![14.2.4 Check Your Understanding - Packet Forwarding Answers 1 14.2.4 Check Your Understanding – Packet Forwarding Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
Category: CCNA v7.0
![14.2.4 Check Your Understanding - Packet Forwarding Answers 1 14.2.4 Check Your Understanding – Packet Forwarding Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
1. If a router needs to send an ARP Request for the destination IPv4 address of the packet, this means the packet will be forwarded: To a next-hop router To the device with the destination IPv4 address of the packet 2. If a router needs to send an …
![14.1.7 Check Your Understanding - Path Determination Answers 2 14.1.7 Check Your Understanding – Path Determination Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
14.1.7 Check Your Understanding – Path Determination Answers
1. What table does a router use to determine how to forward an IP packet? ARP table MAC address table neighbor cache routing table 2. What action will a router take on a packet with a destination IP address that is on a remote network? It will forward …
![12.7.9 Check Your Understanding - Secure WLANs Answers 3 12.7.9 Check Your Understanding – Secure WLANs Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.7.9 Check Your Understanding – Secure WLANs Answers
1. What are the best ways to secure WLANs? (Choose two.) Authentication SSID cloaking Encryption MAC address filtering 2. Which of the following authentication methods does not use a password shared between the wireless client and the AP? WEP WPA WPA2 WPA3 Open 3. Which encryption method is …
![12.6.6 Check Your Understanding - WLAN Threats Answers 4 12.6.6 Check Your Understanding – WLAN Threats Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.6.6 Check Your Understanding – WLAN Threats Answers
1. Which of the following is most likely NOT the source of a wireless DoS attack? Radio interference Improperly configured devices Rogue AP Malicious user 2. True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks. True …
![12.5.4 Check Your Understanding - Channel Management Answers 5 12.5.4 Check Your Understanding – Channel Management Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.5.4 Check Your Understanding – Channel Management Answers
1. Which of the following modulation techniques rapidly switches a signal among frequency channels? DSSS FHSS OFDM OFDMA 2. Which of the following modulation techniques spreads a signal over a larger frequency band? DSSS FHSS OFDM OFDMA 3. Which of the following modulation techniques is used in the …
![12.4.6 Check Your Understanding - CAPWAP Operation Answers 6 12.4.6 Check Your Understanding – CAPWAP Operation Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.4.6 Check Your Understanding – CAPWAP Operation Answers
1. What IP versions does CAPWAP support? IPv4 only IPv6 only IPv4 by default, but can configure IPv6 IPv6 by default, but can configure IPv4 2. What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.) 17 136 5246 5247 802.11 3. What UDP …
![12.3.8 Check Your Understanding - WLAN Operation Answers 7 12.3.8 Check Your Understanding – WLAN Operation Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.3.8 Check Your Understanding – WLAN Operation Answers
1. Which wireless topology mode is used by two devices to connect in a peer-to-peer network? Ad hoc Infrastructure Tethering 2. True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients. True False 3. How many address fields …
![12.2.7 Check Your Understanding - WLAN Components Answers 8 12.2.7 Check Your Understanding – WLAN Components Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.2.7 Check Your Understanding – WLAN Components Answers
1. True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection. True False 2. Which of the following components are integrated in a wireless home router? (Choose three.) Access point Switch Router Range extender 3. …
![12.1.7 Check Your Understanding - Introduction to Wireless Answers 9 12.1.7 Check Your Understanding – Introduction to Wireless Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
12.1.7 Check Your Understanding – Introduction to Wireless Answers
1. Which of the following wireless networks typically uses lower powered transmitters for short ranges? WPAN WLAN WMAN WWAN 2. Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies? WPAN WLAN WMAN WWAN 3. Which …
![10.5.11 Check Your Understanding - LAN Attacks Answers 10 10.5.11 Check Your Understanding – LAN Attacks Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
10.5.11 Check Your Understanding – LAN Attacks Answers
1. A threat actor changes the MAC address of the threat actor’s device to the MAC address of the default gateway. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping 2. A threat actor sends a BPDU message with …