Sunday, 19 February 2012

Kunci Jawaban CCNA 1 Chapter 7 Discovery 4.0



1   
Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
    #encrypt; authenticate users on
   
2    
What are three advantages of wireless over wired technology? (Choose three.)
    #anytime, anywhere connectivity
    #ease of adding additional devices

3    
A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
    #the size of the building
    #the number of solid interior walls in the building
    #the presence of microwave ovens in several offices
    
4    
Which statement is true concerning wireless bridges?
    #connects two networks with a wireless link
    
5    

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKXHAKEgFRIvo6bt9daa-TfuEtAkI8zJ7jw1MHERpZXKvNvpMPT9snZRTW1TRv0pWu0Usfx-fhHutrxb3dT2a31b_qMoRAe8Vj-D58BSprYlLwfyjceskeAat-Ytgz2nFKJ1l1tp4hD4M/s320/15812.jpg
Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
    #The router supports 802.11b, 802.11g, and 802.11n devices.
    
6    
Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
    #has higher power output
    
7    
Which statement is true concerning an ad-hoc wireless network?
    #created by connecting wireless clients in a peer-to-peer network
    
8    
What is the difference between using open authentication and pre-shared keys?
    #Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
    
9    
Which statement is true about open authentication when it is enabled on an access point?
    #requires no authentication
    
10    
Which WLAN component is commonly referred to as an STA?
    #wireless client

11    
Which two statements about a service set identifier (SSID) are true? (Choose two.)
    #tells a wireless device to which WLAN it belongs
    #all wireless devices on the same WLAN must have the same SSID
    
12    
Why is security so important in wireless networks?
    #Wireless networks broadcast data over a medium that allows easy access.
    
13    
What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
    #encryption
    
14    
What type of authentication do most access points use by default?
    #Open
    
15    
What are two authentication methods that an access point could use? (Choose two.)
    #EAP
    #pre-shared keys

16    
What are two benefits of wireless networking over wired networking? (Choose two.)
    #mobility
    #reduced installation time








    
17    

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWKJW6jPAfQ3S6-i1CG7UNl4RmLRv2MD3B1nIpw9EEpzAQcTRkHJ64zYrLcbGHlnCjDFhRhqv_L41shKAvpCqleCSui6Rwe4789WOISDzhTTv7aw5G3ulkO8lUnX_u-ryxiNMzs05NxyE/s320/15813.jpg
Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
    #SSID Broadcast

18    
What are the two WEP key lengths? (Choose two.)
    #64 bit
    #128 bit

19    
Which two statements characterize wireless network security? (Choose two.)
    #With SSID broadcast disabled, an attacker must know the SSID to connect.
    #Using the default IP address on an access point makes hacking easier.
    
20    
What does the Wi-Fi logo indicate about a wireless device?
    #The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
    
21    
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
    #traffic filtering

0 comments: