Professional Documents
Culture Documents
At which layer of the hierarchical network design would you find switches that
use access control lists to implement security?
• Core
• Distribution
• Access
• All 3 layers
At which layer of the hierarchical network design would you find switches that
use port-based security to control which devices connect to the network?
• Core
• Distribution
• Access
• All 3 layers
At which layer of the hierarchical network design would you find switches that
do not implement security measures, but switch packets as fast as possible?
• Core
• Distribution
• Access
• All 3 layers
• Core
• Distribution
• Access
• All 3 layers
• Core
• Distribution
• Access
• All 3 layers
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 1
At which layer of the hierarchical network design is it least important to have a
switch whose forwarding rate equals the combined wire speed of all the
ports?
• Core
• Distribution
• Access
• All 3 layers
• Core
• Distribution
• Access
• All 3 layers
At which layer of the hierarchical network design are you least likely to find
redundancy?
• Core
• Distribution
• Access
• All 3 layers
• Core
• Distribution
• Access
At which layer of the hierarchical network design are you most likely to find
switches that do not have OSI layer 3 features?
• Core
• Distribution
• Access
• Efficiency
• Availability
• Scalability
• Cost
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 2
What is link aggregation?
• Load balancing across different routes that have the same number of
hops
• Two or more links acting as a single virtual link with the combined
bandwidth
• Sending alternate packets on different links
• Using a single physical interface with subinterfaces to connect to
different devices
• Vertical cabling
• Horizontal cabling
• High-speed backbone
• WAN link
• Port security
• Quality of service
• Link aggregation
• Modularity
Which type of switch has a chassis into which line cards can be installed?
• Stackable switch
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 3
• Fixed configuration switch
• Multilayer switch
• Modular switch
• Multilayer capabilities
• High port density
• High latency
• Ability to route between VLANs
The Catalyst Express 500 switch is the cheapest switch in the Catalyst range.
This is a fixed configuration switch with up to 24 10/100 ports and optional
PoE. It offers forwarding rates from 8.8 Gb/s to 24 Gb/s, web-based
management, and converged data/IP communications support. Where would
it best be used?
• Redundancy
• Hot-swappable hardware components
• Modularity
• PoE
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 4
The network manager analyses the use that the HR department makes of the
network: how many workstations they have, what applications they use, which
servers they use, how much bandwidth they use. What type of analysis is
this?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 5
CCNA3 Chapter 2 Practice Test Answers
An Ethernet network is using CSMA/CD and a collision has occurred. Which
host will be the next to transmit data?
Which frames are flooded by a switch through all ports except the incoming
port?
Where does a switch get the data to build up its MAC address table?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 6
How does the default behaviour of a switch differ from the default behaviour of
a router when a broadcast message arrives?
• ARP table
• CAM table
• CAD table
• CDP table
• 2
• 3
• 9
• 10
• 12
• 2
• 3
• 9
• 10
• 12
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 7
Why are routers still required for Ethernet networks in some cases even
though multilayer switches are available that operate at layer 3?
Which is true of port based buffering but not of shared buffering in a switch?
Which mode of switching reads the whole frame and carries out a cyclic
redundancy check?
• Fast forward
• Cut through
• Fragment free
• Store and forward
If you type in a switch command, leave a space and then type ?, what do you
get?
If you have used the up arrow key or Ctrl + P to show several previous
commands from the command history, you can work back and show the later
commands by pressing the down arrow key or:
• Ctrl + N
• Ctrl + C
• Ctrl + D
• Ctrl + V
• Flash
• ROM
• RAM
• NVRAM
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 8
Which command needs to be in a switch configuration in order for an
administrator to use its web based interface?
• www interface
• http server enable
• ip http server
• ip http activate
Which is the correct option for configuring a switch with the address of its local
router so that it can be accessed from a remote network?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 9
You configure both a login banner and a message of the day banner on a
switch. What do you see when you make a console connection to the switch?
• The motd banner, then the login banner, then the prompt for a
password.
• The login banner, then the motd banner, then the prompt for a
password.
• The motd banner, then the prompt for a password, then the login
banner.
• The login banner, then the prompt for a password, then the motd
banner.
A port has been configured to learn a dynamic secure address. How can you
ensure that this address is still known after the switch reboots?
• 1
• 2
• 10
• 1024
Why do you give the command switchport mode access before setting
security on a port?
• The command is needed in order for any device to access the port.
• The default switchport mode is dynamic desirable, which does
not allow security to be configured.
