單項(xiàng)選擇題

Exhibit:

You work as a network administrator at. You study the exhibit carefully. In the wireless LAN all devices are configured with static WEP keys.
 What will happen if the access point receives packets sent by the wireless client adapter that are not encrypted with the appropriate key?()

A.The wireless client adapter will not be authenticated by the authentication server, but the access point deliver the packets to the intended receiver.
B.The wireless client adapter will not be able to send any packets to the access point.
C.The access point will discard the packets and never deliver them to the intended receiver.
D.The wireless client adapter will be authenticated by the authentication server and the access point will deliver the packets to the intended receiver.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Exhibit: 

You work as a network technician at. Study the exhibit carefully. You are required configure the static WEP keys on the wireless client adapter using the Cisco ADU (Aironet Desktop Utility). 
What should you have in mind when doing this?()

A.Before the client adapter WEP key is generated, all wireless infrastructure devices (such as access points, servers, etc.) must be properly configured for LEAP authentication.
B.The client adapter WEP key should be generated by the AP and forwarded to the client adapter efore the client adapter can establish communication with the wireless network.
C.In infrastructure mode the client adapter WEP key must match the WEP key used by the access point. In ad hoc mode all client WEP keys within the wireless network must match each other.
D.The client adapter WEP key should be generated by the authentication server and forwarded to the client adapter before the client adapter can establish communication with the wireless network.
E.None of the other alternatives apply

2.單項(xiàng)選擇題What is the objective of the Cisco Compatible Extensions program?()

A.to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless code
B.to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless products
C.to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovations
D.to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless

3.單項(xiàng)選擇題

Exhibit: 

You work as a network administrator at . You study the exhibit carefully. 
What information can be drawn from the output?()

A.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter, but traffic is still forwarded across the ports.
B.Interfaces FastEthernet3/1 and FastEthernet3/2 are candidate for becoming the STP root port, but neither can realize that role until BPDUs with a superior root bridge parameter are no longer received on at least one of the interfaces.
C.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces automatically recover and resume normal operation.
D.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces will need to be administratively shut down, and brought back up, to resume normal operation.

4.單項(xiàng)選擇題

Exhibit:

You work as a network administrator at . You study the exhibit carefully. 
What can be drawn about VLANs 200 and 202 from the exhibit?()

A.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic between community ports and to promiscuous ports.
B.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic from isolated ports to a promiscuous port.
C.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic from isolated ports to a promiscuous port.
D.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic between community ports and to promiscuous ports.

5.多項(xiàng)選擇題What are two methods of mitigating MAC address flooding attacks?()

A.Place unused ports in a common VLAN.
B.Implement private VLANs.
C.Implement DHCP snooping.
D.Implement port security.
E.Implement VLAN access maps.

7.多項(xiàng)選擇題Which two statements about a wireless repeater topology are true?()

A.A wireless repeater is an access point that is not connected to the wired LAN.
B.The repeater feature is only available in lightweight access point topologies.
C.The SSID of the root access point must be configured on the repeater access point.
D.This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E.This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F.To avoid interference, the repeater access point must use a different channel from what the root access point uses.

8.多項(xiàng)選擇題

You need to configure the WLAN client utility on a new machine.
 Which two of the following are true regarding this utility? ()

A.The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.
B.In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.
C.The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.
D.The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.

9.單項(xiàng)選擇題

A Cisco Aironet Wireless LAN Adapter CB21AG is inserted into a user’s PC cardbus slot. Both the green status LED and the amber activity LED are blinking slowly. 
What is the condition of the adapter? ()

A.The adapter is scanning for the wireless network for which it is configured.
B.The adapter is in power save mode.
C.The adapter is transmitting or receiving data while associated to an access point or another client.
D.The adapter is not receiving power.
E.The adapter is associated to an access point or another client.
F.None of the other alternatives apply

10.單項(xiàng)選擇題

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network. 
Which description correctly describes a MAC address flooding attack?()

A.The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B.Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E.The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F.Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G.None of the other alternatives apply

最新試題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:?jiǎn)雾?xiàng)選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:?jiǎn)雾?xiàng)選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:?jiǎn)雾?xiàng)選擇題