWiseScoring":{"ident":"it_350315","outcomes":{"decvar":[{"_varname":"863389","_maxvalue":1,"title":"correctness of response"},{"_varname":"863390","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863389","_view":"All","interpret":"1 point for Option 30 points for any other option"},{"_varname":"863390","_view":"All","interpret":"2 points for Option 30 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"A notification is sent.","_shouldBeSelected":false,"feedback":""},{"text":"A syslog message is logged.","_shouldBeSelected":false,"feedback":""},{"text":"Packets with unknown source addresses will be dropped.","_shouldBeSelected":true,"feedback":""},{"text":"The interface will go into error-disabled state.","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"The violation mode can be viewed by issuing the <b>show port-security interface</b> <i>&lt;int&gt;</i> <b></b>command. Interface FastEthernet 0/1 is configured with the violation mode of protect. If there is a violation, interface FastEthernet 0/1 will drop packets with unknown MAC addresses.","_incorrect":{"final":"The violation mode can be viewed by issuing the <b>show port-security interface</b> <i>&lt;int&gt;</i> <b></b>command. Interface FastEthernet 0/1 is configured with the violation mode of protect. If there is a violation, interface FastEthernet 0/1 will drop packets with unknown MAC addresses.","notFinal":""},"_partlyCorrect":{"final":"The violation mode can be viewed by issuing the <b>show port-security interface</b> <i>&lt;int&gt;</i> <b></b>command. Interface FastEthernet 0/1 is configured with the violation mode of protect. If there is a violation, interface FastEthernet 0/1 will drop packets with unknown MAC addresses.","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol controls what users can do on the network?</span></p>","_id":"d74046804cf44733b2aadd9bae304035","_parentId":"ad6e8cbce2e7462faad76deb37e03d27","_type":"component","_layout":"full","_ravennaSourceID":"350367","_smvWiseScoring":{"ident":"it_350367","outcomes":{"decvar":[{"_varname":"863443","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863443","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Authorization","_shouldBeSelected":true,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?</span></p>","_id":"a3f1de26cddc4366ab8b0b622f89cf12","_parentId":"349f65463f2746e49dc63330f722c2c0","_type":"component","_layout":"full","_ravennaSourceID":"350368","_smvWiseScoring":{"ident":"it_350368","outcomes":{"decvar":[{"_varname":"863444","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863444","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Authentication","_shouldBeSelected":true,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol audits what users actions are performed on the network?</span></p>","_id":"82baf906435b45d3aeeb1b65f6e823a3","_parentId":"919b173a28704fe9adcb41770741b798","_type":"component","_layout":"full","_ravennaSourceID":"350369","_smvWiseScoring":{"ident":"it_350369","outcomes":{"decvar":[{"_varname":"863445","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863445","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Accounting","_shouldBeSelected":true,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports?</span></p>","_id":"e1813511112b49c1a8488ff9aa90d735","_parentId":"82d229a608e74df192fd92d5072b28b5","_type":"component","_layout":"full","_ravennaSourceID":"350370","_smvWiseScoring":{"ident":"it_350370","outcomes":{"decvar":[{"_varname":"863446","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863446","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"802.1X","_shouldBeSelected":true,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?</span></p>","_id":"ebb1aa35aab54d97bb7fd41ac9496e72","_parentId":"342ca72ce1ba43228d107bfd43400913","_type":"component","_layout":"full","_ravennaSourceID":"350371","_smvWiseScoring":{"ident":"it_350371","outcomes":{"decvar":[{"_varname":"863447","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863447","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Accounting","_shouldBeSelected":true,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol controls who is permitted to access a network?</span></p>","_id":"532ab49d051945289d4461f335d6141c","_parentId":"f2e3b79cbe874c6b81e893f28bcfe874","_type":"component","_layout":"full","_ravennaSourceID":"350372","_smvWiseScoring":{"ident":"it_350372","outcomes":{"decvar":[{"_varname":"863448","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863448","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Authentication","_shouldBeSelected":true,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol collects and reports usage data?</span></p>","_id":"53f520d307d644f1bc50d067b0a703c6","_parentId":"f7e713db58bf4a92b9d8ef8a2e4b5e58","_type":"component","_layout":"full","_ravennaSourceID":"350373","_smvWiseScoring":{"ident":"it_350373","outcomes":{"decvar":[{"_varname":"863449","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863449","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Accounting","_shouldBeSelected":true,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol indicates success or failure of a client-requested service with a PASS or FAIL message?