Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions -Module 3

Posted on August 21, 2009. Filed under: CCNA, Cisco ICND1 Exam Modules, Practice Exam | Tags: , , , |


Exam Source

Legend
answer   Correct answer
  Your answer, Correct.
  Your answer, Incorrect.
 
1. What is the most tangible benefit of wireless implementations?
cost reduction          
  increased mobility          
  better productivity          
  improved security          
2. What method does a WLAN use to control transmissions?
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)          
  CSMA/CD (Carrier Sense Multiple Access with Collision Detection)          
  CSMA/CR (Carrier Sense Multiple Access with Collision Rejection)          
  CSMA/CW (Carrier Sense Multiple Access with Collision Weighting)          
3a. Occurs when radio frequency (RF) waves bounce off metal or glass surfaces.
  Absorption          
Reflection          
  Scattering          
3b. Occurs when RF waves are soaked up by walls.
Absorption          
  Reflection          
  Scattering          
3c. Occurs when RF waves strike an uneven surface and are reflected in many directions.
  Absorption          
  Reflection          
Scattering          
4. Which regulatory agency controls the 801.11 standard that governs WLANs?
  Wi-Fi Alliance          
IEEE          
  EMA          
  WISC          
5. Which organization offers certification for interoperability between vendors of 802.11 products?
Wi-Fi          
  IEEE          
  EMA          
  WISC          
6. Which three are the unlicensed bands used by WLANs? (Choose Three)
  2.4-MHz band          
900-MHz band          
2.4-GHz band          
5-GHz band          
  900-GHz band          
7. Which two of the 802.11 standards has the highest possible data rates? (Choose two)
  802.11          
  802.11a          
  802.11b          
  802.11d          
802.11g          
8. Which 802.11 standard transmits using the 5-Ghz band?
  802.11          
802.11a          
  802.11b          
  802.11d          
  802.11g          
9. Which is true as related to the Wi-Fi Alliance organization?
  It is a global standards organization that controls the compatibility of Wi-Fi products          
  It operates only in the United States of America and ensures the compatibility of Wi-Fi products          
It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LANs          
  It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations          
10. What is a rogue AP?
  An AP that has an open WEP key          
  An AP that is broadcasting its SSID          
An unsecured AP that has been placed on a WLAN          
  An AP that has had a hardware failure that causes it to endlessly broadcast its SSID          
11. Which three are the steps to secure a WLAN? (Choose Three)
Encryption for providing privacy and confidentiality          
Authentication to ensure that legitimate clients and users access the network via trusted access points          
  Controls transmit power to limit the AP access range to the property boundaries of the parent organization          
Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs          
12. Which standard provides the strongest level of WLAN security?
  EAP          
  WEP          
  WPA          
802.11i/WPA2          
13. What factor determines which AP a client will associate with?
  the AP with the lowest SSID          
  the AP with the highest SSID          
  the AP whose SSID is received first          
the AP that is received with the strongest signal          
14. When using 802.11X, how is the client authenticated?
  The client is authenticated against a local database stored on the AP          
  The access point forwards all network traffic to the server where it is either authenticated or blocked          
  The access point encapsulates any 802.1X traffic bound for the authentication server and sends it to the server          
The client encapsulates the 802.1X authentication traffic before sending it to the AP. This causes the AP to forward it to the server          
15. Which is true when comparing WPA and WPA2?
  WPA uses pre-shared keys while WPA 2 uses PSK          
  WPA uses EAP authentication while WPA 2 uses 802.11X          
  WPA uses a personal mode while WPA 2 uses an enterprise mode          
WPA uses TKIP/MIC encryption while WPA 2 uses AES-CCMP encryption          
16a. Mobile clients connect directly without an intermediate access point
Ad hoc mode          
  Basic Service Set (BSS)          
  Extended Services Set (ESS)          
16b. The communication devices use a single access point for connectivity to each other or to wired network resources
  Ad hoc mode          
Basic Service Set (BSS)          
  Extended Services Set (ESS)          
16c.The wireless topology is two or more service sets connected by a distribution system (DS) or commonly a wired infrastructure.
  Ad hoc mode          
  Basic Service Set (BSS)          
Extended Services Set (ESS)          
17. What does the physical area of radio frequency coverage provided by an access point define?
  the RF service area          
the basic service area          
  the ad hoc service area          
  the extended services area          
18. When implementing extended service areas, how much overlap is suggested?
  5 to 10 percent          
10 to 15 percent          
  15 to 20 percent          
  25 to 30 percent          
19. What technique allows a client to communicate while moving?
the ability to shift data rates          
  the ability to vary transmit levels          
  the ability to match the transmit level to the receive level          
  the ability to perform error correction as the signal level changes          
20. Which three are basic wireless access point parameters? (Choose Three)
SSID          
authentication          
  data exchange rates          
  Transmit band selection          
RF channel with optional power          
21. When implementing a WLAN, when should you use WEP?
  Only if there is an AAA server available          
  When you need the increased security of WEP          
  When you are planning to enable 802.11x authentication          
Only if the hardware equipment does not support WPA          
22a. full feature supplicant for both wired and wireless client
  WZC          
  Cisco Compatible Extension          
Cisco Secure Services Client          
22b. Windows operating systems basic wireless supplicant client
WZC          
  Cisco Compatible Extension          
  Cisco Secure Services Client          
22c. more advance wireless client features than those of native operating system
  WZC          
Cisco Compatible Extension          
  Cisco Secure Services Client          
15423 participants so far
Number answered correctly: 26 out of 28
Advertisements

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

One Response to “Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions -Module 3”

RSS Feed for IT Certifications Comments RSS Feed

[…] https://kl2217.wordpress.com/2009/08/21/answers-for-interconnecting-cisco-networking-devices-icnd-pr… xxxxx Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions -Module 3 […]


Where's The Comment Form?

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: