Selasa, 26 Juni 2012
Selasa, 19 Juni 2012
Evaluasi CCNA Discovery 1 Chapter 7
1.
Why is IEEE 802.11 wireless technology able to transmit further
distances than Bluetooth technology?
|
transmits at
much lower frequencies
|
|
has
higher power output
|
|
transmits at
much higher frequencies
|
|
uses better
encryption methods
|
2.
What are three advantages of wireless over wired technology?
|
more secure ,
longer range and anytime, anywhere connectivity
|
|
anytime,
anywhere connectivity , easy and inexpensive to install and ease
of using licensed air space
|
|
longer
range , easy and inexpensive to install and ease of adding
additional devices
|
|
anytime,
anywhere connectivity , easy and inexpensive to install and ease
of adding additional devices
|
3.
What are two benefits of wireless networking over wired networking?
|
speed and
security
|
|
security and
mobility
|
|
mobility
and reduced installation time
|
|
reduced
installation time and allows users to share more resources
|
4.
A technician has been asked to provide wireless connectivity to the
wired Ethernet network of a building. Which three factors affect the
number of access points needed?
|
the
size of the building, the number of solid interior walls in the
building and the presence of microwave ovens in several offices
|
|
the size of
the building, the encryption method used on the wireless network
and the use of both Windows and Appletalk operating systems
|
|
the use of
both Windows and Appletalk operating systems , the number of solid
interior walls in the building and the use of shortwave or
infrared on the AP
|
|
the use of
shortwave or infrared on the AP , the presence of microwave ovens
in several offices and the number of solid interior walls in the
building
|
5.
Why is security so important in wireless networks?
|
Wireless
networks are typically slower than wired networks.
|
|
Televisions
and other devices can interfere with wireless signals.
|
|
Wireless
networks broadcast data over a medium that allows easy access.
|
|
Environmental
factors such as thunderstorms can affect wireless networks.
|
6.
What does the Wi-Fi logo indicate about a wireless device?
|
IEEE has
approved the device.
|
|
The device is
interoperable with all other wireless standards.
|
|
The
device is interoperable with other devices of the same standard
that also display the Wi-Fi logo.
|
|
The device is
backwards compatible with all previous wireless standards.
|
7.
Which statement is true concerning wireless bridges?
|
connects
two networks with a wireless link
|
|
stationary
device that connects to a wireless LAN
|
|
allows
wireless clients to connect to a wired network
|
|
increases the
strength of a wireless signal
|
8.
Which WLAN component is commonly referred to as an STA?
|
cell
|
|
antenna
|
|
access point
|
|
wireless
bridge
|
|
wireless
client
|
9.
Which statement is true concerning an ad-hoc wireless network?
|
created
by connecting wireless clients in a peer-to-peer network
|
|
created by
connecting wireless clients to a single, centralized AP
|
|
created by
connecting multiple wireless basic service sets through a
distribution system
|
|
created by
connecting wireless clients to a wired network using an ISR
|
10.
Refer to the graphic. In the Wireless menu option of a Linksys
integrated router, what does the Network Mode option Mixed mean?
|
The router
supports encryption and authentication.
|
|
The router
supports both wired and wireless connections.
|
|
The
router supports 802.11b, 802.11g, and 802.11n devices.
|
|
The router
supports connectivity through infrared and radio frequencies.
|
11.
Refer to the graphic. In the Wireless menu of a Linksys integrated
router, what configuration option allows the presence of the access
point to be known to nearby clients?
|
Network Mode
|
|
Network Name
(SSID)
|
|
Radio Band
|
|
Wide Channel
|
|
Standard
Channel
|
|
SSID
Broadcast
|
12.
Which two statements about a service set identifier (SSID) are true?
|
tells a
wireless device to which WLAN it belongs and consists of a
32-character string and is not case sensitive
|
|
responsible
for determining the signal strength and all wireless devices on
the same WLAN must have the same SSID
|
|
all wireless
devices on the same WLAN must have the same SSID and used to
encrypt data sent across the wireless network
|
|
tells
a wireless device to which WLAN it belongs and all wireless
devices on the same WLAN must have the same SSID
|
13.
Which two statements characterize wireless network security?
|
|
|
|
|
|
|
|
14.
What type of authentication do most access points use by default?
|
Open
|
|
PSK
|
|
WEP
|
|
EAP
|
15.
Which statement is true about open authentication when it is enabled
on an access point?
|
requires
no authentication
|
|
uses a 64-bit
encryption algorithm
|
|
requires the
use of an authentication server
|
|
requires a
mutually agreed upon password
|
16.
