Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability of 802.11 products?
FCC
IEEE
ITU-R
Wi-Fi Alliance
Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)
repeater
access point
WLAN controller
Ethernet switch
RADIUS authentication server
What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?
omnidirectional
directional
Yagi
dish
Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?
SPS
WPS
MIMO
MITM
What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate in a corporate environment?
Autonomous APs are used only in the home environment, and they incorporate the functions of a router, switch, and AP into one device.
Controller-based APs are used in the corporate environment, and they are server-dependent devices that require an initial configuration to operate.
Cisco corporate APs do not support PoE.
Some corporate AP models can operate in either autonomous mode or controller-based mode.
Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?
IBISS
BSS
WiFi Direct
ESS
ad hoc WLAN
Which type of management frame may regularly be broadcast by an AP?
beacon
probe request
authentication
probe response
Which statement defines the control frame operation between two stations?
A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.
A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.
If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection.
After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.
A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?
beacon frame
control frame
data frame
management frame
A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?
beacon frame
control frame
data frame
management frame
During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP?
discovery
probing
association
encryption
authentication
For which discovery mode will an AP generate the most traffic on a WLAN?
passive mode
open mode
mixed mode
active mode
What is an advantage of SSID cloaking?
It provides free Internet access in public locations where knowing the SSID is of no concern.
Clients will have to manually identify the SSID to connect to the network.
SSIDs are very difficult to discover because APs do not broadcast them.
It is the best way to secure a wireless network.
If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)
1
3
5
6
8
11
Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)
802.11a
802.11b
802.11g
802.11n
802.11ac
Which security mode is the least secure choice when a home wireless router is configured?
WPA
WPA2
WEP
WPA2-Personal
A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this?
Upgrade the firmware on the AP.
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Deploy a Wi-Fi Range Extender.
Change to WPA2 authentication.
A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?
Replace the wireless NICs on the computers that are experiencing slow connections.
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
Disable DHCP on the access point and assign static addresses to the wireless clients.
Upgrade the firmware on the wireless access point.
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
cracking
denial of service
rogue access point
spoofing
Fill in the blank. Do not use abbreviations.
Ad hoc wireless topologies sometimes can use a feature called tethering to enable a smartphone to create a personal hotspot.
Match the type of attack to its description. (Not all options are used.)
CCNA 3 Chapter 4 Exam Answer 001
Place the following actions in the order in which they occur in a shared key authentication process. (Not all options are used.)
CCNA 3 Chapter 4 Exam Answer 002
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What is the SSID of the connected network and which message is displayed in the browser window?
SSID: Home-Net Message:Congratulations! You were able to connect it!
SSID: Home-Network Message: Good job!
SSID: Home-Network Message: Well done!
SSID: Home-Net Message:Congratulations! You did it!