</span></p>","_id":"6b40730eb15f4a87905e910bef36fba8","_parentId":"1aa0cb6a472845ee9df62f6573d2e291","_type":"component","_layout":"full","_ravennaSourceID":"350374","_smvWiseScoring":{"ident":"it_350374","outcomes":{"decvar":[{"_varname":"863450","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863450","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Authorization","_shouldBeSelected":true,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?</span></p>","_id":"e8213a0ae3a342e78b5c762f0922deb4","_parentId":"513f1af84ee54b108354e4309c6fc271","_type":"component","_layout":"full","_ravennaSourceID":"350375","_smvWiseScoring":{"ident":"it_350375","outcomes":{"decvar":[{"_varname":"863451","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863451","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"802.1X","_shouldBeSelected":true,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"Authentication","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which access control component, implementation, or protocol is based upon usernames and passwords?</span></p>","_id":"aa24a989aa4e4380938b334596ecc0ce","_parentId":"c45d3c90dd0f4d28b82dd4ed7684890f","_type":"component","_layout":"full","_ravennaSourceID":"350376","_smvWiseScoring":{"ident":"it_350376","outcomes":{"decvar":[{"_varname":"863452","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863452","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Authentication","_shouldBeSelected":true,"feedback":""},{"text":"Authorization","_shouldBeSelected":false,"feedback":""},{"text":"Accounting","_shouldBeSelected":false,"feedback":""},{"text":"802.1X","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?</span></p>","_id":"e7e2a41573f04d8b825b46c2c2152561","_parentId":"6121ef2741d742b7bc0a878bb7b8563a","_type":"component","_layout":"full","_ravennaSourceID":"350377","_smvWiseScoring":{"ident":"it_350377","outcomes":{"decvar":[{"_varname":"863453","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863453","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless wide-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network commonly uses Bluetooth or ZigBee devices?</span></p>","_id":"1881ab53c8164f2fba482c0f4ddac75f","_parentId":"bc4926f33ebd45b69c3853d93ce5acd2","_type":"component","_layout":"full","_ravennaSourceID":"350378","_smvWiseScoring":{"ident":"it_350378","outcomes":{"decvar":[{"_varname":"863454","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863454","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless personal-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network uses transmitters to provide wireless service over a large urban region?</span></p>","_id":"e79046cb1ad145478926a3153bb21370","_parentId":"46fd19ed4f4b483d936ab1fc60927900","_type":"component","_layout":"full","_ravennaSourceID":"350379","_smvWiseScoring":{"ident":"it_350379","outcomes":{"decvar":[{"_varname":"863455","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863455","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless metropolitan-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network is suitable for use in a home or office?</span></p>","_id":"798f71764baf410cb1887461a7f2b039","_parentId":"603e3b40a7eb49998fa87cffef395a7e","_type":"component","_layout":"full","_ravennaSourceID":"350380","_smvWiseScoring":{"ident":"it_350380","outcomes":{"decvar":[{"_varname":"863456","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863456","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless local-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network often makes use of devices mounted on buildings?</span></p>","_id":"cac8846275814217829b48bb57092f17","_parentId":"aca44efde8bb46279ef31dc72cd6b30a","_type":"component","_layout":"full","_ravennaSourceID":"350381","_smvWiseScoring":{"ident":"it_350381","outcomes":{"decvar":[{"_varname":"863457","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863457","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless metropolitan-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network is suitable for national and global communications?</span></p>","_id":"315863da3e684e2ea5456a8e7b28bb7d","_parentId":"963de19f0b7844fc95c70140547ea8ac","_type":"component","_layout":"full","_ravennaSourceID":"350382","_smvWiseScoring":{"ident":"it_350382","outcomes":{"decvar":[{"_varname":"863458","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863458","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless wide-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network uses transmitters to cover a medium-sized network, usually up to 300 feet (91.4 meters)?