CCNA 3 Chapter 7 Answers

CCNA Exploration 3 Chapter 7 Exam Answers

1. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?

This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.

The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.

Install a new wireless access point in this center area to provide coverage.

Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.

 

2. What procedure can prevent man-in-the-middle attacks?

Force all devices on a WLAN to authenticate and monitor for any unknown devices.

Enable access points to send an SSID to each device wanting to use the network.

Configure MAC filtering on all authorized access points.

Disable SSID broadcasts.

 

3. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)

802.11a suffers from a shorter range than 802.11g.

The 2.4 GHz frequency band is not as crowded as the 5 GHz band.

802.11a is more susceptible to RF interference from common commercial items.

802.11a uses a more expensive modulation technique than 802.11g.

802.11g is backward compatible with 802.11b, but 802.11a is not.

(more…)

Tags: A network administrator is deploying three 2 4 GHz access points for the exhibit area of a large car dealer facility What channel selection can be used on the three access points to avoid signal interference?, which statement is true about the ssid configuration of a wireless access point?, A network administrator is designing the wireless network for a law office The security policy requires that the access to the wireless network must be authenticated with the credentials of employees The administrator decides to use the PSK2 Enterprise au, On a wireless network in a corporate environment that is using the CSMA/CA access method how is the successful transmission of data packets by client stations indicated?, ccna 3 chapter 7, ccna 3 chapter 7 answers, which statement is true about the ssid configuration of a wireless access point, CCNA Exploration 3 Chapter 7 Exam Answers, a network administrator is deploying three 2 4 ghz access points for the exhibit area of a large car dealer facility what channel selection can be used on the three access points to avoid signal interference, Which major problem does CSMA/CA overcome in wireless networks?, Which function is provided by a wireless access point?, eswitching chapter 7 - ccna exploration lan switching and wireless (version 4 0) answers, ESwitching Chapter 7, Which installation method will allow connectivity for a new wireless network?, ccna exploration 3 chapter 7, ccna exploration 3 chapter 7 answers, on a wireless network in a corporate environment that is using the csma/ca access method how is the successful transmission of data packets by client stations indicated, What will a wireless client transmit to discover the available WLAN networks?, Why is security so important in wireless networks?, What condition can allow unauthorized access to a network for users who are not physically connected to the network?, What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?, Which two statements are true regarding wireless security? (Choose two ), ccna discovery 3 chapter 7, a network administrator is designing the wireless network for a law office, eswitching chapter 7 - ccna exploration lan switching and wireless (version 4 0), ccna discovery 3 chapter 7 answers, on a wireless network in a corporate environment that is using the csma/ca, ccna 3 chapter 7 answers 2012, Which major problem does CSMA/CA overcome in wireless networks, What occurs when a rogue access point is added to a WLAN?, Which two conditions have favored adoption of 802 11g over 802 11a?, which function is provided by a wireless access point, In a WLAN network why should wireless access points be implemented with each access point using a different channel?, On a wireless network in a corporate environment that is using the CSMA/CA access method, What purpose does authentication serve in a WLAN?, Which two statements characterize wireless network security? (Choose two ), eswitching chapter 7 ccna exploration lan switching and wireless version 4 0 answers, Which two statements characterize wireless network security?, eswitching chapter 7 exam answers, Which two statements concerning network security are accurate? (Choose two ), CCNA 3 chapter 7 test, why is security so important in wireless networks, ccna 3 eswitching chapter 7 answers, What will a wireless client transmit to discover the available WLAN networks, ccna 3 chapter 7 exam answers 2012, Which wireless technology standard provides the most compatibility with older wireless standards but has greater performance?, Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?, Which two statements are true regarding wireless security?, network administrator is designing the wireless network for a law office The security policy requires that the access to the wireless network must be authenticated with the credentials of employees The administrator decides to use the PSK2 Enterprise auth, Which two statements concerning networking standards are true? (Choose two )