• The default switchport mode is trunk, which does not allow security to
be configured.
• This is another way of giving the no shutdown command.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 10
Which type of switchport security is being configured by the command:
SW1(config-if)#switchport port-security mac-address 000c.7612.3b82
• Static
• Dynamic
• Sticky
• Protect
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 11
CCNA3 Chapter 3 Practice Test Answers
A1
Switch A A2
A3
B1
B2
Switch B B3
C1
C2
Switch C C3
The network shown in the diagram has just been configured and none of the
switches yet has any entries in its bridging table. Workstation A1 sends out a
broadcast ARP request. What will happen? (Choose two)
• All nine workstations will receive the ARP request.
• Only Switch A will receive the ARP request.
• All devices on VLAN 1 will receive the ARP request.
• Workstations connected to Switch A will receive the ARP request.
• Switch A will put the MAC address of workstation A1 into its
bridging table.
• The router will flood the ARP request to all VLANs.
99
255
1024
4096
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 12
A switch is configured with four VLANs. Which is true?
• Each VLAN forms its own broadcast domain.
• Each VLAN is a separate subnet and needs its own subnet address.
• The Switch keeps a separate bridging table for each VLAN.
• All of the above.
VLAN 1
The management VLAN
The native VLAN
The data VLAN
Any VLAN you choose
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 13
• The hub must be configured with the same static VLANs as the Switch.
• The Switch must be configured with sub interfaces if the workstations
are on different VLANs.
• It is not possible for workstations to share a Switch port when VLANs
are used.
1A new switch has the default configuration. Which of the following are true?
(Choose two)
• VLAN 1 exists, and all ethernet ports are assigned to it.
• Each group of eight ports is assigned to a different VLAN.
• An IP address is assigned to VLAN 1.
• There may be default VLANs for different LAN technologies, such
as token Ring and FDDI.
Which statements are true of IEEE 802.1Q frame tagging? (Choose two)
• It is a Cisco proprietary encapsulation protocol.
• It inserts a VLAN identifier and other fields into the frame header.
• It encapsulates the frame with an additional header.
• It is now the preferred method for identifying VLAN traffic
between switches.
• It used to be the most common method for identifying VLAN traffic
between switches, but it is not in common use any more.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 14
Where is frame tagging added to the frame?
• At the source host workstation.
• At the destination host workstation.
• At a switch, before the frame is placed on a trunk connection.
• At a switch, after the frame is received from a trunk connection.
Which commands would you use in order to create a VLAN number 4, called
Marketing?
• Switch# vlan 4
Switch(vlan)#name Marketing
• Switch(config)# vlan 4
Switch(config-vlan)#name Marketing
• Switch(config)#vlan access
Switch(config)#vlan 4 name Marketing
• Switch(vlan)#vlan 4
Switch(vlan)#name Marketing
• Switch(config)#vlan 4 Marketing
Which commands would you use in order to assign the fast ethernet port 0/7
to VLAN 4? (Choose three)
• Switch(vlan)# interface fastethernet 0/7
• Switch(config)#interface fastethernet 0/7
• Switch(config-if)#switchport mode access
• Switch(vlan-if)#switchport access vlan 4
• Switch(config-if)#switchport access vlan 4
• Switch(config-if)#switchport vlan 4
• Switch(config)#interface fastethernet 0/7 vlan 4
• Switch(config-if)#switchport mode access vlan 4
Ports 0/7, 0/8 and 0/9 all belong to VLAN 4. You give the commands
Switch(config)#interface fastethernet 0/9
Switch(config-if)# no switchport access vlan 4
Which of the following statements is true?
• VLAN 4 has been deleted.
• All three ports have been removed from VLAN 4.
• Port 0/9 is now inactive and needs to be assigned to a new VLAN.
• Port 0/9 is reassigned to VLAN 1.
Ports 0/7, 0/8 and 0/9 all belong to VLAN 4. You give the command
Switch(config)# no vlan 4
Which of the following statements are true? (Choose 2)
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 15
• VLAN 4 has been deleted.
• All three ports have been assigned to VLAN 1.
• VLAN 4 still exists but the ports are no longer assigned to it.
• All three ports are inactive and not assigned to any VLAN.
• All three ports will be reassigned to VLAN 1 when the Switch is reset.
Which command would you give to view the contents of the VLAN database?
