Term
Classify
One physical interface for many VLANs |
|
Definition
|
|
Term
Classify
bandwith contention |
|
Definition
|
|
Term
Classify
access mode switch port connection |
|
Definition
|
|
Term
Classify
complex cable configuration |
|
Definition
|
|
Term
Classify
trunk mode switch port connection |
|
Definition
|
|
Term
Classify
one physical interface per VLAN |
|
Definition
|
|
Term
Refer to Figure 6-17. PC1 wants to send data to PC2, but does not know the MAC address of PC2. When PC1 send an ARP request, which interface returns a MAC address? |
|
Definition
The router supplies the MAC address of the physical interface F0/0 |
|
|
Term
Refer to Figure 6-18. What are three advantages of replacing the individual VLAN links between the switch and the router with a trunk link and subinterfaces? |
|
Definition
It would free two switch and router ports.
It would reduce the complexity of the cabling runs.
It would allow adding more VLANs without requiring more cabling or switch ports. |
|
|
Term
What condition is required to enable Layer 3 switching? |
|
Definition
The Layer 3 switch must have IP routing enabled. |
|
|
Term
When implementing router-on-a-stick, what is necessary for establishing communication between VLANs? |
|
Definition
|
|
Term
Which two methodologies could be employed to reduce the risk of a failed interswitch link disrupting inter-VLAN routing? |
|
Definition
Configure and enable EtherChannel
Configure and enable alternative paths between switches. |
|
|
Term
Refer to Figure 6-19. Which three statements are true regarding this configuration? |
|
Definition
This configuration will not scale easily.
This configuration limits the number of VLANs because of limitations on the number of physical interfaces the router can support.
This configuration is not the most scalable. |
|
|
Term
How does the router-on-a-stick model for inter-VLAN routing differ from traditional routing? |
|
Definition
The router-on-a-stick model uses subinterfaces on the router with only the no shutdown command issued on the physical interface. |
|
|
Term
Which command does the network administrator use to determine whether inter-VLAN communication is functioning? |
|
Definition
|
|
Term
Regarding Example 6-19, which statement is true based on the displayed output? |
|
Definition
The router is properly configured for router-on-a-stick inter-VLAN routing between the 10.10.10.0/24 and 10.10.11.0/24 subnetworks. |
|
|
Term
In a router-on-a-stick configurtation, which two items are required to support connectivity between the router and the switch? |
|
Definition
Router subinterfaces must be configured with unique addresses in different subnets.
Switch port that connects to the router must be configured as a trunk. |
|
|
Term
Refer to Figure 6-20. R1 has two FastEthernet interfaces and is configured as a router-on-a-stick to perform all inter-VLAN routing. VLAN 10 has approximately the same amount of traffic as VLANs 20, 30, and 99 combined. Interface F0/0 on R1 is nearing capacity and funds are limited for additional equipment. The company expects to add more VLANs in the future. R1 has an unused FastEthernet interface, F0/1. What configuration change will reduce the traffic on R1 F0/0, maintain routing between VLANs, and improve fault tolerance for the network in the event of switch failure? |
|
Definition
Remove the F0/0.10 subinterface from R1. Connect F0/1 on R1 to S3 configured as a trunk link with only VLAN 10 as subinterface F0/1.10. Alternate any new VLAN additions on the two links to balance traffic. |
|
|
Term
Refer to Figure 6-21. Which three statements is true regarding the configuration shown in the exhibit? |
|
Definition
The links between the router and switch are access mode links.
Each router interface requires a unique IP address on seperate subnets for each VLAN.
