Port Security Questions: Answer
Port Security Questions: Answer
Port Security Questions: Answer
Question 1
A network administrator enabled port security on a switch interface connected to a printer. What is
the next configuration action in order to allow the port to learn the MAC address of the printer and
insert it into the table automatically?
A. implement auto MAC address learning
B. implement static MAC addressing.
C. enable sticky MAC addressing
D. enable dynamic MAC address learning
Answer: C
Question 2
Refer to the exhibit. Which port security violation mode is configured on interface Fa0/1?
A. protect
B. shutdown VLAN
C. shutdown
D. restrict
Answer: C
Explanation
After the port security violation occurs, the Fa0/1 interface was shutdown so the port security is
using “shutdown” mode.
Question 3
A port security violation has occurred on a switch port due to the maximum MAC address count
being exceeded. Which command must be configured to increment the security-violation count and
forward an SNMP trap?
A. switchport port-security violation access
B. switchport port-security violation restrict
C. switchport port-security violation protect
D. switchport port-security violation shutdown
Answer: B
Access-list Questions
January 13th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).
Note: If you are not sure about Access list, please read our Access List Tutorial.
Question 1
Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the
web server via HTTP. All other computers must be able to access the web server. Which
configuration when applied to switch A accomplishes this task?
A.
config t
ip access-list extended wwwblock
deny tcp any host 10.30.0.100 eq 80
int vlan 100
ip access-group wwwblock in
B.
config t
ip access-list extended wwwblock
deny tcp any host 10.30.0.100 eq 80
permit ip any any
int vlan 20
ip access-group wwwblock in
C. config t
ip access-list extended wwwblock
permit ip any any
deny tcp any host 10.30.0.100 eq 80
int vlan 30
ip access-group wwwblock in
D.
config t
ip access-list extended wwwblock
deny tcp any host 10.30.0.100 eq 80
int vlan 20
ip access-group wwwblock in
Answer: B
Explanation
The “deny tcp any host 10.30.0.100 eq 80” command means “block all (any) traffic from accessing
web server at 10.30.0.100 on port 80”. And since it is applied to VLAN 20 interface so only
computers on VLAN 20 are affected.
In summary, just notice that 10.30.0.100 here is the destination IP address, not source address.
Note: The traffic flow from hosts in VLAN 20 to the Web Server is: host in VLAN 20 -> Interface
VLAN 20 -> Interface VLAN 30 -> Web Server. If we place the ACL: host in VLAN 20 -> (ACL
Inbound) Interface VLAN 20 -> Interface VLAN 30 -> Web Server. Therefore the ACL can block
traffic from VLAN 20.
Question 2
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The
configuration failed to work as intended. Which two changes stop outbound traffic on TCP ports 25
and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose
two)
R2#config t
R2(config)#access-list 101 deny tcp 10.0.20.0 0.0.0.63 10.0.10.0 0.0.0.63 eq smtp
R2(config)#access-list 101 deny tcp 10.0.20.0 0.0.0.63 10.0.10.0 0.0.0.63 eq www
R2(config)#int gi0/2
R2(config-if)#ip access-group 101 in
A. Add a “permit ip any any” statement to the beginning of ACL 101 for allowed traffic
B. Add a “permit ip any any” statement at the end of ACL 101 for allowed traffic
C. The source and destination IPs must be swapped in ACL 101
D. The ACL must be configured the Gi0/2 interface inbound on R1
E. The ACL must be moved to the Gi0/1 interface outbound on R2
Answer: B C
Question 3
While examining excessive traffic on the network, it is noted that all incoming packets on an
interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two
misconfigurations cause this behavior? (Choose two)
A. The packets fail to match any permit statement
B. A matching permit statement is too high in the access list
C. A matching permit statement is too broadly defined
D. The ACL is empty
E. A matching deny statement is too high in the access list
Answer: B C
Explanation
If we have a matching permit statement too high in the access list then it will be matched first
before we can deny it. If a matching permit statement is too broadly defined (for example if we
only want to permit TCP traffic then we should not permit “ip” traffic, which includes both TCP and
UDP).
