1.
When using DHCP with LWAP devices, which one of the following is option 43 used for?
Correct Answer
C. To supply the specific WLAN controllers IP address
Explanation
Option 43 is used in DHCP with LWAP devices to supply the specific WLAN controllers IP address. This means that when a LWAP device connects to the network and obtains an IP address through DHCP, it can also receive the IP address of the specific WLAN controller that it should associate with. This allows the LWAP device to establish a connection with the appropriate WLAN controller and join the wireless network.
2.
Which two of the following DHCP messages are always sent as broadcast? (Choose two.)
Correct Answer(s)
B. DHCPDISCOVER
C. DHCPREQUEST
Explanation
The DHCPDISCOVER and DHCPREQUEST messages are always sent as broadcast. DHCPDISCOVER is sent by a client to discover available DHCP servers on the network, and it needs to be sent as a broadcast so that all DHCP servers can receive it. DHCPREQUEST is sent by the client to request a specific IP address from a DHCP server, and again, it needs to be sent as a broadcast so that all DHCP servers can hear the request and respond accordingly.
3.
In the address 172.16.55.87 /20, what does the /20 indicate?
Correct Answer
B. /20 is the prefix length: the first 20 bits are the network address; the remaining 12 bits are the host portion
Explanation
The /20 in the given address indicates the prefix length, where the first 20 bits are the network address and the remaining 12 bits are the host portion.
4.
Which two of the following options are potential problems with a large single broadcast domain? (Choose two.)
Correct Answer(s)
A. Large amounts of broadcast traffic consume resources.
D. It is difficult to apply security policies because there are no boundaries between devices.
Explanation
A large single broadcast domain can lead to potential problems such as consuming excessive network resources due to the high volume of broadcast traffic. This can cause congestion and slow down the network. Additionally, without boundaries between devices, it becomes challenging to apply security policies effectively, leaving the network vulnerable to unauthorized access and potential security breaches.
5.
How many usable subnets and hosts per subnet are available in the 192.168.1.0 network address with a 255.255.255.240 mask?
Correct Answer
D. 16 usable subnets and 14 hosts per subnet
Explanation
The given network address 192.168.1.0 with a 255.255.255.240 mask allows for 16 usable subnets. This is because the subnet mask 255.255.255.240 has 4 bits borrowed from the host portion, which gives us 2^4 = 16 subnets. Each subnet can have 14 hosts, as the remaining 4 bits in the host portion can represent 2^4 - 2 = 14 hosts per subnet.
6.
Which one of the following devices operates strictly at the physical layer?
Correct Answer
B. Hubs
Explanation
Hubs operate strictly at the physical layer. A hub is a networking device that connects multiple devices in a network, allowing them to communicate with each other. It simply receives incoming data packets and broadcasts them to all connected devices without any intelligence or filtering. Hubs do not perform any network routing or make decisions based on IP addresses, making them operate only at the physical layer of the network protocol stack.
7.
Which one of the following options is the main purpose for using spanning tree protocol?
Correct Answer
B. Layer 2 loop prevention protocol
Explanation
The main purpose of using the spanning tree protocol is to prevent layer 2 loops in a network. Layer 2 loops can occur when there are multiple paths between switches, causing broadcast storms and network congestion. The spanning tree protocol helps to identify and disable redundant paths, ensuring that there is only one active path between switches. This prevents loops and improves network stability and performance.
8.
Which one of the following statements is true regarding STP?
Correct Answer
C. STP is used to prevent loops from being formed when switches or bridges are interconnected via multiple paths across the Layer 2 network.
Explanation
STP, or Spanning Tree Protocol, is used to prevent loops from forming in a Layer 2 network when switches or bridges are interconnected via multiple paths. By identifying redundant links and blocking certain paths, STP ensures that there is only one active path between any two network devices, thus preventing broadcast storms and network instability caused by loops. This helps to maintain network reliability and efficiency.
9.
Which two of the following statements are true regarding standalone and lightweight access points? (Choose two.)
Correct Answer(s)
B. Standalone access points can be configured one-by-one and offer complete functionality by themselves.
C. Lightweight access points rely on a central wireless LAN controller to retrieve their configurations.
Explanation
Standalone access points can be configured individually and provide full functionality on their own, while lightweight access points require a central wireless LAN controller to obtain their configurations.