logo

CuriousTab

CuriousTab

Discussion


Home Networking Wireless Technologies See What Others Are Saying!
  • Question
  • You are connecting your access point and it is set to root. What does Extended Service Set ID mean?


  • Options
  • A. That you have more than one access point and they are in the same SSID connected by a distribution system.
  • B. That you have more than one access point and they are in separate SSIDs connected by a distribution system.
  • C. That you have multiple access points, but they are placed physically in different buildings.
  • D. That you have multiple access points, but one is a repeater access point.

  • Correct Answer
  • That you have more than one access point and they are in the same SSID connected by a distribution system. 

    Explanation
    Extended Service Set ID means that you have more than one access point and they all are set to the same SSID and all are connected together in the same VLAN or distribution system so users can roam.

  • More questions

    • 1. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

    • Options
    • A. 14
    • B. 15
    • C. 16
    • D. 30
    • Discuss
    • 2. What are two purposes for segmentation with a bridge?

      1. To add more broadcast domains.
      2. To create more collision domains.
      3. To add more bandwidth for users.
      4. To allow more broadcasts for users.

    • Options
    • A. 1 only
    • B. 2 and 3
    • C. 2 and 4
    • D. 4 only
    • Discuss
    • 3. Why does the data communication industry use the layered OSI reference model?

      1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
      2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
      3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.
      4. It encourages industry standardization by defining what functions occur at each layer of the model.

    • Options
    • A. 1 only
    • B. 1 and 4
    • C. 2 and 3
    • D. 3 only
    • Discuss
    • 4. Which of the following allows a router to respond to an ARP request that is intended for a remote host?

    • Options
    • A. Gateway DP
    • B. Reverse ARP (RARP)
    • C. Proxy ARP
    • D. Inverse ARP (IARP)
    • Discuss
    • 5. Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2?

      1. The command is used to establish a static route.
      2. The default administrative distance is used.
      3. The command is used to configure the default route.
      4. The subnet mask for the source address is 255.255.255.0.

    • Options
    • A. 1 and 2
    • B. 2 and 4
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 6. What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?

    • Options
    • A. 0x2100
    • B. 0x2101
    • C. 0x2102
    • D. 0x2142
    • Discuss
    • 7. Which of the following network types have a designated router and a backup designated router assigned?

      1. Broadcast
      2. Point-to-point
      3. NBMA
      4. NBMA point-to-point

    • Options
    • A. 1, 2 and 3
    • B. 1 and 3
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 8. You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be?

    • Options
    • A. You must type the show ip rip command first.
    • B. IP addressing on the network is incorrect.
    • C. You must use the terminal monitor command.
    • D. Debug output is sent only to the console.
    • Discuss
    • 9. Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.

    • Options
    • A. 192.168.10.142
    • B. 192.168.10.66
    • C. 192.168.100.254
    • D. 192.168.10.143
    • E. 192.168.10.126
    • Discuss
    • 10. What are the two main types of access control lists (ACLs)?

      1. Standard
      2. IEEE
      3. Extended
      4. Specialized

    • Options
    • A. 1 and 3
    • B. 2 and 4
    • C. 3 and 4
    • D. 1 and 2
    • Discuss


    Comments

    There are no comments.

Enter a new Comment