Question 4
Refer to the exhibit. What configuration on R1 denies SSH access from PC-1 to any R1 interface
and allows all other traffic?
interface GigabitEthernet0/0
ip access-group 100 in
C. line vty 0 15
access-class 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23
access-list 100 permit ip any any
Answer: A
Question 5
Refer to the exhibit. An administrator configures the following ACL in order to prevent devices on
the 192.168.1.0 subnet from accessing the server at 10.1.1.5:
Where should the administrator place this ACL for the most efficient use of network resources?
Answer: A
Explanation
By placing the ACL closest to the source, we can reduce unnecessary traffic passing between two
routers and the processing time of the router.
Question 6
Refer to the exhibit. Which two configurations would be used to create and apply a standard
access list on R1, so that only the 10.0.70.0/25 network devices are allowed to access the internal
database server? (Choose two)
A. R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip access-group 5 out
Answer: A D
Question 7
interface GigabitEthernet0/1
ip address 192.168.1.2 255.255.255.0
ip access-group 2699 in
!
access-list 2699 deny icmp any 10.10.1.0 0.0.0.255 echo
access-list 2699 deny ip any 10.20.1.0 0.0.0.255
access-list 2699 permit ip any 10.10.1.0 0.0.0.255
access-list 2699 permit tcp any 10.20.1.0 0.0.0.127 eq 22
A network administrator must permit SSH access to remotely manage routers in a network. The
operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?
Answer: D
Explanation
The operations team resides on 10.20.1.0/25 network which is a part of 10.20.1.0/24 network so
we need to remove the “deny” statement of the 10.20.1.0/25 network to allow SSH.
AAA Questions
January 12th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).
If you are not sure about AAA, please read our AAA TACACS+ and RADIUS Tutorial.
Question 1
Answer: B
Question 2
Answer: D
Question 3
Answer: C
Explanation
+ Authentication: Specify who you are (usually via login username & password)
+ Authorization: Specify what actions you can do, what resource you can access
+ Accounting: Monitor what you do, how long you do it (can be used for billing and auditing)
Question 4
Refer to the exhibit. Which password must an engineer use to enter the enable mode?
Atlanta#config t
Atlanta(config)#aaa new-model
Atlanta(config)#aaa authentication login default local
Atlanta(config)#line vty 0 4
Atlanta(config-line)#login authentication default
Atlanta(config-line)#exit
Atlanta(config)#username ciscoadmin password adminadmin123
Atlanta(config)#username ciscoadmin privilege 15
Atlanta(config)#enable password cisco123
Atlanta(config)#enable secret testing1234
Atlanta(config)#end
A. adminadmin123
B. default
C. testing1234
D. cisco123
Answer: C
Explanation
Reference: https://www.cisco.com/c/en/us/td/docs/optical/cpt/r9_3/configuration/guide/cpt93_co
nfiguration/cpt93_configuration_chapter_010000.pdf
Question 5
Answer: C
Question 6
How do AAA operations compare regarding user identification, user services and access control?
A. Authorization provides access control and authentication tracks user services
B. Authentication identifies users and accounting tracks user services
C. Accounting tracks user services, and authentication provides access control
D. Authorization identifies users and authentication provides access control
Answer: B
Security Questions
January 12th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).
Question 1
An email user has been lured into clicking a link in an email sent by their company’s security
organization. The webpage that opens reports that it was safe but the link could have contained
malicious code. Which type of security program is in place?
A. Physical access control
B. Social engineering attack
C. brute force attack
D. user awareness
Answer: D
Explanation
This is a training program which simulates an attack, not a real attack (as it says “The webpage
that opens reports that it was safe”) so we believed it should be called a “user awareness”
program. Therefore the best answer here should be “user awareness”. This is the definition of
“User awareness” from CCNA 200-301 Offical Cert Guide Book:
“User awareness: All users should be made aware of the need for data confidentiality to protect
corporate information, as well as their own credentials and personal information. They should also
be made aware of potential threats, schemes to mislead, and proper procedures to report security
incidents. “
Note: Physical access control means infrastructure locations, such as network closets and data
centers, should remain securely locked.
Question 2
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.
