Section 6 – Mix Practice Questions
QUESTION NO: 101
Refer to the exhibit. Three different wireless groups of users are allowed to gain access to the wireless LAN. What type of security policy should be enforced for the users in the Guest group?
A. static WEP and MAC authentication
B. LEAP authentication
C. primary SSID with open or no WEP authentication
D. open authentication with WEP plus MAC authentication
Answer: C
QUESTION NO: 102
Exhibit: You work as a network technician at Pass4sure.com. Study the exhibit carefully. You are required configure the static WEP keys on the wireless client adapter using the Cisco ADU (Aironet Desktop Utility). What should you have in mind when doing this?
A. Before the client adapter WEP key is generated, all wireless infrastructure devices (such as access points, servers, etc.) must be properly configured for LEAP authentication.
B. The client adapter WEP key should be generated by the AP and forwarded to the client adapter efore the client adapter can establish communication with the wireless network.
C. In infrastructure mode the client adapter WEP key must match the WEP key used by the access point. In ad hoc mode all client WEP keys within the wireless network must match each other.
D. The client adapter WEP key should be generated by the authentication server and forwarded to the client adapter before the client adapter can establish communication with the wireless network.
E. None of the other alternatives apply
Answer: C
QUESTION NO: 103
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?
A. The command will be rejected by the switch.
B. Interfaces FastEthernet0/13 and FastEthernet0/14 will no longer be bundled.
C. Dynamic Trunking Protocol will be turned off on interfaces FastEthernet0/13 and FastEthernet0/14.
D. Interfaces FastEthernet0/13 and FastEthernet0/14 will only allow traffic from the native VLAN.
E. Interfaces FastEthernet0/13 and FastEthernet0/14 will continue to pass traffic for VLANs 88,100,360.
Answer: B
QUESTION NO: 104
During testing of network redundancy in a fully meshed enterprise campus, a problem has been reported. Both distribution multilayer switches are fully configured for redundancy; clients operate normally when the primary multilayer distribution switch is operating. All clients drop connections outside of their respective access layer group when the primary distribution switch is shut down and the secondary distribution switch is still operational. Additional information indicates that the secondary distribution switch is able to ping major corporate and Internet locations. Which item would be the best point of troubleshooting for this connectivity issue?
A. client network configuration
B. VLAN mapping
C. inter-switch trunk configuration
D. UDLD configuration
E. first-hop redundancy protocol
Answer: E
QUESTION NO: 105
With Cisco Express Forwarding, prefixes that require exception processing can be cached with one of which four special adjacencies. (Choose four.)
A. forward
B. null
C. glean
D. kick
E. discard
F. drop
Answer: BCEF