• Switch#show vlan
• Switch#show vlan database
• Switch#(vlan)show vlan
• Switch#(vlan)show vlan database
• Switch#show database vlan
If you do not specify which VLANs are allowed on a trunk link, what will
happen?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 16
A switch port has been configured as follows:
SW1(config)#int fa 0/12
SW1(config-if)#mls qos trust cos
SW1(config-if)#switchport voice vlan 150
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 5
SW1(config-if)#end
Which is true?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 17
CCNA3 Chapter 4 Practice Test Answers
What is the default Catalyst switch configuration?
Which switches can only use VTP version 1, and not version 2?
If you have a domain of switches that are all capable of using version 2, and
you want them to use version 2, which switches must you configure for
version 2?
• All switches
• All server switches
• Any server switch
• Any switch
You have a group of switches that have never been configured for VTP, and
you want them to act as a VTP domain. What is the best way of ensuring that
they all have the same domain name?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 18
Why should you configure a domain name on a server switch before creating
the VLANs that you want to share with the domain?
All the switches have the same VTP domain name. S1 has been configured
as a server. Which is true?
• All the other switches in the domain must be configured as either client
or transparent.
• S4 should not be transparent as this will cut S5 and S6 off from the rest
of the domain.
• S4, S5 and S6 can form their own domain as well as belonging to the
same domain as S1.
• S5 may be a server switch in the same domain as S1.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 19
Which is true of VTP?
• Summary advertisement
• Request advertisement
• Detail advertisement
• Subset advertisement
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 20
In the diagram, switches S1, S2, S3, S5 and S6 all have switchports on
VLANs 10, 20 and 30. Switch S4 does not use any of these VLANs. Switch
S4 has switchports on VLANs 40 and 50, which are not used elsewhere. How
should S4 be configured?
• Only one.
• It is a good idea to have two, so that there is a back up for the data, but
there cannot be more than two.
• Up to half the switches can be servers.
• At least two, but it is possible for them all to be servers.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 21
VLANs 2,3,4 VLANs 2,3
The switches have ports assigned to the VLANs shown. What is the best way
of restricting VLAN 4 broadcast transmissions in order to cut down
unnecessary traffic?
The switches are not exchanging VLAN information correctly. What is the
likely problem?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 22
CCNA3 Chapter 5 Practice Test Answers
1 Which of the following problems may occur in redundant switched
network topologies? (Choose three)
• Excessive collisions.
• Broadcast storms.
• Multiple frame transmission.
• Fault-tolerance.
• Single point of failure.
• MAC address database instability.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 23
7 What is a feature of a tree topology?
• It has a connection to every node.
• Every link is a point-to-point link.
• It provides fault-tolerance.
• It contains no loops.
11 What will exist when the spanning tree protocol has worked and the
network has converged?
• One root bridge per network, one root port on each bridge, one
designated port on each bridge, all non-designated ports are blocked.
• One root bridge per network, one root port per non root bridge, one
designated port per segment, non-designated ports.
• One root bridge per segment, one root port per non root bridge, one
designated port per segment, non-designated ports.
• One root bridge per network, one root port on each switch, one non-
designated port on each segment, other ports are blocked.
12 What is the default interval in seconds for sending bridge protocol data
units?
• 1
• 2
• 5
• 10
• 30
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 24
13 What states does a port go through from the time when a switch first
start up to the time when the port is fully operational?
• Blocking, listening, learning, forwarding
• Disabled, listening, learning, forwarding
• Listening, learning, blocking, forwarding
• Blocking, learning, listening, forwarding
• Learning, listening, switching, forwarding
14 Which of the following does a port do in the listening state? (Choose all
that apply.)
• Learning MAC addresses.
• Forwarding user data.
• Receiving BPDUs
• Sending BPDUs
15 Which of the following does a port do in the blocking state? (Choose all
that apply.)
• Learning MAC addresses.
• Forwarding user data.
• Receiving BPDUs
• Sending BPDUs
• None of the above
16 Which of the following does a port do in the learning state? (Choose all
that apply.)
• Learning MAC addresses.
• Forwarding user data.
• Receiving BPDUs
• Sending BPDUs
17 Which is the correct order of the stages carried out by the spanning
tree protocol?
• Select a designated port on each segment, select a root bridge, select
a root port on each non-root bridge, block any remaining (non-
designated) ports
• Select a root port on each switch, select a root bridge, select a
designated port on each segment, block any remaining (non-
designated) ports.