Which two steps will fulfill the request? (Choose two)
A. Configure the ports in an EtherChannel
B. Administratively shut down the ports
C. Configure the port type as access and place in VLAN 99
D. Configure the ports as trunk ports
E. Enable the Cisco Discovery Protocol
Answer: B C
Question 3
Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure the version of SSH
B. Configure VTY access
C. Create a user with a password
D. Assign a DNS domain name
Answer: D
Explanation
In order to generate an RSA key for SSH, we need to configure the hostname and a DNS domain
name on the router (a username and password is also required). Therefore in fact both answer C
and answer D are correct.
Question 4
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
A. The switch must be running a k9 (crypto) IOS image
B. The ip domain-name command must be configured on the switch
C. IP routing must be enabled on the switch
D. A console password must be configured on the switch
E. Telnet must be disabled on the switch
Answer: A B
Question 5
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
Answer: C
Explanation
A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with
each other over a public network such as the Internet. A site-to-site VPN means that two sites
create a VPN tunnel by encrypting and sending data between two devices. One set of rules for
creating a site-to-site VPN is defined by IPsec.
In the topology above, Remote Campus sites can connect to the Main Campus through site-to-site
VPNs.
Question 6
Answer: B
Explanation
1. The user logs in to the website or service with their username and password.
2. The password is validated by an authentication server and, if correct, the user becomes eligible
for the second factor.
3. The authentication server sends a unique code to the user’s second-factor method (such as a
smartphone app).
4. The user confirms their identity by providing the additional authentication for their second-
factor method.
Question 7
Which command prevents passwords from being stored in the configuration as plaintext on a
router or switch?
A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password
Answer: B
Question 8
Refer to the exhibit. An administrator configures four switches for local authentication using
passwords that are stored in a cryptographic hash. The four switches must also support SSH
access for administrators to manage the network infrastructure. Which switch is configured
correctly to meet these requirements?
SW1(config-line)#line vty 0 15
SW1(config-line)#no login local
SW1(config-line)#password cisco
SW2(config)#username admin1 password abcd1234
SW2(config)#username admin2 password abcd1234
SW2(config-line)#line vty 0 15
SW2(config-line)#login local
SW3(config)#username admin1 secret abcd1234
SW3(config)#username admin2 secret abcd1234
SW3(config-line)#line vty 0 15
SW3(config-line)#login local
SW4(config)#username admin1 password abcd1234
SW4(config)#username admin2 password abcd1234
SW4(config-line)#line console 0
SW4(config-line)#login local
A. SW1
B. SW2
C. SW3
D. SW4
Answer: C
Explanation
The “login local” command instructs the device to use the username and password in its local
database for authentication. The secret is encrypted when it is stored on the local router.
Question 9
The service password-encryption command is entered on a router. What is the effect of this
configuration?
A. restricts unauthorized users from viewing clear-text passwords in the running configuration
B. prevents network administrators from configuring clear-text passwords
C. protects the VLAN database from unauthorized PC connections on the switch
D. encrypts the password exchange when a VPN tunnel is established
Answer: A
Explanation
The service password-encryption command will encrypt all current and future passwords so any
password existed in the configuration will be encrypted.
Question 10
In which two ways does a password manager reduce the chance of a hacker stealing a user’s
password? (Choose two)
A. It automatically provides a second authentication factor that is unknown to the original user
B. It uses an internal firewall to protect the password repository from unauthorized access
C. It protects against keystroke logging on a compromised device or web site
D. It stores the password repository on the local workstation with built-in antivirus and anti-
malware functionality
E. It encourages users to create stronger passwords
Answer: C E
Explanation
A password manager only helps you remember your chosen passwords without typing them by
yourself. It automatically fills into the password textbox for you so it does not provides a second
authentication factor. An example of second authentication factor is an one time password (OTP)
sent to your phone after typing your password and you have to type this OTP to authenticate.
By using a password manager, you are encouraged to create a complex password because you
don’t need to remember it.
Question 11
What are two purposes of launching a reconnaissance attack on a network? (Choose two)
A. to prevent other users from accessing the system
B. to escalate access privileges
C. to gather information about the network and devices
D. to scan for accessibility
E. to retrieve and modify data
Answer: C D
Question 1
Refer to the exhibit. An engineer booted a new switch and applied this configuration via the
console port. Which additional configuration must be applied to allow administrators to
authenticate directly to enable privilege mode via Telnet using local username and password?
