pre test

28
 1 A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.) RouterA(config)# router ospf 0 RouterA(config)# router ospf 1 RouterA(config-router)# network 192.168.2.0 0.0.0.255 0 RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0 RouterA(config-router)# network 192.168.2.0 255.255.255.0 0 Observable Description Max Value correctness of response Option 2 and Option 4 are correct. 1 point for each correct option. 0 points if more options are selected than required. 2 2 The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.) access-class 5 in access-list 5 deny any access-list standard VTY permit 10.7.0.0 0.0.0.127 access-list 5 permit 10.7.0.0 0.0.0.31 ip access-group 5 out ip access-group 5 in Numbered and named access lists can be used on vty lines to control remote access. The first ACL command, access-list 5 permit 10.7.0.0 0.0.0.31, allows traffic that originates from any device on the 10.7.0.0/27 network. The second ACL command, access-class 5 in, applies the access list to a vty line. Observable

Upload: guzganshobolan

Post on 09-Oct-2015

138 views

Category:

Documents


0 download

DESCRIPTION

examin cisco

TRANSCRIPT

1A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.)RouterA(config)# router ospf 0RouterA(config)# router ospf 1RouterA(config-router)# network 192.168.2.0 0.0.0.255 0RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0RouterA(config-router)# network 192.168.2.0 255.255.255.0 0ObservableDescriptionMax Valuecorrectness of responseOption 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required. 22The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)access-class 5 inaccess-list 5 deny anyaccess-list standard VTYpermit 10.7.0.0 0.0.0.127access-list 5 permit 10.7.0.0 0.0.0.31ip access-group 5 outip access-group 5 inNumbered and named access lists can be used on vty lines to control remote access. The first ACL command, access-list 5 permit 10.7.0.0 0.0.0.31, allows traffic that originates from any device on the 10.7.0.0/27 network. The second ACL command, access-class 5 in, applies the access list to a vty line.ObservableDescriptionMax Valuecorrectness of responseOption 1 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required. 23

Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?Add the next hop neighbor address of 192.168.0.36.Change the administrative distance to 1.Change the destination network to 192.168.0.34.Change the administrative distance to 120.The problem with the current floating static route is that the administrative distance is set too low. The administrative distance will need to be higher than that of OSPF, which is 110, so that the router will only use the OSPF link when it is up.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 24Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?The default gateway address is not provided in the pool.No clients have communicated with the DHCPv6 server yet.The IPv6 DHCP pool configuration has no IPv6 address range specified.The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.Under the stateless DHCPv6 configuration, indicated by the command ipv6 nd other-config-flag, the DHCPv6 server does not maintain the state information, because client IPv6 addresses are not managed by the DHCP server. Because the clients will configure their IPv6 addresses by combining the prefix/prefix-length and a self-generated interface ID, the ipv6 dhcp pool configuration does not need to specify the valid IPv6 address range. And because clients will use the link-local address of the router interface as the default gateway address, the default gateway address is not necessary .ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 25

Refer to the exhibit.

What summary static address should be configured on R3 to advertise to an upstream neighbor?192.168.0.0/24192.168.0.0/23192.168.0.0/22192.168.0.0/21A summary network address is found by listing the networks in binary format and then copying the matching bits and adding zero bits. The subnet mask slash notation value is found by counting the number of matching bits.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 2

6Which two commands should be implemented to return a Cisco 3560 trunk port to its default configuration? (Choose two.)S1(config-if)# no switchport trunk allowed vlanS1(config-if)# no switchport trunk native vlanS1(config-if)# switchport mode dynamic desirableS1(config-if)# switchport mode accessS1(config-if)# switchport access vlan 1In resetting a trunk port on a Cisco 3560 switch, the following changes occur: DTP is changed back to dynamic auto; the default native VLAN is reset to 1 via the no switchport trunk native vlan command; and the application of the no switchport trunk allowed vlan command means all VLANs will be allowed to traverse the trunk by default.ObservableDescriptionMax Valuecorrectness of responseOption 1 and Option 2 are correct.1 point for each correct option.0 points if more options are selected than required. 27Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.)Configure all switch ports to a new VLAN that is not VLAN 1.Configure specific ports for management traffic on a specific VLAN.Configure SSH for remote management.Configure all unused ports to a "black hole."Configure the native VLAN to match the default VLAN.It is a good security practice to implement SSH for remote management of a Cisco switch and to configure specific ports in a distinct management VLAN.ObservableDescriptionMax Valuecorrectness of responseOption 2 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required. 28Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.)scalabilityISP selectionspeed of convergencethe autonomous system that is usedcampus backbone architectureThere are several factors to consider when selecting a routing protocol to implement. Two of them are scalability and speed of convergence. The other options are irrelevant.ObservableDescriptionMax Valuecorrectness of responseOption 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required. 29Which three pieces of information does a link-state routing protocol use initially as link-state information for locally connected links? (Choose three.)the link router interface IP address and subnet maskthe type of network linkthe link next-hop IP addressthe link bandwidththe cost of that linkLink-state information includes the router interface IP address and subnet mask; the type of network, such as Ethernet (broadcast) or Serial point-to-point link; the cost of that link; and any neighbor routers on that link. Some implementations of a link-state routing protocol may use the link bandwidth when determining the cost of the link, but the bandwidth value is not considered link-state information. The link next-hop address may appear in the router routing table against a particular route entry, but is not used as link-state information.ObservableDescriptionMax Valuecorrectness of responseOption 1, Option 2, and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required. 310What is a disadvantage of NAT?There is no end-to-end addressing.The router does not need to alter the checksum of the IPv4 packets.The internal hosts have to use a single public IPv4 address for external communication.The costs of readdressing hosts can be significant for a publicly addressed network.Many Internet protocols and applications depend on end-to-end addressing from the source to the destination. Because parts of the header of the IP packets are modified, the router needs to alter the checksum of the IPv4 packets. Using a single public IP address allows for the conservation of legally registered IP addressing schemes. If an addressing scheme needs to be modified, it is cheaper to use private IP addresses.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 211A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?Switch(config)# interface gigabitethernet 1/1Switch(config-if)# spanning-tree vlan 1Switch(config)# interface gigabitethernet 1/1Switch(config-if)# spanning-tree portfastSwitch(config)# interface gigabitethernet 1/1Switch(config-if)# switchport mode trunkSwitch(config)# interface gigabitethernet 1/1Switch(config-if)# switchport access vlan 1With the router-on-a-stick method, the switch port that connects to the router must be configured as trunk mode. This can be done with the command Switch(config-if)# switchport mode trunk. The other options do not put the switch port into trunk mode.ObservableDescriptionMax Valuecorrectness of response2 points for Option 30 points for any other option 212What is a function of the distribution layer?fault isolationnetwork access to the userhigh-speed backbone connectivityinterconnection of large-scale networks in wiring closetsThe distribution layer interacts between the access layer and the core by aggregating access layer connections in wiring closets, providing intelligent routing and switching, and applying access policies to access the rest of the network. Fault isolation and high-speed backbone connectivity are the primary functions of the core layer. The main function of the access layer is to provide network access to the user.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 213Which two statements are true about half-duplex and full-duplex communications? (Choose two.)Full duplex offers 100 percent potential use of the bandwidth.Half duplex has only one channel.All modern NICs support both half-duplex and full-duplex communication.Full duplex allows both ends to transmit and receive simultaneously.Full duplex increases the effective bandwidth.Full-duplex communication allows both ends to transmit and receive simultaneously, offering 100 percent efficiency in both directions for a 200 percent potential use of stated bandwidth. Half-duplex communication is unidirectional, or one direction at a time. Gigabit Ethernet and 10 Gb/s NICs require full duplex to operate, and do not support half-duplex operation.ObservableDescriptionMax Valuecorrectness of responseOption 4 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required. 214Which three parameters could be in an extended access control list? (Choose three.)access list number between 1 and 99access list number between 100 and 199default gateway address and wildcard maskdestination address and wildcard masksource address and wildcard masksubnet mask and wild card maskObservableDescriptionMax Valuecorrectness of responseOption 2, Option 4, and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required. 315An organization needs to provide temporary voice and data services to a new small lab building. They plan to install an access switch in the new lab and connect it using a 100Mb/s FastEthernet trunk link. The network administrator is concerned about the capability of the link to meet quality requirements of the proposed voice and data services. The administrator plans to manage the datalink layer traffic to and from the lab so that trunk usage is optimized. What could the administrator apply to the trunk to help achieve this?Disable Spanning Tree Protocol to provide maximum bandwidth for the voice and data traffic.Configure the switches to run Per VLAN Spanning Tree for the voice and data VLANs only.Configure the lab switch to use the same voice and data VLAN as the rest of the campus LAN.Configure the trunk ports on the trunk link to the lab to allow only the voice and data VLANs.Allowing only the lab voice and data VLANs to traverse the trunk between the lab and the rest of the campus LAN will ensure that unnecessary broadcast traffic from other VLANs does not affect the performance of the trunk link. The operation of Spanning Tree Protocol in any form has very little impact on the bandwidth usage of an inter-switch trunk. Using the same voice and data VLANs as the rest of the campus LAN is likely to increase the unnecessary traffic on the trunk link.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 216Which statement is true about the difference between OSPFv2 and OSPFv3?OSPFv3 routers use a different metric than OSPFv2 routers use.OSPFv3 routers use a 128 bit router ID instead of a 32 bit ID.OSPFv3 routers do not need to elect a DR on multiaccess segments.OSPFv3 routers do not need to have matching subnets to form neighbor adjacencies.Because OSPFv3 routers form neighbor adjacencies by using the link-local address of the interface, they are not required to have global addresses configured on the interfaces. Even if they do have global addresses configured, the addresses do not have to be in the same subnet on each end of the link.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 217

