6

Refer to the exhibit. What two facts can be determined from the WLAN diagram? (choose two)A. Access points in each cell must be configured to use channel 1.B. The network diagrm represents an extended servics (ESS).C. The area of overlap of the two cells represents a basic servics set (BSS).D. The area of overlap must be less than 10% of the area to ensure connectivity.E. The two APs should be configured to operate on different channels. Correct B, E Tips and Trik C...
Posted by JUPITER Friday, November 26, 2010 0 comments

5

An administrator is configuring a router that will act as the hub in a frame Realy hub-and-spoke topology. What is the advantage of using point-to-point subinterfaces instead of a multipoint interface on this router?A. It avoids split-horizon issues whith distance vector routing protocols.B. Only one IP network address nedds to be used to communicate with all the spoke device.C. Only a single physical interface is needed with point-to-point subinterfaces, whereas a multipoint interface logically combines multiple physical interface.D....
Posted by JUPITER 0 comments

4

Refer to the exhibit. The two connected ports are not running orange or green. What would be the most effective steps to troubleshoot this physical layer problem? ( choose three) A. Ensure that the Ethernet encapsulations match on the interconnected Router and Switch ports. B. Ensure that cables A and B are staight-through cables.C. Reset all cables.D. Ensure the Switch has power. Correct B, C, D Tips and Trik CCNA...
Posted by JUPITER 0 comments

3

A single 802.11g access point has been configured and installed in the center of a square shape office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. From the list below, what are there likely causes of this problem? ( choose three)A. mismatched TKIP encryption B. null SSID C. cordless phonesD. mismatched SSID E. metal file cabinetsF. antenna type or direction Correct C,E,F Explaination : C : if you have cordless phones or other wireless electronics in your...
Posted by JUPITER Thursday, November 25, 2010 0 comments

2

You are network administrator, in order to improve the security of switching network, refer to the following options. Which two methods are examples of implementing Layer 2 security on a Cisco switch? ( Choose two) A. disable trunk negotiation on the switch. B. use only protected Telnet sessions to connect to the Cisco device. C. configure a switch port host where appropriate. D. enable HTTP access to the switch for security troubleshooting. Correct A, C Explaination : With the popularity and constantly deepening of network...
Posted by JUPITER 0 comments

1

The purpose for setting ACLs on a router are controlling vty access into a router and filtering traffic as it passed through a router. Access Control List (ACL) can be used to affect traffic transmited from one port to another. It acquired its name due to having filtering capability when traffic flows in and out of interface and it also can be used for other purposes, such as :A. Place restrictions on accessing router Telnet (VTY).B....
Posted by JUPITER 0 comments
TELKOMSEL GPRS Setting APN : telkomsel Username : WAP Password : WAP123 WAP Setting Home page : http://wap.telkomsel.com       Data Account : telkomsel Connection type : HTTP Proxy address : 010.001.089.130 Proxy port : 8000 Password : WAP123 MMS Setting APN : mms Username : wap Password : wap123 WAP gateway...
Posted by JUPITER Wednesday, November 24, 2010 0 comments

Subscribe here