Switch(config)#hostname R1
R1(config)#interface FastEthernet0/1
R1(config-if)#no switchport
R1(config-if)#ip address 10.100.20.42
255.255.255.0
R1(config-if)#line vty 0 4
R1(config-line)#login
A.
R1(config)#username admin
R1(config-if)#line vty 0 4
R1(config-line)#password p@ss1234
B.
R1(config)#username admin
R1(config-if)#line vty 0 4
R1(config-line)#password p@ss1234
R1(config-line)#transport input telnet
C.
R1(config)#username admin secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local
R1(config)#enable secret p@ss1234
D.
R1(config)#username admin privilege 15 secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local
Answer: D
Question 2
An organization secures its network with multi-factor authentication using an authenticator app on
employee smartphones. How is the application secured in the case of a user’s smartphone being
lost or stolen?
A. The application requires an administrator password to reactivated after a configured interval.
B. The application verifies that the user is in a specific location before it provides the second
factor.
C. The application requires the user to enter a PIN before it provides the second factor.
D. The application challenges a user by requiring an administrator password to reactivate when the
smartphone is rebooted.
Answer: C
Question 3
Answer: D
Explanation
Question 4
Answer: D
Explanation
The Web Security appliance (WSA) intercepts requests that are forwarded to it by clients or other
devices over the network. Proxy caching is a setting in WSA that caches data to increase
performance.
Question 5
Answer: D
Explanation
In stateful inspection, the firewall not only inspects packets up through the application layer/layer7
determining a packet’s header information and data content, but also monitors and keeps track of
the connection’s state. For all active connections traversing the firewall, the state information,
which may include IP addresses and ports involved, the sequence numbers and acknowledgement
numbers of the packets traversing the connection, TCP packet flags, etc. is maintained in a state
table.
Question 6
What are two recommendations for protecting network ports from being exploited when located in
an office space outside of an IT closet? (Choose two)
A. shut down unused ports
B. enable the PortFast feature on ports
C. implement port-based authentication
D. configure ports to a fixed speed
E. configure static ARP entries
Answer: A C
Question 7
Answer: A
Explanation
VLAN Hopping: By altering the VLAN ID on packets encapsulated for trunking, an attacking
device can send or receive packets on various VLANs, bypassing Layer 3 security measures. VLAN
hopping can be accomplished by switch spoofing or double tagging. One of a popular type of VLAN
Hopping is
Double-Tagging attack:
In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag
matches the native VLAN of the trunk port (VLAN 10 in this case), and the second matches the
VLAN of a host it wants to attack (VLAN 20).
When the packet from the attacker reaches Switch A, Switch A only sees the first VLAN 10 and it
matches with its native VLAN 10 so this VLAN tag is removed. Switch A forwards the frame out all
links with the same native VLAN 10. Switch B receives the frame with an tag of VLAN 20 so it
removes this tag and forwards out to the Victim computer.
Note: This attack only works if the trunk (between two switches) has the same native VLAN as the
attacker. In other words, this attack is only successful if the attacker belongs to the native VLAN of
the trunk link. Another important point is, this attack is strictly one way as it is impossible to
encapsulate the return packet.
To mitigate this type of attack, we can use VLAN access control lists (VACLs, which applies to all
traffic within a VLAN. We can use VACL to drop attacker traffic to specific victims/servers); or
implement Private VLANs; or keep the native VLAN of all trunk ports different from user VLANs.
Question 8
Which technology can prevent client devices from arbitrarily connecting to the network without
state remediation?
A. MAC Authentication Bypass
B. IP Source Guard
C. 802.1x
D. 802.11n
Answer: C
Explanation
The IEEE 802.1x standard defines a client-server-based access control and authentication protocol
that prevents unauthorized clients from connecting to a LAN through publicly accessible ports
unless they are properly authenticated. The authentication server authenticates each client
connected to a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1x access control allows only Extensible Authentication
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP)
traffic through the port to which the client is connected. After authentication is successful, normal
traffic can pass through the port.
DAI Questions
January 11th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).
Question 11
Answer: C
Question 5
Refer to the exhibit. If the network environment is operating normally, which type of device must
be connected to interface FastEthernet 0/1?
A. DHCP client
B. access point
C. router
D. PC
Answer: C
Explanation
Note: To configure DHCP snooping with Dynamic ARP Inspection we need to add the command “ip
arp inspection vlan vlan-id” in global configuration mode and “ip arp inspection trust” in interface
mode.
In a normal network environment, we should trust interfaces that are connected to routers, not
end points.
Question 1
Answer: D
Explanation
Dynamic ARP inspection is an ingress security feature; it does not perform any egress checking.
Question 2
Answer: A
Explanation
Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. It
intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability
protects the network from certain man-in-the-middle attacks. After enabling DAI, all ports become
untrusted ports.
Wireless Questions
January 10th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).
Note: If you are not sure about Wireless, please read our Wireless tutorial.
Roaming: The ability to use a wireless device and be able to move from one access point’s
range to another without losing the connection.
Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight
+ Autonomous: self-sufficient and standalone. Used for small wireless networks.
+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller
(WLC) to function. LAP and WLC communicate with each other via a logical pair of
CAPWAP tunnels.
– Control and Provisioning for Wireless Access Point (CAPWAP) is an IETF standard
protocol which enables a WLC to manage multiple APs. CAPWAP is similar to LWAPP
except the following differences:
+ CAPWAP uses Datagram Transport Layer Security (DTLS) for authentication and
encryption to protect traffic between APs and controllers. LWAPP uses AES.
+ CAPWAP has a dynamic maximum transmission unit (MTU) discovery mechanism.
+ CAPWAP runs on UDP ports 5246 (control messages) and 5247 (data messages)
Signal to Noise Ratio (SNR) is defined as the ratio of the transmitted power from the AP
to the ambient (noise floor) energy present. To calculate the SNR value, we add the Signal
Value to the Noise Value to get the SNR ratio. A positive value of the SNR ratio is always
better.
The 2.4 GHz band is subdivided into multiple channels each allotted 22 MHz bandwidth
and separated from the next channel by 5 MHz.
-> A best practice for 802.11b/g/n WLANs requiring multiple APs is to use non-
overlapping channels such as 1, 6, and 11.
Question 1
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which
cipher fulfills the configuration requirement?
A. WEP
B. RC4
C. AES
D. TKIP
Answer: C
Explanation
Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options.
TKIP is actually an older encryption protocol introduced with WPA to replace the very-insecure WEP
encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer
considered secure, and is now deprecated. In other words, you shouldn’t be using it.
AES is a more secure encryption protocol introduced with WPA2 and it is currently the strongest
encryption type for WPA2-PSK.
Question 2
Which unified access point mode continues to serve wireless clients after losing connectivity to the
Cisco Wireless LAN Controller?
A. sniffer
B. mesh
C. flex connect
D. local
Answer: C
Explanation
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0
10001101.html
Question 3
Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
A. Bronze
B. Platinum
C. Silver
D. Gold
Answer: B
Explanation
Cisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice,
Gold/Video, Silver/Best Effort (default), and Bronze/Background.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0
1010111.html
Question 4
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
A. disabling TPC so that access points can negotiate signal levels with their attached wireless
devices.
B. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
C. allocating non overlapping channels to access points that are in close physical proximity to one
another
D. configuring access points to provide clients with a maximum of 5 Mbps
Answer: C
Question 5
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is
true?
A. To pass client traffic two or more ports must be configured
B. The EtherChannel must be configured in “mode active”
C. When enabled the WLC bandwidth drops to 500 Mbps
D. One functional physical port is needed to pass client traffic
Answer: D
Explanation
Link aggregation (LAG) is a partial implementation of the 802.3ad port aggregation standard. It
bundles all of the controller’s distribution system ports into a single 802.3ad port channel.
+ LAG requires the EtherChannel to be configured for ‘mode on’ on both the controller and the
Catalyst switch -> Answer B is not correct.
+ If the recommended load-balancing method cannot be configured on the Catalyst switch, then
configure the LAG connection as a single member link or disable LAG on the controller ->
Answer A is not correct while answer D is correct.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-5/configuration-
guide/b_cg75/b_cg75_chapter_0100010.html
Question 6
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
A. autonomous
B. lightweight
C. bridge
D. mobility express
Answer: B
Explanation
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-
faq.html
Question 7
Which type of wireless encryption is used for WPA2 in pre-shared key mode?