</span></p>","_id":"9289a7eb7f974d5ba30c06dcd1d853a9","_parentId":"fb6929c94f16471da70d1e361531c2ee","_type":"component","_layout":"full","_ravennaSourceID":"350383","_smvWiseScoring":{"ident":"it_350383","outcomes":{"decvar":[{"_varname":"863459","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863459","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless local-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?</span></p>","_id":"0b3a31a3630942a2a5922ed7ec4c1704","_parentId":"4ea350cceec54444bce1ab177a98393c","_type":"component","_layout":"full","_ravennaSourceID":"350384","_smvWiseScoring":{"ident":"it_350384","outcomes":{"decvar":[{"_varname":"863460","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863460","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless local-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network is suitable for providing wireless access to a city or district?</span></p>","_id":"f1d4c685dc104ee79b0136e7f32b5d4d","_parentId":"86515629ba9442d0a98c1d56cd38f6a1","_type":"component","_layout":"full","_ravennaSourceID":"350385","_smvWiseScoring":{"ident":"it_350385","outcomes":{"decvar":[{"_varname":"863461","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863461","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless metropolitan-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless personal-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"mcq","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"title":"Question","displayTitle":"Question","body":"<p><span style=\"color:#000000\">Which type of wireless network uses low powered transmitters for a short-range network, usually 20 to 30 ft. (6 to 9 meters)?</span></p>","_id":"cf629861cc60442ca3f19f177c67dde2","_parentId":"189bb9bcddae4c52aa6de35d11410c6c","_type":"component","_layout":"full","_ravennaSourceID":"350386","_smvWiseScoring":{"ident":"it_350386","outcomes":{"decvar":[{"_varname":"863462","_maxvalue":2,"title":"correctness of response"}],"interpretvar":[{"_varname":"863462","_view":"All","interpret":"2 points for Option 10 points for any other option"}]}},"_onScreen":{"_isEnabled":false,"_classes":"","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_courseProgress":{"_isEnabled":true},"instruction":"","_items":[{"text":"Wireless personal-area network","_shouldBeSelected":true,"feedback":""},{"text":"Wireless local-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless metropolitan-area network","_shouldBeSelected":false,"feedback":""},{"text":"Wireless wide-area network","_shouldBeSelected":false,"feedback":""}],"_attempts":-1,"_canShowModelAnswer":false,"_canShowFeedback":false,"_canShowMarking":true,"_shouldDisplayAttempts":false,"_isRandom":true,"_recordInteraction":true,"_questionWeight":1,"_selectable":1,"_feedback":{"title":"","correct":"Correct","_incorrect":{"final":"Incorrect","notFinal":""},"_partlyCorrect":{"final":"","notFinal":""}},"_buttons":{"_submit":{"buttonText":"","ariaLabel":""},"_reset":{"buttonText":"","ariaLabel":""},"_showCorrectAnswer":{"buttonText":"","ariaLabel":""},"_hideCorrectAnswer":{"buttonText":"","ariaLabel":""},"_showFeedback":{"buttonText":"","ariaLabel":""},"remainingAttemptsText":"","remainingAttemptText":""}},{"_component":"assessmentResults","_classes":"background-colour1","_isOptional":false,"_isAvailable":true,"_isHidden":false,"_isVisible":true,"_isResetOnRevisit":false,"_ariaLevel":0,"_disableAccessibilityState":false,"title":"Quiz feedback","displayTitle":"","body":"","_id":"7fd471e26bd2441fb234523d61b53abe","_parentId":"bac67ca7724241b3acb7a5ab1338d595","_type":"component","_layout":"full","_onScreen":{"_isEnabled":false,"_classes":"animated pulse infinite","_percentInviewVertical":50},"_pageLevelProgress":{"_isEnabled":true,"_isCompletionIndicatorEnabled":false},"_menuTOC":{"_isEnabled":false},"_courseProgress":{"_isEnabled":true},"_search":{"_isEnabled":true,"keywords":""},"_mentor":{"_isEnabled":false,"_registeredMentors":[]},"_healthGauge":{"_isEnabled":false,"_onCorrectValue":1,"_onPartiallyCorrectValue":1,"_onIncorrectValue":1},"instruction":"","_isVisibleBeforeCompletion":false,"_setCompletionOn":"pass","_resetType":"inherit","_assessmentId":"5b6769f4c4ee415b90544f4bde7398b2","_retry":{"button":"Retry Quiz","feedback":"","_routeToAssessment":false},"_completionBody":"<p style=\"text-align:center\"><span style=\"color:#000000\">You&#39;ve scored {{scoreAsPercent}}%.</span></p><p style=\"text-align:center\"><span style=\"color:#000000\">{{{feedback}}}</span></p>","_bands":[{"_score":0,"feedback":"<p style=\"text-align:center\"><span style=\"color:#000000\">You have not passed the assessment this time. Select Reset to retake it. <span class='mobile-instruction-text'>Tap the exit icon in the top right or simply close this tab or window.</span></span></p><p style=\"text-align:center\"><span style=\"color:#000000\">Remember that you can return to the module for reference or to retake the assessment at any time.</span></p>","_allowRetry":false,"_classes":"","progressMeterColor":"#c91111"},{"_score":70,"feedback":"<p style=\"text-align: center;\"><span style=\"color:#000000\">Congratulations, you have passed the assessment.</span></p>","_allowRetry":false,"_classes":"","progressMeterColor":"#1c8e0d"}]}]