CCNA 3 Chapter 7 V4.0 Answers

1. Which two statements concerning network security are accurate? (Choose two.)

802.11i uses 3DES for encryption.

Open authentication uses no client or AP verification.

The 802.11i protocol is functionally identical to WPA.

802.11i incorporates a RADIUS server for enterprise authentication.

A wireless client first associates with an AP and then authenticates for network access.

 

2. Which installation method will allow connectivity for a new wireless network?

set up WEP on the access point only

set up open access on both the access point and each device connected to it

set up full encryption on the access point while leaving each device connected to the network open

set up full encryption on each device of the WLAN while leaving the access point settings open

 

3. Which function is provided by a wireless access point?

dynamically assigns an IP address to the host

provides local DHCP services

converts data from 802.11 to 802.3 frame encapsulation

provides a gateway for connecting to other networks

 

4. What procedure can prevent man-in-the-middle attacks?

Force all devices on a WLAN to authenticate and monitor for any unknown devices.

Enable access points to send an SSID to each device wanting to use the network.

Configure MAC filtering on all authorized access points.

Disable SSID broadcasts.

 

5. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?

association response

beacon

key

probe request

 

6. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?

authentication

SSID broadcasting

MAC address filtering

EAP (Extensible Authentication Protocol)

Radius (Remote Authentication Dial-In User Service)

 

7. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?

This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.

The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.

Install a new wireless access point in this center area to provide coverage.

Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.

 

8. Which two statements characterize wireless network security? (Choose two.)

A rogue access point represents a security risk for the local network.

Wireless networks offer the same security features as wired networks.

Using encryption prevents unauthorized clients from associating with an access point.

An attacker needs physical access to at least one network device to launch an attack.

With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.

 

9. Which network design process identifies where to place access points?

site survey

risk assessment

scalability design

network protocol analysis

 

10.

CCNA3Chapter7V4.0Answers thumb CCNA 3 Chapter 7 V4.0 Answers
Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?

Network Mode

Network Name (SSID)

Radio Band

Wide Channel

Standard Channel

 

11. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)

802.11a suffers from a shorter range than 802.11g.

The 2.4 GHz frequency band is not as crowded as the 5 GHz band.

802.11a is more susceptible to RF interference from common commercial items.

802.11a uses a more expensive modulation technique than 802.11g.

802.11g is backward compatible with 802.11b, but 802.11a is not.

 

12. What occurs when a rogue access point is added to a WLAN?

Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion.

Unauthorized users can gain access to internal servers, thus causing a security hole.

All traffic that uses the same channel as the rogue access point will be encrypted.

All traffic that uses the same channel as the rogue access point will be required to authenticate.

 

13. In a WLAN network, why should wireless access points be implemented with each access point using a different channel?

to keep users segregated on separate subnets

to control the amount of bandwidth that is utilized

to keep signals from interfering with each other

to keep traffic secure

 

14. Which two statements are true regarding wireless security? (Choose two.)

MAC address filtering prevents the contents of wireless frames from being viewable.

Providing a wireless client with the network key allows an available network to be visible.

Disabling an access point from broadcasting the SSID prevents the access point from being discovered.

Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections.

Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.

 

15. Why is security so important in wireless networks?

Wireless networks are typically slower than wired networks.

Televisions and other devices can interfere with wireless signals.

Wireless networks broadcast data over a medium that allows easy access.

Environmental factors such as thunderstorms can affect wireless networks.

 

16. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance?

802.11a

802.11b

802.11g

802.11n

 

17. Which three devices do many wireless routers incorporate? (Choose three.)

gateway for connecting to other network infrastructures

built-in Ethernet switch

network management station

VTP server

wireless access point

VPN concentrator

 

18. What will a wireless client transmit to discover the available WLAN networks?

beacon

password

probe request

association request

 

19. Which major problem does CSMA/CA overcome in wireless networks?

bandwidth saturation

privacy concerns

media contention

device interoperability

 

20. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?