• Select a root bridge, select a designated port on each segment, select
a root port on each non-root bridge, block any remaining (non-
designated) ports
• Select a root bridge, select a root port on each non-root bridge, select
a designated port on each segment, block any remaining (non-
designated) ports.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 25
18 How long can it take for a network using spanning tree topology to
converge again after a topology change?
• up to 2 seconds
• up to 10 seconds
• up to 20 seconds
• up to 30 seconds
• up to 50 seconds
• up to 60 seconds
19 What will happen to user data frames while the network is converging?
• They will be discarded.
• They will be forwarded.
• They will be stored until the network has converged.
• They will collide.
21 In rapid spanning tree protocol, which link types allow ports to move
immediately to forwarding mode?
• Point-to-point
• End to end
• Shared
• Multiple
• Edge type
• Mixed
22 It can take 20 seconds for a port to move from the blocking to the
listening state. What timer controls this interval?
• Blocking timer
• Listening timer
• Spanning tree timer
• Bridge protocol data unit timer
• Max-age timer
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 26
23 What is the listening forward delay?
• The time a port spends in listening mode while the network is
converging.
• The time a port spends forwarding mode while the network is
converging.
• The time a port spends before it reaches listening mode while the
network is converging.
• The time a port spends in listening to a frame before it forwards it.
• The STP timers are changed so that the port moves through listening
and learning states more quickly.
• The port is secured so that no other PC can be connected to it.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 27
• The port will be in the forwarding state as soon as it is enabled.
• RSTP will be in use on the switch.
27 Which STP port states are equivalent to the RSTP discarding port
state?
• At least one.
• At least one in each loop.
• At least the switch that is chosen as the root bridge.
• All of them.
• It will forward all frames in the normal way, and this includes BPDUs,
though it does not originate BPDUs.
• It cannot be chosen as the root bridge, and any of its ports that are
involved in loops will be blocked.
• If it is in a loop then a broadcast storm is inevitable.
• It cannot have any VLAN trunk links.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 28
• It was the first version of STP to include the PortFast feature that
allows access ports to transition directly to the forwarding state.
32 Why was the BID modified to include an extra field, and what
information is in this field?
• To allow separate instances of STP to run for each VLAN. The field
contains the VLAN number (VID).
• To allow rapid spanning tree protocol to be introduced. The field
contains the value 2.
• To allow the PortFast feature to be introduced. The field shows which
ports have been configured as PortFast.
• To allow ports to have priorities as well as the switch as a whole having
a priority. The field contains a summary of port priorities.
33 How many missed BPDUs will indicate to a switch running RSTP that a
link has gone down?
• 1
• 3
• 10
• 30
• Point-to-point
• Point-to-multipoint
• Shared
• Edge-to-edge
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 29
CCNA3 Chapter 6 Practice Test Answers
Another VLAN is added to the network shown above, but the router does not
have a spare FastEthernet port. What would be the most economical
solution?
• Buy an extra module for the router to provide more FastEthernet ports.
• Connect an extra router, link the two routers together and enable a
routing protocol between them.
• Configure a trunk link on the switch and subinterfaces on one of
the router ports.
• Use a cheap hub to connect all the VLANs to the same router interface.
A trunk link between a router and a switch is carrying traffic for six VLANs.
What is a potential problem?
• The VLANs are sharing the link’s bandwidth and this could create
a bottleneck.
• The volume of VTP traffic on the link is likely to have an adverse effect
on the network’s performance.
• The traffic for the different VLANs is likely to be confused as all the
traffic goes through the same physical router interface.
• The maximum number of subinterfaces that can be configured on a
router port is five.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 30
A switch is configured as follows:
SW(config)#int f0/1
SW(config-if)#switchport mode access
SW(config-if)#switchport access VLAN 3
SW(config-if)#description link to router f0/0
SW(config)#int f0/2
SW(config-if)#switchport mode access
SW(config-if)#switchport access VLAN 3
SW(config-if)#description link to router f0/1
SW(config)#int f0/3
SW(config-if)#switchport mode access
SW(config-if)#switchport access VLAN 3
SW(config-if)#description link to PC A
SW(config)#int f0/4
SW(config-if)#switchport mode access
SW(config-if)#switchport access VLAN 4
SW(config-if)#description link to PC B
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 31
• None, because VLANs operate at layer two.
• One, because only one physical ports is needed.
• Two, one for each switch.
• Three, one for each VLAN.
• Six, one for each VLAN on each switch.
