| Welcome, Guest |
You have to register before you can post on our site.
|
|
|
| AN652 |
|
Posted by: JamesJones - 12-07-2025, 02:44 AM - Forum: Answer this question
- Replies (1)
|
 |
Which two protocols are used by an administrator for authentication and configuration on access points?
Answer says "802.1x, and RADIUS"
Can you please verify.
Answer: - TACACS+
(Terminal Access Controller Access-Control System Plus – used for administrator authentication and authorization for device configuration.)
- RADIUS
(Remote Authentication Dial-In User Service – also used for authentication, commonly for both administrators and wireless clients.)
❗ Why not the others?- Kerberos → Used for secure authentication in Active Directory environments, not typically for AP configuration.
- 802.1Q → VLAN tagging protocol, not for authentication/configuration.
- 802.1X → Used for client authentication (not admin configuration).
thanks,
James
|
|
|
| AND34 |
|
Posted by: JamesJones - 12-07-2025, 02:28 AM - Forum: Answer this question
- Replies (1)
|
 |
Please correct this drap and drop as some of the answers that show as "correct" are wrong.
[*]✅ Correct vs Incorrect:
- Sniffer mode: allows for packet captures of wireless traffic.
✔ Correct – Sniffer mode is used for capturing 802.11 frames for analysis.
- FlexConnect mode: allows the access point to communicate with the WLC over a WAN link.
✔ Correct – FlexConnect is designed for remote sites where APs connect to WLC over WAN.
- Monitor mode: receive only mode which acts as a dedicated sensor for RFID and IDS.
❌ Incorrect – Monitor mode is for detecting rogue APs and IDS scanning, not RFID. It does not serve clients.
- Bridge mode: preferred for connecting access points in a mesh environment.
✔ Correct – Bridge mode is used for mesh APs or point-to-point bridging.
- Local mode: transmits normally on one channel and monitors other channels for noise and interference.
✔ Correct – Local mode serves clients and performs RRM scanning.
- Rogue detector mode: monitor for rogue APs, does not handle data at all.
❌ Incorrect – Rogue detector mode listens for MAC addresses from wired networks to detect rogue APs, not wireless monitoring.
[*]This is what is actually correct:
[*]Monitor mode →
monitor for rogue APs, does not handle data at all
(Used for detecting rogue access points and IDS/IPS scanning.)
[*]Bridge mode →
preferred for connecting access points in a mesh environment
(AP acts as a bridge between two networks, common in mesh setups.)
[*]FlexConnect mode →
allows the access point to communicate with the WLC over a WAN link
(Ideal for remote sites where APs connect to a central WLC over WAN.)
[*]Local mode →
transmits normally on one channel and monitors other channels for noise and interference
(Default mode for APs; serves clients and performs RRM scanning.)
[*]Rogue detector mode →
receive only mode which acts as a dedicated sensor for RFID and IDS
(Used for detecting rogue devices; does not transmit.)
[*]Sniffer mode →
allows for packet captures of wireless traffic
(Captures 802.11 frames for analysis in Wireshark or similar tools.)
|
|
|
| Terraform |
|
Posted by: JamesJones - 12-04-2025, 05:20 AM - Forum: Answer this question
- Replies (2)
|
 |
The new CCNA v1.1 exam has added Terraform but I do not see any Terraform questions in these practice exams.
Please advise.
I also heard that Chef and Puppet were removed and Terraform added.
When was the last update to these questions??
Thanks,
James
|
|
|
| AN393 |
|
Posted by: JamesJones - 12-01-2025, 01:21 AM - Forum: Answer this question
- Replies (1)
|
 |
I believe R1 has a "typo" for the IP address as it says ".255" but the correct answer shows ".225"
Please advise.
Thanks,
James
|
|
|
| AND78 |
|
Posted by: JamesJones - 11-29-2025, 09:14 PM - Forum: Answer this question
- Replies (2)
|
 |
At least one of the drag-and-drop answers is likely wrong.
"Monitor- It enables enhanced RFID-tag location tracking" is wrong.
Answers should be:
Monitor - It provides air-quality data and interference detection across all enabled channels.
- It supports analytics for wireless performance testing.
Sensor- It enables enhanced RFID-tag location tracking.
- It supports real-time Wi-Fi client troubleshooting when network engineers are offsite.
Sniffer- It captures and forwards packets on a specific wireless channel.
- It supports software that analyzes wireless frames on a remote device.
Please verify thanks,
James
|
|
|
| AND84 |
|
Posted by: JamesJones - 11-29-2025, 03:45 AM - Forum: Answer this question
- No Replies
|
 |
Please check this drag-and-drop: specifically, "Allows sites to be combined without address conflicts" should be set to Unique Local, not Global Unicast Address.
Thanks!
James
|
|
|
| AN272 |
|
Posted by: JamesJones - 11-26-2025, 07:43 PM - Forum: Answer this question
- Replies (1)
|
 |
The answer says "Create a JSON fiter as a string and pass it ...."
I believe that is not the correct answer.
The correct answer should be:
" Create an XML filter as a string and pass it to get_config() method as an argument."
Please have a look and advise.
Thanks
James
|
|
|
| AN073 |
|
Posted by: JamesJones - 11-26-2025, 02:46 AM - Forum: Answer this question
- Replies (1)
|
 |
Which type of wireless encryption is used for WPA2 in preshared key mode?
Answer says "AES-256" but that is not part of WPA2.
The answer should be AES-128.
Please check this question and confirm.
Thanks,
James
|
|
|
|