CSMA/CD

token passing

CSMA/CA

polling

 

21. What purpose does authentication serve in a WLAN?

converts clear text data before transmission

indicates which channel the data should flow on

determines that the correct host is utilizing the network

allows the host to choose which channel to use

ccnaanswers com, ccna 3 chapter 7, on a wireless network in a corporate environment that is using the csma/ca access method how is the successful transmission of data packets by client stations indicated?, a network administrator is designing the wireless network for a law office the security policy requires that the access to the wireless network must be authenticated with the credentials of employees the administrator decides to use the psk2 enterprise au, ccna 3 chapter 7 answers, why are wireless lan networks more vulnerable than wired ethernet networks?, Which statement is true about the SSID configuration of a wireless access point?, ccna chapter 7, ccna answers com, ccna3 chapter 7

27 Responses - Add Yours+

  1. CCNA Student says:

    New questions :

    Q)A network administrator is designing the wireless network for a law office. The security policy requires that the access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the PSK2 Enterprise authentication method. Which server is a requirement to deploy PSK2 Enterprise?
    TFTP
    HTTPS
    RADIUS
    IEEE 802.1x

    Q)Which statement is true about the SSID configuration of a wireless access point?
    The SSID is not case-sensitive.
    The SSID cannot exceed 32 characters.
    An SSID string cannot contain a space.
    Turning off SSID broadcasting makes the wireless network inaccessible.

    Q)Why are wireless LAN networks more vulnerable than wired Ethernet networks?
    Wireless network bandwidth is much slower.
    Wireless networks transmit data over the open space.
    Wireless signals share the same RF frequencies as household devices.
    Wireless networks use the CSMA/CA access method, which is less secure than CSMA/CD.

    Q)A network administrator is deploying three 2.4 GHz access points for the exhibit area of a large car dealer facility. What channel selection can be used on the three access points to avoid signal interference?
    channels 1, 5, 10
    channels 1, 6, 11
    channels 1, 7, 11
    channels 1, 8, 12

    Q)On a wireless network in a corporate environment that is using the CSMA/CA access method, how is the successful transmission of data packets by client stations indicated?
    The access point sends an acknowledgment to the sending client station that data has been received.
    The receiving host sends an acknowledgment to the sending client station that data has been received.
    The sending client monitors the RF energy change while transmitting data packets and making sure no other clients are transmitting data.
    The sending client station monitors the RF energy change for a pre-determined time period after it completes transmitting data to make sure its transmission is successful.

    • Muhammad says:

      A network administrator is designing the wireless network for a law office. The security policy requires that the access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the PSK2 Enterprise authentication method. Which server is a requirement to deploy PSK2 Enterprise?

      TFTP
      HTTPS
      ***RADIUS
      IEEE 802.1x

  2. Student says:

    Answers in the same order

    1) RADIUS
    2) The SSID cannot exceed 32 characters.
    3) Wireless networks transmit data over the open space.
    4) channels 1, 6, 11
    5) The access point sends an acknowledgment to the sending client station that data has been received.

  3. Peter says:

    I have error with this Q…. Why are wireless LAN networks more vulnerable than wired Ethernet networks?

    correct answer is : Wireless signals share the same RF frequencies as household devices.

    • Al says:

      WRONG!!! The answer is NOT “Wireless signals share the same RF frequencies as household devices.” The correct answer is…

      This item references content from the following areas:

      CCNA Exploration: LAN Switching and Wireless

      7.2.1 Threats to Wireless Security

      Why are wireless LAN networks more vulnerable than wired Ethernet networks?
      Wireless network bandwidth is much slower.
      Wireless networks transmit data over the open space.
      Wireless signals share the same RF frequencies as household devices.
      Wireless networks use the CSMA/CA access method, which is less secure than CSMA/CD.

      Observable Description Max Value Earned Value
      2 points for Option 2
      0 points for any other option

  4. Student says:

    Q)A network administrator is designing the wireless network for a law office. The security policy requires that the access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the PSK2 Enterprise authentication method. Which server is a requirement to deploy PSK2 Enterprise?
    TFTP
    HTTPS
    ** RADIUS
    IEEE 802.1x

    Q)Which statement is true about the SSID configuration of a wireless access point?
    The SSID is not case-sensitive.
    ** The SSID cannot exceed 32 characters.
    An SSID string cannot contain a space.
    Turning off SSID broadcasting makes the wireless network inaccessible.

    Q)Why are wireless LAN networks more vulnerable than wired Ethernet networks?
    Wireless network bandwidth is much slower.
    ** Wireless networks transmit data over the open space.
    Wireless signals share the same RF frequencies as household devices.
    Wireless networks use the CSMA/CA access method, which is less secure than CSMA/CD.

