Professional Documents
Culture Documents
CHAPTER 4
CHAPTER 4
1. In the context of mobile devices, what does the term tethering involve?
• connecting a mobile device to a USB port on a computer in order to charge the mobile
device
• connecting a mobile device to another mobile device or computer to share a network
connection
• connecting a mobile device to a 4G cellular network
• connecting a mobile device to a hands-free headset
2. Which feature of 802.11n wireless access points allows them to transmit data at faster
speeds than previous versions of 802.11 Wi-Fi standards did?
• SPS
• WPS
• MITM
• MIMO
• open
• WPA
• WPA2
• WEP
• shared key
4. Which parameter is commonly used to identify a wireless network name when a home
wireless AP is being configured?
• SSID
• BESS
• ad hoc
• ESS
6. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz
ranges?
• 802.11a
• 802.11g
• 802.11b
• 802.11n
8. Which two roles are typically performed by a wireless router that is used in a home or
small business? (Choose two.)
• Ethernet switch
• RADIUS authentication server
• repeater
• WLAN controller
• access point
9. Which protocol and port numbers are used by both IPv4 and IPv6 CAPWAP tunnels?
(Choose two.)
• TCP
• ICMP
• UDP
• 17 and 163
• 5246 and 5247
10. If three 802.11b access points need to be deployed in close proximity, which three
frequency channels should be used? (Choose three.)
• 8
• 1
• 3
• 11
• 6
• 5
• satellite
• cellular
• WiMax
• municipal WiFi
12. Which wireless network topology is being configured by a technician who is installing a
keyboard, a mouse, and headphones, each of which uses Bluetooth?
• hotspot
• ad hoc mode
• infrastructure mode
• mixed mode
13. Which type of wireless topology is created when two or more Basic Service Sets are
interconnected by Ethernet?
• BSS
• ESS
• ad hoc WLAN
• IBISS
• WiFi Direct
14. What Wi-Fi management frame is regularly broadcast by APs to announce their
presence?
• association
• beacon
• probe
• authentication
• Authentication
• Beacon
• Probe request
• Probe response
16. What type of wireless antenna is best suited for providing coverage in large open
spaces, such as hallways or large conference rooms?
• Directional
• Omnidirectional
• Parabolic dish
• Yagi
17. Which wireless security method requires clients to manually identify the SSID to
connect to the WLAN?
18. What are the two methods that a wireless client can use to discover an AP? (Choose
two.)
• Ad hoc
• Hotspot
• Infrastructure
• Mixed mode
20. What IEEE 802.11 wireless standards operate only in the 2.4 GHz range? (Choose two.)
• 802.11a
• 802.11b
• 802.11g
• 802.11n
• 802.11ac
• 802.11ad
21. Which IEEE wireless standard is backward compatible with older wireless protocols
and supports data rates up to 1.3 Gb/s?
• 802.11
• 802.11a
• 802.11ac
• 802.11g
• 802.11n
22. In a 2.4 GHz wireless network, which three channels should be used to avoid
interference from nearby wireless devices? (Choose three.)
• 0
• 1
• 3
• 6
• 9
• 11
• 14
23. Which authentication method is more secure but requires the services of a RADIUS
server?
• WEP Enterprise
• WPA Personal
• WPA Enterprise
• WPA2 Personal
24. Which option correctly describes when an AP openly advertises its service by
periodically sending broadcast beacon frames containing the SSID, supported standards,
and security settings?
• Active mode
• Mixed mode
• Open authentication mode
• Passive mode
• forwarding
• blocking
• listening
• learning
2. After the election of the root bridge has been completed, how will switches find the best
paths to the root bridge?
• Each switch will analyze the port states of all neighbors and use the designated ports to
forward traffic to the root.
• Each switch will analyze the sum of all port costs to reach the root and use the path with
the lowest cost.
• Each switch will analyze the sum of the hops to reach the root and use the path with the
fewest hops.
• Each switch will analyze the BID of all neighbors to reach the root and use the path
through the lowest BID neighbors.
• MST
• PVST+
• Rapid PVST+
• MSTP
• RSTP
4. What value determines the root bridge when all switches connected by trunk links have
default STP configurations?
• VLAN ID
• MAC address
• extended system ID
• bridge priority
5. During the implementation of Spanning Tree Protocol, all switches are rebooted by the
network administrator. What is the first step of the spanning-tree election process?
• All the switches send out BPDUs advertising themselves as the root bridge.
• Each switch determines the best path to forward traffic.
• Each switch determines what port to block to prevent a loop from occurring.
• Each switch with a lower root ID than its neighbor will not send BPDUs.
6. Which two concepts relate to a switch port that is intended to have only end devices
attached and intended never to be used to connect to another switch? (Choose two.)
• bridge ID
• PortFast
• edge port
• extended system ID
• PVST+
7. Which three port states are used by Rapid PVST+? (Choose three.)
• listening
• blocking
• trunking
• learning
• forwarding
• discarding
8. When PVST is running over a switched network, which port state can participate in
BPDU frame forwarding based on BPDUs received, but does not forward data frames?
• disabled
• forwarding
• listening
• blocking
9. Which STP port role is adopted by a switch port if there is no other port with a lower
cost to the root bridge?
• designated port
• alternate
• disabled port
• root port
10. Which two statements describe a switch port that is configured with PortFast? (Choose
two.)
• The switch port immediately transitions from the listening to the forwarding state.
• The switch port immediately transitions from blocking to the forwarding state.
• The switch port sends DHCP requests before transitioning to the forwarding state.
• The switch port immediately processes any BPDUs before transitioning to the forwarding
state.
• The switch port should never receive BPDUs.
12. What additional information is contained in the 12-bit extended system ID of a BPDU?
• port ID
• MAC address
• IP address
• VLAN ID
• show spanning-tree
• show running-config
• show vlan
• show startup-config
• designing a network to use multiple virtual devices to ensure that all traffic uses the best
path through the internetwork
• configuring a router with a complete MAC address database to ensure that all frames can
be forwarded to the correct destination
• designing a network to use multiple paths between switches to ensure there is no single
point of failure
• configuring a switch with proper security to ensure that all traffic forwarded through an
interface is filtered
15. Which three components are combined to form a bridge ID? (Choose three.)
• Bridge priority
• Cost
• Extended system ID
• IP address
• MAC address
• Port ID
• PVST+ optimizes performance on the network through automatic selection of the root
bridge.
• PVST+ optimizes performance on the network through load sharing using multiple root
bridges.
• PVST+ reduces bandwidth consumption compared to traditional implementations of STP
that use CST.
• PVST+ requires fewer CPU cycles for all the switches in the network.
17. In which two port states does a switch learn MAC addresses and process BPDUs in a
PVST network? (Choose two.)
• Blocking
• Disabled
• Forwarding
• Learning
• Listening
18. What two features does Spanning Tree Protocol (STP) provide to ensure proper
network operations? (Choose two.)
• Implementing VLANs to contain broadcasts
• Link-state dynamic routing that provides redundant routes
• Redundant links between Layer 2 switches
• Removing single points of failure with multiple Layer 2 switches
• Static default routes
19. Which PVST+ feature ensures that configured switch edge ports do not cause Layer 2
loops if a port is mistakenly connected to another switch?
• BPDU guard
• Extended system ID
• PortFast
• PVST+
• It combines multiple switch trunk links into a logical port channel link to increase
bandwidth.
• It decreases the size of the failure domain.
• It provides firewall services to protect the LAN.
• It temporarily disables redundant paths to stop Layer 2 loops.
21. Which two statements regarding a PortFast enabled switch port are true? (Choose
two.)