What are two authentication methods that an access point could use?
|
WEP and WPA
|
|
WPA and EAP
|
|
EAP and ASCII
|
|
EAP
and pre-shared keys
|
|
Pre-shared
keys and ASCII
|
17.
What is the difference between using open authentication and
pre-shared keys?
|
Open
authentication requires a password. Pre-shared keys do not require
a password.
|
|
Open
authentication is used with wireless networks. Pre-shared keys are
used with wired networks.
|
|
Pre-shared
keys require an encrypted secret word. Open authentication does
not require a secret word.
|
|
Pre-shared
keys require a MAC address programmed into the access point. Open
authentication does not require this programming.
|
18.
What term describes the encoding of wireless data to prevent
intercepted data from being read by a hacker?
|
address
filtering
|
|
authentication
|
|
broadcasting
|
|
encryption
|
|
passphrase
encoding
|
19.
What access-point feature allows a network administrator to define
what type of data can enter the wireless network?
|
encryption
|
|
hacking block
|
|
traffic
filtering
|
|
MAC address
filtering
|
|
authentication
|
20.
What are the two WEP key lengths? (Choose two.)
|
|
|
|
|
|
|
|
21.
Complete the following sentence: WEP is used to ______ , and EAP is
used to _____ wireless networks.
|
encrypt;
authenticate users on
|
|
filter
traffic; select the operating frequency for
|
|
identify the
wireless network; compress data on
|
|
create the
smallest wireless network; limit the number of users on
|
Diposting oleh Penghuni B44 0 komentar
Selasa, 05 Juni 2012
Subnetting Berdasarkan Nilai CIDR
- Subnetting Kelas A
Subnet
Mask
|
Biner
|
Nilai
CIDR
|
255.0.0.0
|
11111111.00000000.00000000.00000000
|
/8
|
255.128.0.0
|
11111111.10000000.00000000.00000000
|
/9
|
255.192.0.0
|
11111111.11000000.00000000.00000000
|
/10
|
255.224.0.0
|
11111111.11100000.00000000.00000000
|
/11
|
255.240.0.0
|
11111111.11110000.00000000.00000000
|
/12
|
255.248.0.0
|
11111111.11111000.00000000.00000000
|
/13
|
255.252.0.0
|
11111111.11111100.00000000.00000000
|
/14
|
255.254.0.0
|
11111111.11111110.00000000.00000000
|
/15
|
Perhitungan:
- Nilai CIDR: /8
- Jumlah Network/Broadcast = 2x = 20 = 1 network/broadcast
- Jumlah Host = 2y - 2 = 224 – 2 = 16.777.214 host
- Nilai CIDR: /9
- Jumlah Network/Broadcast = 2x = 21 = 2 network/broadcast
- Jumlah Host = 2y - 2 = 223 – 2 = 8.388.606 host
- Nilai CIDR: /10
- Jumlah Network/Broadcast = 2x = 22 = 4 network/broadcast
- Jumlah Host = 2y - 2 = 222 – 2 = 4.194.302 host
- Nilai CIDR: /11
- Jumlah Network/Broadcast = 2x = 23 = 8 network/broadcast
- Jumlah Host = 2y - 2 = 221 – 2 = 2.097.150 host
- Nilai CIDR: /12
- Jumlah Network/Broadcast = 2x = 24 = 16 network/broadcast
- Jumlah Host = 2y - 2 = 220 – 2 = 1.048.574 host
- Nilai CIDR: /13
- Jumlah Network/Broadcast = 2x = 25 = 32 network/broadcast
- Jumlah Host = 2y - 2 = 219 – 2 = 524.286 host
- Nilai CIDR: /14
- Jumlah Network/Broadcast = 2x = 26 = 64 network/broadcast
- Jumlah Host = 2y - 2 = 218 – 2 = 262.142 host
- Nilai CIDR: /15
- Jumlah Network/Broadcast = 2x = 27 = 128 network/broadcast
- Jumlah Host = 2y - 2 = 217 – 2 = 131.070 host
