Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

12.8.

2 Module Quiz – WLAN Concepts


(Answers) (CHAPTER 4)
12.8.2 Module Quiz – WLAN Concepts Answers

1. In the context of mobile devices, what does the term tethering involve?

• connecting a mobile device to a USB port on a computer in order to charge the mobile
device
• connecting a mobile device to another mobile device or computer to share a network
connection
• connecting a mobile device to a 4G cellular network
• connecting a mobile device to a hands-free headset

2. Which feature of 802.11n wireless access points allows them to transmit data at faster
speeds than previous versions of 802.11 Wi-Fi standards did?

• SPS
• WPS
• MITM
• MIMO

3. Which method of wireless authentication is currently considered to be the strongest?

• open
• WPA
• WPA2
• WEP
• shared key

4. Which parameter is commonly used to identify a wireless network name when a home
wireless AP is being configured?

• SSID
• BESS
• ad hoc
• ESS

5. Which characteristic describes a wireless client operating in active mode?

• ability to dynamically change channels


• must be configured for security before attaching to an AP
• must know the SSID to connect to an AP
• broadcasts probes that request the SSID

6. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz
ranges?

• 802.11a
• 802.11g
• 802.11b
• 802.11n

7. Which statement describes an autonomous access point?

• It is a standalone access point.


• It is managed by a WLAN controller.
• It is server-dependent.
• It is used for networks that require a large number of access points.

8. Which two roles are typically performed by a wireless router that is used in a home or
small business? (Choose two.)

• Ethernet switch
• RADIUS authentication server
• repeater
• WLAN controller
• access point

9. Which protocol and port numbers are used by both IPv4 and IPv6 CAPWAP tunnels?
(Choose two.)

• TCP
• ICMP
• UDP
• 17 and 163
• 5246 and 5247

10. If three 802.11b access points need to be deployed in close proximity, which three
frequency channels should be used? (Choose three.)

• 8
• 1
• 3
• 11
• 6
• 5

11. Which type of telecommunication technology is used to provide Internet access to


vessels at sea?

• satellite
• cellular
• WiMax
• municipal WiFi

12. Which wireless network topology is being configured by a technician who is installing a
keyboard, a mouse, and headphones, each of which uses Bluetooth?

• hotspot
• ad hoc mode
• infrastructure mode
• mixed mode

13. Which type of wireless topology is created when two or more Basic Service Sets are
interconnected by Ethernet?

• BSS
• ESS
• ad hoc WLAN
• IBISS
• WiFi Direct

14. What Wi-Fi management frame is regularly broadcast by APs to announce their
presence?

• association
• beacon
• probe
• authentication

15. An AP regularly broadcasts which type of management frame?

• Authentication
• Beacon
• Probe request
• Probe response

16. What type of wireless antenna is best suited for providing coverage in large open
spaces, such as hallways or large conference rooms?

• Directional
• Omnidirectional
• Parabolic dish
• Yagi

17. Which wireless security method requires clients to manually identify the SSID to
connect to the WLAN?

• MAC Address Filtering


• IP Address Filtering
• SSID cloaking
• SSID disclosing

18. What are the two methods that a wireless client can use to discover an AP? (Choose
two.)

• Delivering a broadcast frame


• Initiating a three-way handshake
• Receiving a broadcast beacon frame probe response
• Sending an ARP request
• Transmitting a probe request
19. What type of wireless network topology would be used in a medium to large
organization?

• Ad hoc
• Hotspot
• Infrastructure
• Mixed mode

20. What IEEE 802.11 wireless standards operate only in the 2.4 GHz range? (Choose two.)

• 802.11a
• 802.11b
• 802.11g
• 802.11n
• 802.11ac
• 802.11ad

21. Which IEEE wireless standard is backward compatible with older wireless protocols
and supports data rates up to 1.3 Gb/s?

• 802.11
• 802.11a
• 802.11ac
• 802.11g
• 802.11n

22. In a 2.4 GHz wireless network, which three channels should be used to avoid
interference from nearby wireless devices? (Choose three.)

• 0
• 1
• 3
• 6
• 9
• 11
• 14

23. Which authentication method is more secure but requires the services of a RADIUS
server?

• WEP Enterprise
• WPA Personal
• WPA Enterprise
• WPA2 Personal

24. Which option correctly describes when an AP openly advertises its service by
periodically sending broadcast beacon frames containing the SSID, supported standards,
and security settings?

• Active mode
• Mixed mode
• Open authentication mode
• Passive mode

5.4.2 Module Quiz – STP (Answers)


1. Which port state will switch ports immediately transition to when configured for
PortFast?

• forwarding
• blocking
• listening
• learning

2. After the election of the root bridge has been completed, how will switches find the best
paths to the root bridge?

• Each switch will analyze the port states of all neighbors and use the designated ports to
forward traffic to the root.
• Each switch will analyze the sum of all port costs to reach the root and use the path with
the lowest cost.
• Each switch will analyze the sum of the hops to reach the root and use the path with the
fewest hops.
• Each switch will analyze the BID of all neighbors to reach the root and use the path
through the lowest BID neighbors.