    Q)A network administrator is deploying three 2.4 GHz access points for the exhibit area of a large car dealer facility. What channel selection can be used on the three access points to avoid signal interference?
    channels 1, 5, 10
    ** channels 1, 6, 11
    channels 1, 7, 11
    channels 1, 8, 12

    Q)On a wireless network in a corporate environment that is using the CSMA/CA access method, how is the successful transmission of data packets by client stations indicated?
    ** The access point sends an acknowledgment to the sending client station that data has been received.
    The receiving host sends an acknowledgment to the sending client station that data has been received.
    The sending client monitors the RF energy change while transmitting data packets and making sure no other clients are transmitting data.
    The sending client station monitors the RF energy change for a pre-determined time period after it completes transmitting data to make sure its transmission is successful.

    Percentage:

  5. ok says:

    Which statement is true about the SSID configuration of a wireless access point?
    The SSID is not case-sensitive.
    The SSID cannot exceed 32 characters.
    An SSID string cannot contain a space.
    Turning off SSID broadcasting makes the wireless network inaccessible.

  6. ok says:

    Which statement is true about the SSID configuration of a wireless access point?
    The SSID is not case-sensitive.
    The SSID cannot exceed 32 characters.
    An SSID string cannot contain a space.
    Turning off SSID broadcasting makes the wireless network inaccessible

  7. francis says:

    Which function is provided by a wireless access point?

    dynamically assigns an IP address to the host

    provides local DHCP services

    ====converts data from 802.11 to 802.3 frame encapsulation

    provides a gateway for connecting to other networks

  8. Need-Help says:

    Which statement is true about the SSID configuration of a wireless access point?
    -The SSID is not case-sensitive.
    **-The SSID cannot exceed 32 characters.**
    -An SSID string cannot contain a space.
    **-Turning off SSID broadcasting makes the wireless network inaccessible**

    What is the true answer?

    ** The SSID cannot exceed 32 characters.**

    ** Turning off SSID broadcasting makes the wireless network inaccessible**

  9. Mark says:

    Confirmed 100%, Dec 8th, 2012, using all answers given above as well as these addon questions & answers:

    New questions :

    Q)A network administrator is designing the wireless network for a law office. The security policy requires that the access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the PSK2 Enterprise authentication method. Which server is a requirement to deploy PSK2 Enterprise?
    TFTP
    HTTPS
    RADIUS
    IEEE 802.1x

    Q)Which statement is true about the SSID configuration of a wireless access point?
    The SSID is not case-sensitive.
    The SSID cannot exceed 32 characters.
    An SSID string cannot contain a space.
    Turning off SSID broadcasting makes the wireless network inaccessible.

    Q)Why are wireless LAN networks more vulnerable than wired Ethernet networks?
    Wireless network bandwidth is much slower.
    Wireless networks transmit data over the open space.
    Wireless signals share the same RF frequencies as household devices.
    Wireless networks use the CSMA/CA access method, which is less secure than CSMA/CD.

    Q)A network administrator is deploying three 2.4 GHz access points for the exhibit area of a large car dealer facility. What channel selection can be used on the three access points to avoid signal interference?
    channels 1, 5, 10
    channels 1, 6, 11
    channels 1, 7, 11
    channels 1, 8, 12

    Q)On a wireless network in a corporate environment that is using the CSMA/CA access method, how is the successful transmission of data packets by client stations indicated?
    The access point sends an acknowledgment to the sending client station that data has been received.
    The receiving host sends an acknowledgment to the sending client station that data has been received.
    The sending client monitors the RF energy change while transmitting data packets and making sure no other clients are transmitting data.
    The sending client station monitors the RF energy change for a pre-determined time period after it completes transmitting data to make sure its transmission is successful.

    Answers in the same order

    1) RADIUS
    2) The SSID cannot exceed 32 characters.
    3) Wireless networks transmit data over the open space.
    4) channels 1, 6, 11
    5) The access point sends an acknowledgment to the sending client station that data has been received.

    Thanks so much for making the help available!

  10. enstein says:

    100 % Right

  11. rad says:

    9.Why are wireless LAN networks more vulnerable than wired Ethernet networks?

    Correct answer fot 100% that:

    Wireless networks transmit data over the open space.

  12. Mike Bordo says:

    New Question 6/26/2013

    Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?

    1This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
    2The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.
    3Install a new wireless access point in this center area to provide coverage.
    4Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.

  13. Jason Reyes says:

    4
    Which statement is true about the SSID configuration of a wireless access point?
    The SSID is not case-sensitive.
    >> The SSID cannot exceed 32 characters.
    An SSID string cannot contain a space.
    Turning off SSID broadcasting makes the wireless network inaccessible.

