Skip to main content

Posts

Showing posts from August 29, 2009

CCNA2 Chapter 8 (true 100%)

1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network? authentication accreditation accounting authorization 2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.) date and time of message ID of sending device length of message message ID checksum field community ID 3. What is the advantage of using WPA to secure a wireless network? It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access. It uses an advanced encryption key that is never transmitted between host and access point. It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment. It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC a