1. Which of the following modulation techniques rapidly switches a signal among frequency channels? DSSS FHSS OFDM OFDMA 2. Which of the following modulation techniques spreads a signal over a larger frequency band? DSSS FHSS OFDM OFDMA 3. Which of the following modulation techniques is used in the …
1. What IP versions does CAPWAP support? IPv4 only IPv6 only IPv4 by default, but can configure IPv6 IPv6 by default, but can configure IPv4 2. What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.) 17 136 5246 5247 802.11 3. What UDP …
1. Which wireless topology mode is used by two devices to connect in a peer-to-peer network? Ad hoc Infrastructure Tethering 2. True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients. True False 3. How many address fields …
1. True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection. True False 2. Which of the following components are integrated in a wireless home router? (Choose three.) Access point Switch Router Range extender 3. …
1. Which of the following wireless networks typically uses lower powered transmitters for short ranges? WPAN WLAN WMAN WWAN 2. Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies? WPAN WLAN WMAN WWAN 3. Which …
1. A threat actor changes the MAC address of the threat actor’s device to the MAC address of the default gateway. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping 2. A threat actor sends a BPDU message with …
1. What is the behavior of a switch as a result of a successful MAC address table attack? The switch will shut down. The switch interfaces will transition to the error-disabled state. The switch will forward all received frames to all other ports within the VLAN. The switch …
1. Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.) DHCP snooping VPN Firewalls IPSG IPS devices 2. Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP …
1. Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes? Authentication Authorization Accounting 2. Which AAA component is responsible for controlling who is permitted to access the network? Authentication Authorization Accounting 3. Which AAA component is responsible for determining what the …
1. Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim? DDoS Data breach Malware Ransomware 2. Which devices are specifically designed for network security? (Choose three) VPN-enabled router NGFW Switch WLC NAC 3. Which device monitors SMTP traffic to …