ccna-discovery-4.blogspot.com
ccna discovery 2 chapter 8 v4.1
1. Which AAA service reduces IT operating costs by providing detailed
reporting and monitoring of network user behavior, and also by keeping a
record of every access connection and device configuration change across
the network?
authentication
accreditation
**accounting
authorization
2. Which three items are normally included when a log message is
generated by a syslog client and forwarded to a syslog server? (Choose
three.)
**date and time of message
**ID of sending device
length of message
**message ID
checksum field
community ID
3. What is the advantage of using WPA to secure a wireless network?
It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless
access.
**It uses an advanced encryption key that is never transmitted between host and
access point.
It is supported on older wireless hardware, thus providing maximum compatibility
with enterprise equipment.
It requires the MAC address of a network device that is requesting wireless access to
be on a list of approved MAC addresses.
Read more
ccna discovery, ccna discovery exam, ccna discovery
course, ccna discovery answers, ccna discovery lab, ccna
discovery v4.0, ccna discovery 1, ccna discovery 2, ccna
discovery 3, ccna discovery 4, ccna discovery curriculum,
ccna discovery chapter 5, ccna discovery chapter 6, ccna
discovery 4.1, ccna discovery chapter, ccna discovery v4