A. TKIP with RC4
B. RC4
C. AES-128
D. AES-256
Answer: D
Explanation
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2
passphrase so we can deduce the encryption is AES-256, not AES-128.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-
wlan/67134-wpa2-config.html
Question 8
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless
LAN Controller GUI? (Choose two)
A. management interface settings
B. QoS settings
C. ip address of one or more access points
D. SSID
E. Profile name
Answer: D E
Question 9
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access
from specific networks?
A. CPU ACL
B. TACACS
C. Flex ACL
D. RADIUS
Answer: A
Explanation
Whenever you want to control which devices can talk to the main CPU, a CPU ACL is used.
Note: CPU ACLs only filter traffic towards the CPU, and not any traffic exiting or generated by the
CPU.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-
controllers/109669-secure-wlc.html
Question 10
Answer: A
Explanation
There are three main types of 802.11 frames: the Data Frame, the Management Frame and the
Control Frame. Association Response belongs to Management Frame. Association response is sent
in response to an association request.
Question 11
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two
formats are available to select? (Choose two)
A. ASCII
B. base64
C. binary
D. decimal
E. hexadecimal
Answer: A E
Explanation
When configuring a WLAN with WPA2 Preshared Key (PSK), we can choose the encryption key
format as either ASCII or HEX.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/config-
guide/b_wl_16_10_cg/multi-preshared-key.pdf
Question 12
Answer: D
Question 13
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which
two standard designs are recommended? (Choose two)
Answer: C E
Question 1
How does CAPWAP communicate between an access point in local mode and a WLC?
A. The access point must directly connect to the WLC using a copper cable
B. The access point must not be connected to the wired network, as it would create a loop
C. The access point must be connected to the same switch as the WLC
D. The access point has the ability to link to any switch in the network, assuming connectivity to
the WLC
Answer: D
Question 2
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. TKIP encryption
B. AES encryption
C. Scrambled encryption key
D. SAE encryption
Answer: D
Explanation
Wi-Fi Protected Access version 3 (WPA3) is a new Wi-Fi Alliance’s (WFA) security standard for
personal and enterprise networks. It aims to improve overall Wi-Fi security by using modern
security algorithms and stronger cipher suites. WPA3 has two parts:
Answer: A
Explanation
In Central Switched (Local) mode, an AP creates two CAPWAP tunnels to the Wireless Controller.
One tunnel is used for forwarding data traffic and the other is used for forwarding the
management traffic.
Question 4
When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum
number of characters that is required in ASCII format?
A. 6
B. 8
C. 12
D. 18
Answer: B
Explanation
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0
1010001.html
Question 5
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?
A. 1,5,10
B. 1,2,3
C. 1,6,11
D. 5,6,7
Answer: C
Explanation
In the 2.4 GHz band, 1, 6, and 11 are the only non-overlapping channels.
Question 6
A wireless administrator has configured a WLAN; however, the clients need access to a less
congested 5-GHz network for their voice quality. What action must be taken to meet the
requirement?
A. enable AAA override
B. enable RX-SOP
C. enable DTIM
D. enable Band Select
Answer: D
Explanation
Band Select or Band Direction is a new feature that encourages dual band clients to connect to 5
G-Hz networks. Band select is disabled by default. The Band Select function provides a better
wireless experience for users.
Question 7
Answer: A
Question 8
Which protocol prompts the Wireless LAN Controller to generate its own local web administration
SSL certificate for GUI access?
A. HTTP
B. HTTPS
C. TACACS+
D. RADIUS
Answer: B
Explanation
When you enable HTTPS, the controller generates its own local web administration SSL certificate
and automatically applies it to the GUI.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-
guide/b_cg80/b_cg80_chapter_011.html
Question 9
What is a recommended approach to avoid co-channel congestion while installing access points
that use the 2.4 GHz frequency?
A. different nonoverlapping channels
B. one nonoverlapping channel
C. one overlapping channel
D. different overlapping channels
Answer: A
Explanation
In the 2.4 GHz band, 1, 6, and 11 are the only non-overlapping channels so they should be chosen
while installing APs.