    6
    Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?
    >> This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
    The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.
    Install a new wireless access point in this center area to provide coverage.
    Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.

    7
    Which three devices do many wireless routers incorporate? (Choose three.)
    >> gateway for connecting to other network infrastructures
    >> built-in Ethernet switch
    network management station
    VTP server
    >> wireless access point
    VPN concentrator

    This item references content from the following areas:

    CCNA Exploration: LAN Switching and Wireless

    7.1.3 Wireless Infrastructure Components

    8
    On a wireless network in a corporate environment that is using the CSMA/CA access method, how is the successful transmission of data packets by client stations indicated?
    >>> The access point sends an acknowledgment to the sending client station that data has been received. <<<<<>> Wireless networks transmit data over the open space. <<<<<<>> channels 1, 6, 11
    channels 1, 7, 11
    channels 1, 8, 12

    16
    A network administrator is designing the wireless network for a law office. The security policy requires that the access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the PSK2 Enterprise authentication method. Which server is a requirement to deploy PSK2 Enterprise?
    TFTP
    HTTPS
    >>>> RADIUS
    IEEE 802.1x

  14. john says:

    This is new CCNA 3 Chapter 7 Exam 2014

    1-Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?
    Add the IPv6 address 2001:DB8:1234:5678::10/64 to the interface configuration of the DHCPv6 server.
    Configure the ipv6 nd managed-config-flag command on interface Fa0/1.
    Change the ipv6 nd managed-config-flag command to ipv6 nd other-config-flag.
    Add the ipv6 dhcp relay command to interface Fa0/0.*
    2-What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process?
    for routers to fill their routing tables with this new information
    to notify other hosts not to request the same IP address
    to notify other DHCP servers on the subnet that the IP address was leased*
    for hosts on other subnets to receive the information
    3-A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?
    FF-FF-FF-FF-FF-FF and 255.255.255.255*
    MAC address of the DHCP server and 255.255.255.255
    FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
    both MAC and IPv4 addresses of the DHCP server
    4-Fill in the blank. Do not abbreviate.
    Type a command to exclude the first fifteen useable IP addresses from a DHCPv4 address pool of the network 10.0.15.0/24.
    Router(config)# ip dhcp ” excluded-address 10.0.15.1 10.0.15.15”
    5-Place the options in the following order:
    [+] enabled in RA messages with the ipv6 nd other-config-flag command
    [+] clients send only DHCPv6 INFORMATION-REQUEST messages to the server
    [+] enabled on the client with the ipv6 address autoconfig command
    [#] the M flag is set to 1 in RA messages
    [#] uses the address command to create a pool of addresses for clients
    [#] enabled on the client with the ipv6 address dhcp command
    6-Refer to the exhibit. A network administrator is implementing stateful DHCPv6 operation for the company. However, the clients are not using the prefix and prefix-length information that is configured in the DHCP pool. The administrator issues a show ipv6 interface command. What could be the cause of the problem?
    The router is configured for stateless DHCPv6 operation.*
    No virtual link-local address is configured.
    The router is configured for SLAAC DHCPv6 operation.
    The Duplicate Address Detection feature is disabled.
    7-A network engineer is troubleshooting hosts on a LAN that are not being assigned an IPv4 address from a DHCP server after a new Ethernet switch has been installed on the LAN. The configuration of the DHCP server has been confirmed as correct and the clients have network connectivity to other networks if a static IP address is configured on each one. What step should the engineer take next to solve the issue?
    Issue the ipconfig/release command on each client.
    Issue the show ip dhcp binding command on the switch.
    Issue the show interface command on the router to confirm that the LAN gateway is operational.
    Confirm that ports on the Layer 2 LAN switch are configured as edge ports.*
    8-A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?
    It should use the information that is contained in the RA message exclusively.
    It should contact a DHCPv6 server for the prefix, the prefix-length information, and an interface ID that is both random and unique.
    It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.*
    It should contact a DHCPv6 server for all the information that it needs.
    9-Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?
    UDP
    ICMPv6*
    ARPv6
    DHCPv6
    10-A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?
    Clients must use the prefix and prefix length that are provided by a DHCPv6 server and generate a random interface ID.