3. Which is the default STP operation mode on Cisco Catalyst switches?

• MST
• PVST+
• Rapid PVST+
• MSTP
• RSTP

4. What value determines the root bridge when all switches connected by trunk links have
default STP configurations?

• VLAN ID
• MAC address
• extended system ID
• bridge priority

5. During the implementation of Spanning Tree Protocol, all switches are rebooted by the
network administrator. What is the first step of the spanning-tree election process?

• All the switches send out BPDUs advertising themselves as the root bridge.
• Each switch determines the best path to forward traffic.
• Each switch determines what port to block to prevent a loop from occurring.
• Each switch with a lower root ID than its neighbor will not send BPDUs.

6. Which two concepts relate to a switch port that is intended to have only end devices
attached and intended never to be used to connect to another switch? (Choose two.)
• bridge ID
• PortFast
• edge port
• extended system ID
• PVST+

7. Which three port states are used by Rapid PVST+? (Choose three.)

• listening
• blocking
• trunking
• learning
• forwarding
• discarding

8. When PVST is running over a switched network, which port state can participate in
BPDU frame forwarding based on BPDUs received, but does not forward data frames?

• disabled
• forwarding
• listening
• blocking

9. Which STP port role is adopted by a switch port if there is no other port with a lower
cost to the root bridge?

• designated port
• alternate
• disabled port
• root port

10. Which two statements describe a switch port that is configured with PortFast? (Choose
two.)

• The switch port immediately transitions from the listening to the forwarding state.
• The switch port immediately transitions from blocking to the forwarding state.
• The switch port sends DHCP requests before transitioning to the forwarding state.
• The switch port immediately processes any BPDUs before transitioning to the forwarding
state.
• The switch port should never receive BPDUs.

11. What is one way to correct a spanning tree failure?

• Replace the cables on failed STP links.


• Manually remove redundant links in the switched network.
• Insert redundant links to replace the failed STP links.
• Replace all instances of STP with RSTP.

12. What additional information is contained in the 12-bit extended system ID of a BPDU?

• port ID
• MAC address
• IP address
• VLAN ID

13. An administrator is troubleshooting a switch and wants to verify if it is a root bridge.


What command can be used to do this?

• show spanning-tree
• show running-config
• show vlan
• show startup-config

14. What is an accurate description of redundancy?

• designing a network to use multiple virtual devices to ensure that all traffic uses the best
path through the internetwork
• configuring a router with a complete MAC address database to ensure that all frames can
be forwarded to the correct destination
• designing a network to use multiple paths between switches to ensure there is no single
point of failure
• configuring a switch with proper security to ensure that all traffic forwarded through an
interface is filtered

15. Which three components are combined to form a bridge ID? (Choose three.)

• Bridge priority
• Cost
• Extended system ID
• IP address
• MAC address
• Port ID

16. What is an advantage of PVST+?

• PVST+ optimizes performance on the network through automatic selection of the root
bridge.
• PVST+ optimizes performance on the network through load sharing using multiple root
bridges.
• PVST+ reduces bandwidth consumption compared to traditional implementations of STP
that use CST.
• PVST+ requires fewer CPU cycles for all the switches in the network.

17. In which two port states does a switch learn MAC addresses and process BPDUs in a
PVST network? (Choose two.)

• Blocking
• Disabled
• Forwarding
• Learning
• Listening

18. What two features does Spanning Tree Protocol (STP) provide to ensure proper
network operations? (Choose two.)
• Implementing VLANs to contain broadcasts
• Link-state dynamic routing that provides redundant routes
• Redundant links between Layer 2 switches
• Removing single points of failure with multiple Layer 2 switches
• Static default routes

19. Which PVST+ feature ensures that configured switch edge ports do not cause Layer 2
loops if a port is mistakenly connected to another switch?

• BPDU guard
• Extended system ID
• PortFast
• PVST+

20. What is an advantage of using STP in a LAN?

• It combines multiple switch trunk links into a logical port channel link to increase
bandwidth.
• It decreases the size of the failure domain.
• It provides firewall services to protect the LAN.
• It temporarily disables redundant paths to stop Layer 2 loops.

21. Which two statements regarding a PortFast enabled switch port are true? (Choose
two.)

• The port immediately transitions from blocking to forwarding state.


• The port immediately transitions from listening to forwarding state.
• The port immediately processes any BPDUs before transitioning to the forwarding state.
• The port sends DHCP requests before transitioning to the forwarding state.
• The port should never receive BPDUs.

You might also like