Each router interface requires a no shutdown command. |
|
|
Term
Which three options are valid inter-VLAN routing methods? |
|
Definition
Traditional routing
Router-on-a-stick
Multilayer-switch-based routing |
|
|
Term
A network technician is configuring a router to support inter-VLAN routing. After entering interface F0/0/1 configuration mode, the network administrator attempts to enter the command encapsulation dot1q 10. The router refuses to accept this command. What could account for this failure? |
|
Definition
This command can be configured only on router subinterfaces. |
|
|
Term
|
Definition
specifies data rates fo 1,2,5.5 and 11 Mpbs due to differentely sized spreading sequences specified in the DSSS modulation technique. |
|
|
Term
|
Definition
uses the 802.11 MAC, but with higher data rates in the 2.4 GHz ISM band by using the OFDM modulation streams. |
|
|
Term
|
Definition
uses the 5.7 GHz band with less intrferance, but obstrucitons can affect performance and limit range. |
|
|
Term
|
Definition
uses multiple radios and antennae at endpoints , each broadcasting on the same frequency to establish multiple streams. |
|
|
Term
|
Definition
encodes a data stream onto an RF signal using the configured modulation technique |
|
|
Term
|
Definition
connects multiple wireless clients or stations to the wired LAN. |
|
|
Term
|
Definition
connects two separated isolated wired networks together. |
|
|
Term
At which layer of the OSI model do wireless access points operate? |
|
Definition
|
|
Term
Which two steps are required for a wireless client to associate with an access point? |
|
Definition
Wireless client authentication
Wireless client association |
|
|
Term
Which three WLAN client authentication types require a preprogrammed network key to be set on the client? |
|
Definition
SHARED with data encryption algorithm
WEP WPA-PSK with data encryption algorithm
TKIP WPA2a-PSK with data encryption algorithm AES |
|
|
Term
Which term is used for products that are tested to be interoperable in both PSK and 802.1x EAP operation for authentication? |
|
Definition
|
|
Term
To help ensure a secure wireless network, most enterprise networks should follow which IEEE standard? |
|
Definition
|
|
Term
Refer to Figure 7-73. The authentication and encryption menu options are displayed. Which wireless setting provide the highet level of security? |
|
Definition
|
|
Term
Which two combinations of 802.11b RF channels would allow two wireless APs to operte simultaneously in the same room with no channel onverlap? |
|
Definition
Channels 7 & 2
Channels 6 & 11 |
|
|
Term
Why do cordless devices, such as cordless telephones, sometimes interfer with wireless acess points? |
|
Definition
These devices operate at a similar frequency |
|
|
Term
Refer to Figure 7-74. What is the recommended overlap between the two wireless access points to provide proper connectivity for users? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Which WLAN client settings would be reviewed to resolve problems accessing the network? |
|
Definition
Wireless mode (802.11a,b,g,and n) Wireless network card drivers Channel selection for ad hoc networks TCP/IP properties Wireless association properties |
|
|
Term
|
Definition
A device that connects wireless communication devices to form a wireless network. |
|
|
Term
|
Definition
A WLAN topology, also called independent basic service set |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
AES replace WEP as the most secure method of encryptioning data |
|
|
Term
|
Definition
The state acheived when properly configured wireless client is able to wirelessly communicate with an access point |
|
|
Term
Association Identifier (AID) |
|
Definition
An access point maps a logical port, known as the association identifier (AID) to the WLAN client |
|
|
Term
|
Definition
Loss of communication signal energy |
|
|
Term
|
Definition
In network security, authentication is the verification of the identity of a person or process. |
|
|
Term
Authentication, Authorization, and Accounting (AAA) |
|
Definition
A protocol, specified in RFC 2903 and servral other RFC's, for specifying who can access a system or network, how they can access it, and what they did while they were connected. |
|
|
Term
|
Definition
The area of radio frequency coverage provided by an access point. This area is aslo referred to as a microcell |
|
|
Term
|
Definition
A WLAN infrasturcture mode whereby mobile clients use a single access point for connectivity to each other or to wired network resources. |
|
|
Term
basic service set identifier (BSSID) |
|
Definition
The MAC address of the access point serving the BSS |
|
|
Term
|
Definition
A wireless LAN packet that signals the availability and presence of the wireless device |
|
|
Term
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) |
