CCNA3 Chapter 4 Exam (v5.03) 2016

Last Updated on April 24, 2018 by Admin

CCNA3 Chapter 4 Exam Answer v5.03 2016

From year to year, Cisco has updated many versions with difference questions. The latest version is version 6.0 in 2018. What is your version? It depends on your instructor creating your class. We recommend you to go thought all version if you are not clear. While you take online test with netacad.com, You may get random questions from all version. Each version have 1 to 10 different questions or more. After you review all questions, You should practice with our online test system by go to "Online Test" link below.

Version 5.02 Version 5.03 Version 6.0 Online Assessment
Chapter 4 Exam Chapter 4 Exam Chapter 4 Exam Online Test
Next Chapter
Chapter 5 Exam Chapter 5 Exam Chapter 5 Exam Online Test  
Lab Activities
 4.2.1.3 Packet Tracer – Configuring EtherChannel
 4.2.2.3 Packet Tracer – Troubleshooting EtherChannel
 4.3.4.4 Packet Tracer – Troubleshoot HSRP
 4.4.1.2 Packet Tracer – Skills Integration Challenge
  1. Which IEEE wireless standard is known as WiGig and operates using a tri-band solution in the 2.4, 5, and 60 GHz ranges?

    • 802.11g
    • 802.11n
    • 802.11ac
    • 802.11ad
  2. Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

    • repeater
    • access point
    • WLAN controller
    • Ethernet switch
    • RADIUS authentication server
  3.  

  4. Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?

    • SPS
    • WPS
    • MIMO
    • MITM  
  5. A supervisor needs wireless access in the construction office during the construction of a new building. The construction office is in the new building and directly across the road from headquarters. What could be used to satisfy this requirement of needing a narrow area of coverage?

    • multiple MIMO antennas
    • omnidirectional
    • rubber duck
    • Yagi
  6. Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?

    • IBISS
    • BSS
    • WiFi Direct
    • ESS
    • ad hoc WLAN
  7.  

  8. Which statement defines the control frame operation between two stations?

    • A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.
    • A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.
    • If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection.
    • After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.
  9. A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?

    • beacon frame
    • control frame
    • data frame
    • management frame
  10. During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP?

    • discovery
    • probing
    • association
    • encryption
    • authentication
  11. For which discovery mode will an AP generate the most traffic on a WLAN?

    • passive mode
    • open mode
    • mixed mode
    • active mode
  12.  

  13. What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment?

    • It allows a client to detect whether or not a channel is clear prior to transmission.
    • It is used in a full-duplex environment to detect collisions.
    • It is used to send data over a half-duplex connection.
    • It allows the client to change transmission channels.
  14. What is an advantage of SSID cloaking?

    • It provides free Internet access in public locations where knowing the SSID is of no concern.
    • Clients will have to manually identify the SSID to connect to the network.
    • SSIDs are very difficult to discover because APs do not broadcast them.
    • It is the best way to secure a wireless network.
  15. If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)

    • 1
    • 3
    • 5
    • 6
    • 8
    • 11
  16. Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)

    • 802.11a
    • 802.11b
    • 802.11g
    • 802.11n
    • 802.11ac
  17.  

  18. An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

    • cracking
    • denial of service
    • rogue access point
    • spoofing
  19. Which security mode is the least secure choice when a home wireless router is configured?

    • WPA
    • WPA2
    • WEP
    • WPA2-Personal
  20. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

    • ad hoc
    • BESS
    • ESS
    • SSID
  21. A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

    • Replace the wireless NICs on the computers that are experiencing slow connections.
    • Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
    • Disable DHCP on the access point and assign static addresses to the wireless clients.
    • Upgrade the firmware on the wireless access point.
  22. Fill in the blank. Do not use abbreviations.
    Ad hoc wireless topologies sometimes can use a feature called  tethering to enable a smartphone to create a personal hotspot.

  23. Fill in the blank.
    A network administrator discovers a rogue AP in the network. The rogue AP is capturing traffic and then forwarding it on to the legitimate AP. This type of attack is known as a   man-in -the -middle   attack.

  24. Fill in the blank. Use the acronym.

    Which encryption protocol is used by the WPA2 shared key authentication technique?   AES

  25. Place the following actions in the order in which they occur in a shared key authentication process. (Not all options are used.)

    • Question

      CCNA3 Chapter 4 v5.03 Question 001

      CCNA3 Chapter 4 v5.03 Question 001

    • Answer

      CCNA3 Chapter 4 v5.03 Answer 001

      CCNA3 Chapter 4 v5.03 Answer 001

  26. Match the type of attack to its description. (Not all options are used.)

    • Question

      CCNA3 Chapter 4 v5.03 Question 002

      CCNA3 Chapter 4 v5.03 Question 002

    • Answer

      CCNA3 Chapter 4 v5.03 Answer 002

      CCNA3 Chapter 4 v5.03 Answer 002

  27. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    What is the SSID of the connected network and which message is displayed in the browser window?

    • SSID: Home-Net
      Message:Congratulations! You were able to connect it!
    • SSID: Home-Network
      Message: Good job!
    • SSID: Home-Network
      Message: Well done!
    • SSID: Home-Net
      Message:Congratulations! You did it!

From year to year, Cisco has updated many versions with difference questions. The latest version is version 6.0 in 2018. What is your version? It depends on your instructor creating your class. We recommend you to go thought all version if you are not clear. While you take online test with netacad.com, You may get random questions from all version. Each version have 1 to 10 different questions or more. After you review all questions, You should practice with our online test system by go to "Online Test" link below.

Version 5.02 Version 5.03 Version 6.0 Online Assessment
Chapter 4 Exam Chapter 4 Exam Chapter 4 Exam Online Test
Next Chapter
Chapter 5 Exam Chapter 5 Exam Chapter 5 Exam Online Test  
Lab Activities
 4.2.1.3 Packet Tracer – Configuring EtherChannel
 4.2.2.3 Packet Tracer – Troubleshooting EtherChannel
 4.3.4.4 Packet Tracer – Troubleshoot HSRP
 4.4.1.2 Packet Tracer – Skills Integration Challenge