Question

Router R1 connects to switch S1 port Fa0/24 through the Fa0/1 interface. The S1 Fa0/2 port is used to connect the host labeled PC1. The following command output is given: S1# show port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action                            (Count)             (Count)        (Count) ----------------------------------------------------------------------------------------------------         Fa0/1                    1                  0                      0              Shutdown         Fa0/2                    1                  1                      1              Shutdown ------------------------------------------------------------------------------------------------ Total Addresses in System (excluding one mac per port)        : 0 Max Addresses limit in System (excluding one mac per port) : 8192 S1#

Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

Question

A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

Question

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

Question

A PC connects to an IP phone that connects to a switch through port Fa0/2.

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

Question

The following words are displayed: ATC_S2# show port-security interface fastethernet 0/3 Port Security              : Enabled Port Status                : Secure-up Violation Mode             : Shutdown Aging Time                 : 0 mins Aging Type                 : Absolute SecureStatic Address Aging : Disabled Maximum MAC Addresses      : 2 Total MAC Addresses        : 1 Configured MAC Addresses   : 0 Sticky MAC Addresses       : 1 Last Source Address:Vlan   : 00D0.D3B6.C26B:10 Security Violation Count   : 0

Refer to the exhibit. What can be determined about port security from the information that is shown?

Question

Which type of management frame may regularly be broadcast by an AP?

Question

What is an advantage of SSID cloaking?​

Question

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

Question

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

Question

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

Question

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

Question

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

Question

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

Question

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

Question

The exhibit consists of a graphic with a switch labeled S1 and a PC labeled PC1. Switch S1 port Fa0/12 connects to PC1. Under PC1 is the MAC address 000b.bd1b.05ae. The following commands are under the graphic: S1(config)# interface fastethernet 0/12 S1(config-if)# switchport mode access  S1(config-if)# switchport port-security S1(config-if)# switchport port-security maximum 1 S1(config-if)# switchport port-security 000d.bd1b.0245

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Question

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

Question

Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

Question

A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

Question

As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

Question

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

Question

What device is considered a supplicant during the 802.1X authentication process?

Question

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Question

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

Question

What is the result of a DHCP starvation attack?

Question

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Question

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

Question

Match each functional component of AAA with its description.

  1. Authorization → Determines what resources users can access or the operations they are allowed to perform
  2. Authentication → Proves that users are who they say they are
  3. Accounting → Records what users do and what they access

Question

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

Question

While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?

Question

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

Question

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

Question

A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

Question

The exhibit shows a network topology. On the top, there are two routers, labeled R1 and R2. Under the two routers, there are two Layer 3 switches, labeled DS1 and DS2, . Under DS1 and DS2, there are three Layer 2 switches, labeled AS1, AS2, and AS3. Both R1 and R2 have two connections, one to DS1 and another to DS2. DS1 and DS2 each has three connections, one to AS1, one to AS2, and one to AS3. PC1 is connected on switch AS1 and PC2 is connected to switch AS2. There is a DHCP server connected on switch AS3.

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

Question

What are three techniques for mitigating VLAN attacks? (Choose three.)

Question

An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?

Question

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

Question

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

Question

Which statement describes the behavior of a switch when the MAC address table is full?

Question

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

Question

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

Question

A network administrator enters the following commands on the switch SW1.

SW1(config)# interface range fa0/5 – 10
SW1(config-if)# ip dhcp snooping limit rate 6

What is the effect after these commands are entered?

Question

A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?

Question

Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

Question

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices. A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

Question

What is the function provided by CAPWAP protocol in a corporate wireless network?

Question

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

Question

On a Cisco 3504 WLC Summary page (Advanced > Summary), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

Question

Which protocol can be used to monitor the network?

Question

A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?

Question

Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

Question

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

Question

Which step is required before creating a new WLAN on a Cisco 3500 series WLC?

Question

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

Question

A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

Question

  PT Activity

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Question

Which access control component, implementation, or protocol controls what users can do on the network?

Question

Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?

Question

Which access control component, implementation, or protocol audits what users actions are performed on the network?

Question

Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports?

Question

Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

Question

Which access control component, implementation, or protocol controls who is permitted to access a network?

Question

Which access control component, implementation, or protocol collects and reports usage data?

Question

Which access control component, implementation, or protocol indicates success or failure of a client-requested service with a PASS or FAIL message?

Question

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

Question

Which access control component, implementation, or protocol is based upon usernames and passwords?

Question

Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?

Question

Which type of wireless network commonly uses Bluetooth or ZigBee devices?

Question

Which type of wireless network uses transmitters to provide wireless service over a large urban region?

Question

Which type of wireless network is suitable for use in a home or office?

Question

Which type of wireless network often makes use of devices mounted on buildings?

Question

Which type of wireless network is suitable for national and global communications?

Question

Which type of wireless network uses transmitters to cover a medium-sized network, usually up to 300 feet (91.4 meters)?

Question

Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?

Question

Which type of wireless network is suitable for providing wireless access to a city or district?

Question

Which type of wireless network uses low powered transmitters for a short-range network, usually 20 to 30 ft. (6 to 9 meters)?