3 апреля 2010 г.

ICND1/Chapter 3/ Review Questions with Answers

Вопросы и ответы из Chapter 3 книги  Cisco Pres"Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822" для повторения перед экзаменом.

Review Questions
1. What is the most tangible benefit of wireless implementation?
a. Cost reduction

2. What method does a WLAN use to control transmissions?
a. CSMA/CA (carrier sense multiple access with collision avoidance)

3. Match each factor that influences the transmission of radio waves to its correct description.
_B_Occurs when RF waves bounce off metal or glass surfaces
_A_Occurs when RF waves are soaked up by walls
_C_Occurs when RF waves strike an uneven surface and are reflected in many directions
a. absorption
b. reflection
c. scattering

4. Which regulatory agency controls the 801.11 standard that governs WLANs?

5. Which organization offers certification for interoperability among vendors of 802.11 products?
a. Wi-Fi

6. Which two are the unlicensed bands used by WLANs?
c. 2.4-GHz band
d. 5-GHz band

7. Which two of the 802.11 standards has the highest possible data rates?
b. 802.11a
e. 802.11g

8. Which 802.11 standard transmits using the 5-GHz band?
b. 802.11a

9. Which is true about the Wi-Fi Alliance organization?
c. It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LANs.

10. What is a rogue access point?
c. An unsecured access point that has been placed on a WLAN

11. Which three are the steps to secure a WLAN?
a. Encryption for providing privacy and confidentiality
b. Authentication to ensure that legitimate clients and users access the network via trusted access points
d. Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
12. Which standard provides the strongest level of WLAN security?
d. 802.11i/WPA2

13. What factor determines which access point a client associates with?
d. The access point that is received with the strongest signal

14. When you are using 802.11x, how is the client authenticated?
c. The access point encapsulates any 802.1x traffic bound for the authentication server and sends it to the server.

15. Which is true when comparing WPA and WPA2?
d. WPA uses TKIP/MIC encryption whereas WPA 2 uses AES-CCMP encryption.

16. Match each of the following 802.11 topologies to its description.
_A_Mobile clients connect directly without an intermediate access point.
_B_The communication devices use a single access point for connectivity to each other or to wired network resources.
_C_The wireless topology is two or more service sets connected by a distribution system (DS) or, more commonly, a wired infrastructure.

a. Ad hoc mode
b. Basic Service Set (BSS)
c. Extended Services Set (ESS)

17. What does the physical area of radio frequency coverage provided by an access point define?
b. The basic service area

18. When implementing Extended Service Areas, how much overlap is suggested?
b. 10 to 15 percent

19. What strategy enables a client to communicate while moving?
a. The ability to shift data rates

20. Which three are basic wireless access point parameters?
b. Authentication
e. RF channel with optional power

21. When implementing a WLAN, when should you use WEP?
d. Only if the hardware equipment does not support WPA

22. Match the wireless client to its description.
_C_Full-featured supplicant for both wired and wireless client
_A_Windows operating systems basic wireless supplicant client
_B_More advanced wireless client features than those of native operating system

a. WZC
b. Cisco Compatible Extensions
c. Cisco Secure Services Client

Комментариев нет:

Отправить комментарий