    Clients must use the information that is contained in RA messages.
    Clients must use the prefix and prefix length that are provided by RA messages and obtain additional information from a DHCPv6 server.
    Clients must use all configuration information that is provided by a DHCPv6 server.*
    11-Under which two circumstances would a router usually be configured as a DHCPv4 client? (Choose two.)
    The router is meant to provide IP addresses to the hosts.
    The router has a fixed IP address.
    The router is intended to be used as a SOHO gateway.*
    The administrator needs the router to act as a relay agent.
    This is an ISP requirement.*
    12-A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?
    the unique local address of the router interface that is attached to the network
    the global unicast address of the router interface that is attached to the network
    the link-local address of the router interface that is attached to the network*
    the all-routers multicast address
    13-Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?
    static link-local
    stateful DHCPv6
    stateless DHCPv6*
    SLAAC
    14-A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After a workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information?
    DHCPv6 INFORMATION-REQUEST*
    DHCPv6 ADVERTISE
    DHCPv6 REQUEST
    DHCPv6 SOLICIT
    15-An administrator issues the commands:
    Router(config)# interface g0/1
    Router(config-if)# ip address dhcp
    What is the administrator trying to achieve?
    configuring the router to obtain IP parameters from a DHCPv4 server*
    configuring the router to act as a relay agent
    configuring the router to resolve IP address conflicts
    configuring the router to act as a DHCPv4 server
    16-Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment?
    dhcp pool LAN-POOL-100
    ip dhcp excluded-address 192.168.100.1 192.168.100.9
    ip dhcp excluded-address 192.168.100.254
    network 192.168.100.0 255.255.254.0
    default-router 192.168.101.1
    ip dhcp excluded-address 192.168.100.1 192.168.100.9
    ip dhcp excluded-address 192.168.101.254
    ip dhcp pool LAN-POOL-100
    ip network 192.168.100.0 255.255.254.0
    ip default-gateway 192.168.100.1
    ip dhcp excluded-address 192.168.100.1 192.168.100.10
    ip dhcp excluded-address 192.168.101.254
    ip dhcp pool LAN-POOL-100
    network 192.168.100.0 255.255.254.0
    default-router 192.168.100.1 ************************
    ip dhcp excluded-address 192.168.100.1 192.168.100.10
    ip dhcp excluded-address 192.168.100.254
    ip dhcp pool LAN-POOL-100
    network 192.168.100.0 255.255.255.0
    ip default-gateway 192.168.100.1
    17-Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?
    broadcast DHCPACK
    unicast DHCPACK
    broadcast DHCPREQUEST*
    unicast DHCPREQUEST
    18-Launch PT Hide and Save PT
    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
    How many IP addresses has the DHCP server leased and what is the number of DHCP pools configured? (Choose two.)
    one pool*
    three leases*
    two pools
    six pools
    seven leases
    five leases
    19-Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?
    The DNS server address is not on the same network as the clients are on.
    The clients cannot communicate with the DHCPv6 server, evidenced by the number of active clients being 0.
    The GigabitEthernet interface is not activated.
    The router is configured for SLAAC DHCPv6 operation.*
    20-A host on the 10.10.100.0/24 LAN is not being assigned an IPv4 address by an enterprise DHCP server with the address 10.10.200.10/24. What is the best way for the network engineer to resolve this problem?
    Issue the command ip helper-address 10.10.100.0 on the router interface that is the 10.10.200.0/24 gateway.
    Issue the command default-router 10.10.200.10 at the DHCP configuration prompt on the 10.10.100.0/24 LAN gateway router.
    Issue the command ip helper-address 10.10.200.10 on the router interface that is the 10.10.100.0/24 gateway.*
    Issue the command network 10.10.200.0 255.255.255.0 at the DHCP configuration prompt on the 10.10.100.0/24 LAN gateway router.
    21-Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?
    pre-allocation
    manual allocation
    automatic allocation
    dynamic allocation*
    22-Place the options in the following order:
    [+] Step 2
    [+] Step 1
    – not scored –
    [+] Step 3
    – not scored –
    [+] Order does not matter within this group.
    23-An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?
    RA and EUI-64
    stateful DHCPv6
    stateless DHCPv6*
    SLAAC
    24-A company uses the method SLAAC to configure IPv6 addresses for the workstations of the employees. A network administrator configured the IPv6 address on the LAN interface of the router. The interface status is UP. However, the workstations on the LAN segment did not obtain the correct prefix and prefix length. What else should be configured on the router that is attached to the LAN segment for the workstations to obtain the information?
    R1(config-if)# ipv6 nd other-config-flag
    R1(config-if)# ipv6 enable
    R1(config)# ipv6 dhcp pool
    R1(config)# ipv6 unicast-routing*

Leave a Reply