14 Replies Latest reply: Aug 9, 2011 7:57 PM by Keneil Facey RSS

    CCNA Switching & Wireless (few questions)

    Efx

      Hello Guys! Can you share your ideas how  to solve these problems? How to choose best answers from these?

       

       

      1. What is one disadvantage that 802.11a wireless has compared to 802.11g?

      a)      Use of the 5GHz band requires much larger antennas.

      b)      The OFDM modulation technique results in a slower data rate.

      c)      There are fewer non-overlapping channels available to help reduce RF interference.

      d)      The use of higher frequencies means that signals are more likely to be obstructed.

       

      2. Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?

      stp.jpg

      a)      It is sending and receiving data frames.

      b)      It is receiving BPDUs, but not sending data frames.

      c)      It is participating in the election process by forwarding the BPDUs it receives.

      d)      It is receiving BPDUs and populating the MAC address table, but not sending data.

       

      3. Which security protocol or measure would provide the greatest protection for a wireless LAN?

      a)      WPA2

      b)      cloaking SSIDs

      c)      shared WEP key

      d)      MAC address filtering

       

      4.Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. The network technician accidentally configured the VTP server as a VTP client. After the technician reloaded the switches, all users in the VTP domain started to complain that they lost connectivity to the users on the same VLANs that are connected to other switches. What should be done in the future to prevent losing all VLAN configurations in a VTP domain?

            vtp.jpg

      a)      Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.

      b)      Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.

      c)      Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.

      d)      In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.