• Host A, 192.168.1.20
• Host A, 192.168.1.32
• Host B, 192.168.1.46
• Host B, 192.168.1.47
• Host C, 192.168.1.44
• Host C, 192.168.1.60
Topology and configuration are the same as in the previous question. Host IP
addresses are set as follows:
Host A, 192.168.1.13
Host B, 192.168.1.50
Host C, 192.168.1.58
Which statements are true? (Choose all that apply)
• Host A can receive messages from host B
• Host A can receive messages from host C
• Host B can receive messages from host A
• Host C can receive messages from host A
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 32
A router-on-a-stick is configured as follows:
R(config)#interface f0/1.2
R(config-subif)#encapsulation dot1q 20
R(config-subif)#ip add 172.18.0.1 255.255.255.128
R(config-subif)#interface f0/1.3
R(config-subif)#encapsulation dot1q 30
R(config-subif)#ip add 172.18.0.161 255.255.255.224
R(config-subif)#interface f0/1.4
R(config-subif)#encapsulation dot1q 40
R(config-subif)#ip add 172.18.0.193 255.255.255.224
R(config-subif)# interface f0/1
R(config-if)#no shutdown
How are default gateways configured for inter-VLAN routing when “router-on-
a-stick” is used?
• All PCs attached to the switch will share the same default gateway
since there is only one physical connection to the router.
• PCs on different VLANs must be configured with different default
gateways.
• PCs must be configured with the same default gateway as the switch.
• The switch default gateway is the IP address of the physical interface
on the router.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 33
What is true about MAC addresses when “router-on-a-stick” is used for inter-
VLAN routing?
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 34
CCNA3 Chapter 7 Practice Test Answers
Which statements are true of the Bluetooth 802.15.3 standard? (Choose 2)
• 1.3 GHz
• 2.4 GHz
• 5.7 GHz
• 10 GHz
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 35
Why do wireless NICs not detect collisions?
If wireless devices are on opposite sides of the access point and are too far
apart to sense each other, the hidden node problem occurs. What is this
problem?
Which device does a Cisco wireless access point most resemble in its
behaviour?
• An Ethernet hub
• An Ethernet layer 2 switch
• An Ethernet layer 3 switch
• A router
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 36
• Devices take turns to transmit, and can do so when they hold the
token.
Which device typically combines the roles of wireless access point, Ethernet
switch, and router?
• Modem
• Layer 3 switch
• Wireless router
• Wireless NIC
A single access point and the devices connected to it are known as:
• A BSS
• An ESS
• An ESA
• An ad hoc topology
• It causes interference.
• It causes collisions.
• It limits the area covered by an access point.
• It limits the number of access points in an ESS.
What name is commonly given to people who look for unsecured wireless
networks and use them to gain Internet access?
• Hackers
• Crackers
• Surfers
• War drivers
• Channel 1.
• Channel 2 or higher number.
• Channel 4 or higher number.
• Channel 6 or higher number.
• At least 10 cm
• At least 20 cm
• At least 50 cm
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 37
• At least 1 m
• At least 1 foot
• At least 2 feet
• At least 3 feet
• At least 4 feet
• Horizontally
• Vertically
• At an angle of 45 degrees
• At the same height as the wireless devices
What is CSMA/CA?
Which is true of an extended service set, where several access points with
overlapping coverage areas are deployed on a network?
• The overlap in coverage must not be more than 5% otherwise there will
be interference and poor performance.
• The access points should use the same SSID so that mobile
devices can roam from one area to another.
• The access points should use different SSIDs for security purposes.
• The access points must use different RF wave bands.
• None.
• One: open authentication.
• Two: open authentication and shared key.
• Three: open authentication, shared key and TKIP.
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 38
• Four: open authentication, shared key, TKIP and AES.
Where possible, wireless networks should use security that follows the
802.11i standard. This is equivalent to:
• TKIP
• WEP
• WPA
• WPA2
What are the effects of modifying a wireless NIC so that it accepts all traffic
and not just traffic destined for its own MAC address? (Choose 2)
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 39
• The NIC will be overloaded and disassociate itself.
How could an attacker who has modified his laptop’s wireless NIC mount a
denial of service attack? (Choose 2)
Why do some people choose to leave SSID broadcasts enabled rather than
disabling them?
In which order does a wireless device carry out procedures for connecting to a
wireless network?
How should you set the channel on your access point for best performance?
(Choose 2)
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 40
Which statements are true of a RADIUS server? (Choose 2)
• Probing
• Associating
• Beaconing
• Advertising
SW 23/10/2007 /opt/scribd/conversion/tmp/scratch29163/51189847.doc 41