|
Definition
This media access method requires WLAN devices to sense the medium for energy levels and wait until the medium is free before sending |
|
|
Term
|
Definition
Consits of a range of frequencies. They are used by wiresless devices to hone in on a particular signal to differentiate it from wireless communications taking place at other frequencies |
|
|
Term
|
Definition
An algorithm for performing encryption and decryption |
|
|
Term
|
Definition
A mechanism used in wireless technology to indicate that a wireless device is ready to accept data. |
|
|
Term
common distribution system (CDS) |
|
Definition
Allows multiple access points in an ESS to appear to be a single BSS |
|
|
Term
|
Definition
One who breaks security on a system |
|
|
Term
direct-sequence spread spectrum (DSSS) |
|
Definition
One of the modulation techniques set out in IEEE 802.11 and the one chosen by the 802.11 Working Group for IEEE 802.11b devices |
|
|
Term
distributed coordination function (DCF) |
|
Definition
All wireless devices in a WLAN use CSMA/CA. I fan access point receives data from a client satation, it sends an acknowledgement to the client that the data has been recieved. |
|
|
Term
|
Definition
A computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit |
|
|
Term
extended service area (ESA) |
|
Definition
The converage area of an ESS |
|
|
Term
extended service set (ESS) |
|
Definition
A WLAN infrastructure mode whereby two or more basic serivce sets are connected by a common distribution system |
|
|
Term
Extensible Authentication Protocol (EAP) |
|
Definition
A universal authentication framework frequently used in wireless networks defined by RFC 3748 |
|
|
Term
|
Definition
Software instructions set permanently or semipermanently in ROM |
|
|
Term
|
Definition
A special-purpose device that performs an application-layer conversion of information from one protocol stack to another |
|
|
Term
global positioning system (GPS) |
|
Definition
Enables a receiver to determine it location, speed, direction, and time |
|
|
Term
|
Definition
A malcious intruder who enters systems as a criminal and steals data or deliberately harms systems |
|
|
Term
|
Definition
The hidden node problem occurs when two client stations connect to the same access point, but are on oppsoing ends of the range of the Ap, resulting in simultaneous transmissions by clients as a result of the incapability of one client to sense the presence of the other |
|
|
Term
IEEE 802 LAN/MAN Standards Committee (LMSC) |
|
Definition
Chartered to oversee the various IEEE 802 working groups |
|
|
Term
|
Definition
A standard for port-based network access control. |
|
|
Term
|
Definition
A standard that defines how raido frequency in the ISM frequency bands is used for the physical layer and the MAC sublayer of wireless links |
|
|
Term
|
Definition
A standard specifying wireless data communication at up to 54 Mbps at the 5 GHz range using OFDM |
|
|
Term
|
Definition
A standard specifying wireless data communication at up to 11 Mbps at the 2.4 GHz range using DSSS |
|
|
Term
|
Definition
A standard specifying wireless data communication at up to 54 Mbps at the 2.4 GHz range using DSSS and OFDM |
|
|
Term
|
Definition
A standard specifying security mechanism for wireless networks |
|
|
Term
|
Definition
A standard specifying data communication at up to 248 Mbps at an unspecified frequency range and using MIMO |
|
|
Term
|
Definition
The IEEE terminology for an ad hoc topology |
|
|
Term
industrial, scientific, and medical (ISM) |
|
Definition
The ISM radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific, and medical purposes other than communications |
|
|
Term
|
Definition
Unwanted communication noise |
|
|
Term
International Telecommunications Union-Radiocommunictaion Sector (ITU-R) |
|
Definition
One of the three sectors (divisions or units) of the International Telecommunication Union (ITU), and is responsible for radio communictaion |
|
|
Term
Internet Control Message Protocol (ICMP) |
|
Definition
Chiefly used by TCP/IP network operating systems to send error messages idicating, for instance, that a requested service is not available or that a host or router could not be reached |
|
|
Term
|
Definition
The process of routing data between VLANs withing a switched LAN |
|
|
Term
intrusion prevention systems (IPS) |
|
Definition
A device that monitors network activities for malicious behavior and can react in real-time to block those activities |
|
|
Term
|
Definition
An atatck in which the attacker is able to read, insert, and modify at will messages between two endpoints without either party being aware that the data path has been compromised |
|
|
Term
|
Definition
A site evaluation that involves inspecting the area with the goal of identifying potential issues that could impact the network |
