1. For which discovery mode will an AP generate the most traffic on a WLAN?

The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.

2. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

The SSID is used to name a wireless network. This parameter is required in order
for a wireless client to attach to a wireless AP.

3. Which two protocols are considered distance vector routing protocols? (Choose two.)

RIP and EIGRP are both considered distance vector routing protocols. OSPF and
ISIS are link-state routing protocols. BGP is a path vector routing protocol.

4. What information does an Ethernet switch examine and use to build its address table?

An Ethernet switch examines the source MAC address of an incoming frame. If the source MAC address is not in the MAC address table, the switch will add it to the table with the associated ingress Ethernet port.

5. Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?

When a router forwards traffic between LAN segments it encapsulates the Layer 2
frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router
encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.

6. At what layer of the OSI model do routers operate?

Routers operate at Layer 3 of the OSI model and forward packets between logical

7. Which wireless parameter refers to the frequency bands used to transmit data to a wireless access point?

An access point can be manually set to a specific frequency band or channel in
order to avoid interference with other wireless devices in the area.

8. What is a role of an intermediary device on a network?

Processes running on the intermediary network devices perform functions like
regenerating and re-transmitting data signals, maintaining information about what pathways exist through the network and internetwork, directing data along alternate pathways when there is a link failure, and permitting or denying the flow of data, based on security settings.

9. What information does an Ethernet switch examine and use to forward a frame?

A switch is a Layer 2 device that uses source MAC addresses to build a MAC
address table (a CAM table) and destination MAC addresses to forward frames.

10. Which device can control and manage a large number of corporate APs?

A wireless LAN controller (WLC) can be configured to manage multiple
lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized managementenvironment.

11. Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

In addition to its roles as router, a typical SOHO wireless router acts as both a
wireless access point and an Ethernet switch. RADIUS authentication is provided by an external server. A WLAN controller is used in enterprise deployments to manage groups of lightweight access points. A repeater is a device that enhances an incoming signal and retransmits it.

12. What technology is used to prevent Layer 2 loops?

The Spanning Tree Protocol (STP), is enabled on switches to prevent Layer 2 loops
from forming when there are redundant physical paths.

13. Which sentence correctly describes the SVI inter-VLAN routing method?

In order to create SVI inter-VLAN routing on a Layer 3 switch, the VLAN must
exist in the database and the SVI must be explicitly created. The only exception is VLAN1,which is created by default.

14. How are IP addressing designs affected by VLAN implementations?

Each VLAN requires its own network number, broadcast address, and valid IP
addresses because each VLAN is a separate network. IP addressing schemes are frequently designed with the VLAN numbers as part of the design.