Refer to the exhibit. Which address will R1 use as the source address for all OSPFv3 messages that will be sent to neighbors?FE80::12001:DB8:ACAD:A::1FF02::1FF02::5All OSPFv3 messages are sourced from the link-local IPv6 address of an interface. Link local addresses use the prefix FE80::/10.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 218What are two features of a link-state routing protocol? (Choose two.)Routers send periodic updates only to neighboring routers.Routers send triggered updates in response to a change.Routers create a topology of the network by using information from other routers.The database information for each router is obtained from the same source.Paths are chosen based on the lowest number of hops to the designated router.ObservableDescriptionMax Valuecorrectness of responseOption 2 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required. 219Which OSPF component is identical in all routers in an OSPF area after convergence?adjacency databaselink-state databaserouting tableSPF treeEach OSPF router views the network differently as the root of a unique SPF tree. Each router builds adjacencies based on its own position in the topology. Each routing table in the area is developed individually through the application of the SPF algorithm. The link-state database for an area, however, must reflect the same information for all routers.ObservableDescriptionMax Valuecorrectness of response2 points for Option 20 points for any other option 220Which statement describes a characteristic of standard IPv4 ACLs?They are configured in the interface configuration mode.They filter traffic based on source IP addresses only.They can be created with a number but not with a name.They can be configured to filter traffic based on both source IP addresses and source ports.A standard IPv4 ACL can filter traffic based on source IP addresses only. Unlike an extended ACL, it cannot filter traffic based on Layer 4 ports. However, both standard and extended ACLs can be identified with either a number or a name, and both are configured in global configuration mode.ObservableDescriptionMax Valuecorrectness of response2 points for Option 20 points for any other option 221

Refer to the exhibit. A network administrator issues the show ip route command on R2. What two types of routes are installed in the routing table? (Choose two.)a configured default routedirectly connected networksroutes that are learned through the OSPF routing protocolroutes that are learned through the EIGRP routing protocola configured static route to the network 209.165.200.224From the routing table, C indicates entries of networks that are directly connected to the interfaces of R2, and D*EX indicates that a default route is learned through EIGRP (indicated by D) and this default route is an external route (indicated by EX, i.e., the default route is provided by another router). This default route is not configured locally.ObservableDescriptionMax Valuecorrectness of responseOption 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required. 2

22Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?dynamic NAT with a pool of two public IP addressesPAT using an external interfacestatic NAT with one entrystatic NAT with a NAT poolThe output shows that there are two inside global addresses that are the same but that have different port numbers. The only time port numbers are displayed is when PAT is being used. The same output would be indicative of PAT that uses an address pool. PAT with an address pool is appropriate when more than 4,000 simultaneous translations are needed by the company.ObservableDescriptionMax Valuecorrectness of response2 points for Option 20 points for any other option 223What condition is required to enable Layer 3 switching?The Layer 3 switch must have IP routing enabled.All participating switches must have unique VLAN numbers.All routed subnets must be on the same VLAN.Inter-VLAN portions of Layer 3 switching must use router-on-a-stick.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 224Fill in the blank.The ______________________command is used to configure the default gateway on a switch.ObservableDescriptionMax Valuecorrectness of responseObservable 1 receives +1 point if it was answered correctly.Observable 1 receives +0 points if it was answered incorrectly. 126When are EIGRP update packets sent?only when necessarywhen learned routes age outevery 5 seconds via multicastevery 30 seconds via broadcastEIGRP does not send update packets periodically. It only sends them when necessary. Route entries in EIGRP routing table do not age out.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 227Which statement describes a characteristic of the delivery of EIGRP update packets?EIGRP uses UDP to send all update packets.EIGRP sends all update packets via unicast.EIGRP sends all update packets via multicast.EIGRP uses a reliable delivery protocol to send all update packets.EIGRP uses a reliable delivery protocol to send update packets. Depending on the need, EIGRP may send update packets with unicast or multicast. For example, update packets are sent as a multicast when required by multiple routers, or as a unicast when required by only a single router.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 228What is the purpose of the Spanning Tree Protocol (STP)?prevents Layer 2 loopsprevents routing loops on a routercreates smaller collision domainscreates smaller broadcast domainsallows Cisco devices to exchange routing table updatesObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 229Which statement is true regarding states of the IEEE 802.1D Spanning Tree Protocol?Ports are manually configured to be in the forwarding state.Ports listen and learn before going into the forwarding state.Ports must be blocked before they can be placed in the disabled state.It takes 15 seconds for a port to go from blocking to forwarding.ObservableDescriptionMax Valuecorrectness of response2 points for Option 20 points for any other option 230Which wireless encryption method is the most secure?WPAWEPWPA2 with TKIPWPA2 with AESIEEE 802.11i and WPA2 both use the Advanced Encryption Standard (AES) for encryption. AES is currently considered the strongest encryption protocol. WPA2 does not use TKIP (Temporal Key Integrity Protocol). It is WPA that uses TKIP. Although WPA provides stronger encryption than WEP, it is is not as strong as WPA2 (AES).ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 231Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth?ad hoc modehotspotinfrastructure modemixed modeTethering enables a wireless device such as a phone to provide wireless Internet connectivity to other devices, thus creating a hotspot. Infrastructure mode is the type of wireless network that is created when an access point is being used. Mixed mode allows older wireless NICs to attach to an access point that can use a newer wireless standard.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 232A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?The 5 GHz band has a greater range and is therefore likely to be interference-free.Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.Wireless range is determined by the access point antenna and output power, not the frequency band that is used. In this scenario it is stated that all users have wireless NICs that comply with the latest standard, and so all can access the 5 GHz band. Although some users may find it inconvenient to switch to the 5 Ghz band to access streaming services, it is the greater number of channels, not just fewer users, that will improve network performance.ObservableDescriptionMax Valuecorrectness of response2 points for Option 30 points for any other option 233What are two advantages of EtherChannel? (Choose two.)Configuring the EtherChannel interface provides consistency in the configuration of the physical links.Load balancing occurs between links configured as different EtherChannels.EtherChannel uses upgraded physical links to provide increased bandwidth.Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.Spanning Tree Protocol ensures redundancy by transitioning failed interfaces in an EtherChannel to a forwarding state.EtherChannel configuration of one logical interface ensures configuration consistency across the physical links in the EtherChannel. The EtherChannel provides increased bandwidth using existing switch ports without requiring any upgrades to the physical interfaces. Load balancing methods are implemented between links that are part of the same Etherchannel. Because EtherChannel views the bundled physical links as one logical connection, spanning tree recalculation is not required if one of the bundled physical links fail. If a physical interface fails, STP cannot transition the failed interface into a forwarding state.ObservableDescriptionMax Valuecorrectness of responseOption 1 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required. 234Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?MAC address of the forwarding routerMAC addresses of both the forwarding and standby routersMAC address of the standby routerMAC address of the virtual routerThe IP address of the virtual router acts as the default gateway for all the workstations. Therefore, the MAC address that is returned by the Address Resolution Protocol to the workstation will be the MAC address of the virtual router.ObservableDescriptionMax Valuecorrectness of response2 points for Option 40 points for any other option 235

Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)There is one feasible successor to network 192.168.1.8/30.The network 192.168.10.8/30 can be reached through 192.168.11.1.The reported distance to network 192.168.1.0/24 is 41024256.The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.Router R1 has two successors to the 172.16.3.0/24 network.The second entry in the table indicates that there is one feasible successor ("1 successors") for network 192.168.1.8/30. The last entry in the table shows that network 192.168.10.8/30 is directly connected, so it is not reachable through network 192.168.11.1. The third entry indicates that that the reported distances for network 192.168.1.0 are 28116 and 2170112, not 41024256. This same entry shows that neighbor 172.16.6.1 is a feasible successor for network 192.168.1.0. The first entry indicates that R1 has only one successor, not two to network 172.16.3.0/24.ObservableDescriptionMax Valuecorrectness of responseOption 1 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required. 236Refer to the exhibit. What can be concluded about network 192.168.1.0 in the R2 routing table?This network has been learned from an internal router within the same area.This network was learned through summary LSAs from an ABR.This network is directly connected to the interface GigabitEthernet0/0.This network should be used to forward traffic toward external networks.n a routing table, the designation O IA means the entry was learned from an interarea LSA that was generated from an ABR. The C label indicates a network that is directly connected to an interface on the router. The O label indicates a network that is advertised by another router in the same area. The label O*E2 indicates an external network. In this case, the network designation of 0.0.0.0/0 indicates that this external network is the default route for all traffic that is destined for external networks.ObservableDescriptionMax Valuecorrectness of response2 points for Option 20 points for any other option 2

37

Refer to the exhibit. A network technician is troubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the command output?There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.The dead time must be higher than 30 for all routers to form neighbor adjacencies.The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.If the output of the show ipv6 ospf neighbor command does not show a state of FULL or 2WAY, the two routers have not formed an OSPFv3 adjacency. If two routers do not establish an adjacency, the link-state information will not be exchanged, and routes to destination networks may not exist.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 2

38

Refer to the exhibit. What are two results of issuing the displayed commands on S1, S2, and S3? (Choose two.)S1 will automatically adjust the priority to be the lowest.S1 will automatically adjust the priority to be the highest.S3 can be elected as a secondary bridge.S2 can become root bridge if S3 fails.S2 can become root bridge if S1 fails.With this configuration, S1 will adjust its own priority to be the lowest, S2 will be elected as secondary root bridge and thus will become root if S1 fails. S3 can become root only if both S1 and S2 fail.ObservableDescriptionMax Valuecorrectness of responseOption 1 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required. 239A network administrator is troubleshooting slow performance in a Layer 2 switched network. Upon examining the IP header, the administrator notices that the TTL value is not decreasing. Why is the TTL value not decreasing?This is the normal behavior for a Layer 2 network.The MAC address table is corrupt.The VLAN database is full.The outbound interface is set for half duplex.The TTL attribute is part of the Layer 3 IP header and does not decrement in a Layer 2 environment. It will decrement whenever it passes through a Layer 3 device.ObservableDescriptionMax Valuecorrectness of response2 points for Option 10 points for any other option 240What are the two methods that a wireless NIC can use to discover an AP? (Choose two.)sending an ARP request broadcastsending a multicast frametransmitting a probe requestinitiating a three-way handshakereceiving a broadcast beacon frameTwo methods can be used by a wireless device to discover and register with an access point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that contains the SSID and other wireless settings. In active mode, the wireless device must be manually configured for the SSID, and then the device broadcasts a probe request.ObservableDescriptionMax Valuecorrectness of responseOption 3 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required. 2