|
|
Term
message integrity check (MIC) |
|
Definition
Part of the IEEE 802.1i standard. MIC is an 8-byte field placed between the data portion of an IEEE 802.11 frame and the 4 -byte ICV |
|
|
Term
|
Definition
A technique for combining user information with a transmitter's carrier signal |
|
|
Term
multiple input/multiple output (MIMO) |
|
Definition
used in IEEE 802.11n wireless devices, splits a high data-rate stream into multiple lower-rate streams broadcasts them simultaneously over the ovailable radios and antennae |
|
|
Term
orthogonal frequency division multiplexing (OFDM) |
|
Definition
A modulation technique used with IEEE 802.11g and IEEE 802.11a |
|
|
Term
|
Definition
A command used to verify Layer 3 connectivity. |
|
|
Term
|
Definition
A key used in various encryption schemes whereby the opposing ends of a connection share the knowledge of a secret key used to encrypt and decrypt the data |
|
|
Term
|
Definition
IEEE 802.11 frames used by WLAN clients to find the networks they can associate with |
|
|
Term
|
Definition
A generic term referring to frequencies that correspond to raido transmissions |
|
|
Term
radio resource management (RRM) |
|
Definition
monitors the RF band for activity and access point load |
|
|
Term
Remote Authentication Dial In User Service (RADIUS) |
|
Definition
An authentication protocol for controlling access to network resources within an IEEE 802.1x framework |
|
|
Term
request to send/clear to send (RTS/CTS) |
|
Definition
A feature used in the CSMA/CA medial access method of WLANs to allow a negotiation between a client and an access point without collisions |
|
|
Term
|
Definition
placed on a WLAN, which is used to interfere with normal network operation, capture client data, or gain access to servers |
|
|
Term
|
Definition
A term used to describe the topology of a Layer 2 switch trunked to an interface router for the purposes of inter-VLAN routing |
|
|
Term
|
Definition
stored in a router or other internetworking device, which keeps track of routes of network destinations and metrics associated with those routers |
|
|
Term
service set identifier (SSID) |
|
Definition
A code atached to all packets on a wireless netwokr to identify each packet as part of that network |
|
|
Term
|
Definition
The process of planning and designing a wirless network to provide a solution that will deliver the required coverage, data rates, network capacity, roaming cpability, and QoS |
|
|
Term
|
Definition
A virtual interface associated with a single physcial interface on a router |
|
|
Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
Was designed by the IEEE 802.11i taks group and the Wi-Fi Alliance as a solution to replace WEP without requireing the replacement of legacy hardware |
|
|
Term
|
Definition
A Microsoft implementation of the trace-route program, with traces the path a packet takes to a destination |
|
|
Term
|
Definition
A measure of the strength of the radio transmissions emanating froma wirelss networking device |
|
|
Term
utility-assisted site survey |
|
Definition
A sophisticated site surevey carried out with a dedicated surevey tool, such as AirMagnet |
|
|
Term
|
Definition
The act of searching for Wi-Fi wireless networks by a person in a moving vehicle using a Wi-Fi-equipped computer, such as a laptop or a PDA |
|
|
Term
|
Definition
owns the trademark Wi-Fi. it is a global, nonprofit, industry trade association devoted to promoting the growth and acceptance of wireless technology |
|
|
Term
Wi-Fi Protected Access (WPA and WPA2) |
|
Definition
A class of systems to secure wireless Lans |
|
|
Term
Wired Equivalent Privacy ( WEP) |
|
Definition
An algorithm to secure IEEE 802.11 wireless networks |
|
|
Term
|
Definition
The device that makes a client station capable of sending and receiving RF signals |
|
|
Term
Challenge Questions Matching
Wireless Bridge |
|
Definition
Connects two seperated isolated wired networks together |
|
|
Term
Challeng Questions Matching
Wireless router |
|
Definition
performs the role of a switch, a router, and an AP |
|
|
Term
Challenge Questions Matching
Wireless NIC |
|
Definition
Encodes a data stream onto an RF signal |
|
|
Term
Challenge Questions Matching
Wireless AP |
|
Definition
Not required for RF communication between two devices |
|
|
Term
Challenge Questions
How many physical interfaces area required to perform inter-VLAN routing with each method indicated. Traditional inter-VLAN routing |
|
Definition
|
|
Term
Challenge Questions
How many physical interfaces area required to perform inter-VLAN routing with each method indicated. Router-on-a-stick |
|
Definition
|
|
Term
Challenge Questions How many physical interfaces area required to perform inter-VLAN routing with each method indicated. Multilayer switching |
|
Definition
|
|