- Subnetting Kelas BSubnet MaskBinerNilai CIDR255.255.0.011111111.1111111.00000000.00000000/16255.255.128.011111111.1111111.10000000.00000000/17255.255.192.011111111.1111111.11000000.00000000/18255.255.224.011111111.1111111.11100000.00000000/19255.255.240.011111111.1111111.11110000.00000000/20255.255.248.011111111.1111111.11111000.00000000/21255.255.252.011111111.1111111.11111100.00000000/22255.255.254.011111111.1111111.11111110.00000000/23
- Nilai CIDR: /16
- Jumlah Network/Broadcast = 2x = 20 = 1 network/broadcast
- Jumlah Host = 2y - 2 = 216 – 2 = 65534 host
- Nilai CIDR: /17
- Jumlah Network/Broadcast = 2x = 21 = 2 network/broadcast
- Jumlah Host = 2y - 2 = 215 – 2 = 32766 host
- Nilai CIDR: /18
- Jumlah Network/Broadcast = 2x = 22 = 4 network/broadcast
- Jumlah Host = 2y - 2 = 214 – 2 = 16382 host
- Nilai CIDR: /19
- Jumlah Network/Broadcast = 2x = 23 = 8 network/broadcast
- Jumlah Host = 2y - 2 = 213 – 2 = 8190 host
- Nilai CIDR: /20
- Jumlah Network/Broadcast = 2x = 24 = 16 network/broadcast
- Jumlah Host = 2y - 2 = 212 – 2 = 4094 host
- Nilai CIDR: /21
- Jumlah Network/Broadcast = 2x = 25 = 32 network/broadcast
- Jumlah Host = 2y - 2 = 211 – 2 = 2046 host
- Nilai CIDR: /22
- Jumlah Network/Broadcast = 2x = 26 = 64 network/broadcast
- Jumlah Host = 2y - 2 = 210 – 2 = 1022 host
- Nilai CIDR: /23
- Jumlah Network/Broadcast = 2x = 27 = 128 network/broadcast
- Jumlah Host = 2y - 2 = 29 – 2 = 510 host
- Subnetting Kelas CSubnet MaskBinerNilai CIDR255.255.255.011111111.1111111.00000000.00000000/24255.255.255.12811111111.1111111.1111111.10000000/25255.255.255.19211111111.1111111.1111111.11000000/26255.255.255.22411111111.1111111.1111111.11100000/27255.255.255.24011111111.1111111.1111111.11110000/28255.255.255.24811111111.1111111.1111111.11111000/29255.255.255.25211111111.1111111.1111111.11111100/30
- Nilai CIDR: /24
- Jumlah Network/Broadcast = 2x = 20 = 1 network/broadcast
- Jumlah Host = 2y - 2 = 28 – 2 = 254 host
- Nilai CIDR: /25
- Jumlah Network/Broadcast = 2x = 21 = 2 network/broadcast
- Jumlah Host = 2y - 2 = 27 – 2 = 126 host
- Nilai CIDR: /26
- Jumlah Network/Broadcast = 2x = 22 = 4 network/broadcast
- Jumlah Host = 2y - 2 = 26 – 2 = 62 host
- Nilai CIDR: /27
- Jumlah Network/Broadcast = 2x = 23 = 8 network/broadcast
- Jumlah Host = 2y - 2 = 25 – 2 = 30 host
- Nilai CIDR: /28
- Jumlah Network/Broadcast = 2x = 24 = 16 network/broadcast
- Jumlah Host = 2y - 2 = 24 – 2 = 14 host
- Nilai CIDR: /29
- Jumlah Network/Broadcast = 2x = 25 = 32 network/broadcast
- Jumlah Host = 2y - 2 = 23 – 2 = 6 host
- Nilai CIDR: /30
- Jumlah Network/Broadcast = 2x = 26 = 64 network/broadcast
- Jumlah Host = 2y - 2 = 22 – 2 = 2 host
Jumlah
network dengan jumlah broadcast harus sama, sehingga hasilnya sebagai
berikut:
-
Nilai CIDRNilai Subnet MaskJumlah NetworkJumlah Host yang ValidJumlah Broadcast/8255.0.0.01167772141/9255.128.0.0283886062/10255.192.0.0441943024/11255.224.0.0820971508/12255.240.0.016104857416/13255.248.0.03252428632/14255.252.0.06426214264/15255.254.0.0128131070128/16255.255.0.01655341/17255.255.128.02327662/18255.255.192.04163824/19255.255.224.0881908/20255.255.240.016409416/21255.255.248.032204632/22255.255.252.064102264/23255.255.254.0128510128/24255.255.255.012541/25255.255.255.12821262/26255.255.255.1924624/27255.255.255.2248308/28255.255.255.240161416/29255.255.255.24832632/30255.255.255.25264264
Diposting oleh Penghuni B44 0 komentar
Langganan:
Postingan (Atom)