Category: CCNA v7.0
1. Which of the following is most likely NOT the source of a wireless DoS attack? Radio interference Improperly configured devices Rogue AP Malicious user 2. True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks. True …
12.5.4 Check Your Understanding – Channel Management Answers
1. Which of the following modulation techniques rapidly switches a signal among frequency channels? DSSS FHSS OFDM OFDMA 2. Which of the following modulation techniques spreads a signal over a larger frequency band? DSSS FHSS OFDM OFDMA 3. Which of the following modulation techniques is used in the …
12.4.6 Check Your Understanding – CAPWAP Operation Answers
1. What IP versions does CAPWAP support? IPv4 only IPv6 only IPv4 by default, but can configure IPv6 IPv6 by default, but can configure IPv4 2. What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.) 17 136 5246 5247 802.11 3. What UDP …
12.3.8 Check Your Understanding – WLAN Operation Answers
1. Which wireless topology mode is used by two devices to connect in a peer-to-peer network? Ad hoc Infrastructure Tethering 2. True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients. True False 3. How many address fields …
12.2.7 Check Your Understanding – WLAN Components Answers
1. True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection. True False 2. Which of the following components are integrated in a wireless home router? (Choose three.) Access point Switch Router Range extender 3. …
12.1.7 Check Your Understanding – Introduction to Wireless Answers
1. Which of the following wireless networks typically uses lower powered transmitters for short ranges? WPAN WLAN WMAN WWAN 2. Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies? WPAN WLAN WMAN WWAN 3. Which …
10.5.11 Check Your Understanding – LAN Attacks Answers
1. A threat actor changes the MAC address of the threat actor’s device to the MAC address of the default gateway. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping 2. A threat actor sends a BPDU message with …
10.4.4 Check Your Understanding – MAC Address Table Attacks Answers
1. What is the behavior of a switch as a result of a successful MAC address table attack? The switch will shut down. The switch interfaces will transition to the error-disabled state. The switch will forward all received frames to all other ports within the VLAN. The switch …
10.3.4 Check Your Understanding – Layer 2 Security Threats Answers
1. Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.) DHCP snooping VPN Firewalls IPSG IPS devices 2. Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP …
10.2.7 Check Your Understanding – Access Control Answers
1. Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes? Authentication Authorization Accounting 2. Which AAA component is responsible for controlling who is permitted to access the network? Authentication Authorization Accounting 3. Which AAA component is responsible for determining what the …