http://ccna-exploration-4.blogspot.com/
http://ccna-exploration-4.blogspot.com/
CCNA 1 Module 1 V4.0
CCNA 1 Module 2 V4.0
CCNA 1 Module 3 V4.0
CCNA 1 Module 4 V4.0
CCNA 1 Module 5 V4.0
CCNA 1 Module 6 V4.0
CCNA 1 Module 7 V4.0
CCNA 1 Module 8 V4.0
CCNA 1 Module 9 V4.0
CCNA 1 Module 10 V4.0
CCNA 1 Module 11 V4.0
CCNA 1 Final V4.0
CCNA 2 Module 1 V4.0
CCNA 2 Module 2 V4.0
CCNA 2 Module 3 V4.0
CCNA 2 Module 4 V4.0
CCNA 2 Module 5 V4.0
CCNA 2 Module 6 V4.0
CCNA 2 Module 7 V4.0
CCNA 2 Module 8 V4.0
CCNA 2 Module 9 V4.0
CCNA 2 Module 10 V4.0
CCNA 2 Module 11 V4.0
CCNA 2 Final 1 V4.0
CCNA 2 Final 2 V4.0
CCNA 3 Module 1 V4.0
CCNA 3 Module 2 V4.0
CCNA 3 Module 3 V4.0
CCNA 3 Module 4 V4.0
CCNA 3 Module 5 V4.0
CCNA 3 Module 6 V4.0
CCNA 3 Module 7 V4.0
CCNA 3 Final 1 V4.0
CCNA 3 Final 2 V4.0
CCNA 4 Module 1 V4.0
CCNA 4 Module 2 V4.0
CCNA 4 Module 3 V4.0
CCNA 4 Module 4 V4.0
CCNA 4 Module 5 V4.0
CCNA 4 Module 6 V4.0
CCNA 4 Module 7 V4.0
CCNA 4 Module 8 V4.0
CCNA 4 Final 1 V4.0
CCNA 4 Final 2 V4.0
CCNA 4 Final 3 V4.0
CCNA 4 Final 4 V4.0
1. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
• 802.11a suffers from a shorter range than 802.11g.
The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
802.11a is more susceptible to RF interference from common commercial items.
802.11a uses a more expensive modulation technique than 802.11g.
• 802.11g is backward compatible with 802.11b, but 802.11a is not.
2. Which two statements concerning network security are accurate? (Choose two.)
802.11i uses 3DES for encryption.
• Open authentication uses no client or AP verification.
The 802.11i protocol is functionally identical to WPA.
• 802.11i incorporates a RADIUS server for enterprise authentication.
A wireless client first associates with an AP and then authenticates for network access.
3. Which installation method will allow connectivity