Skip to main content
Labs
Question 1 of 15
Lab 17·Intermediate–Advanced

Port Security and Wireless Basics

40–50 min15 Questions

Skills Tested

  • Configure and verify Port Security
  • Identify secure MAC address behavior
  • Understand violation modes (protect, restrict, shutdown)
  • Recognize err-disabled state and recovery
  • Understand wireless fundamentals (802.11, APs)
  • Identify wireless architecture components (AP, WLC)
  • Understand CAPWAP purpose
  • Identify wireless security protocols (WPA2, WPA3, 802.1X)
Progress0%

A company is improving network security and expanding wireless connectivity.

Reports:

  • !Unauthorized devices are connecting to switch ports
  • !Wireless network roles and components are unclear in the growing office
  • !Inconsistent wireless security policies across access points

Secure switch ports using Port Security, analyze wireless network components, and identify proper wireless security methods.

Network Topology
Port Security & Wireless
Authorized PCMAC: AA:BB:CC
📱Wireless Clients802.11
🔀SwitchPort-Security
📡Access PointCAPWAP
🌐Router192.168.1.1
🎛️WLCController
Violation Modeshutdown → err-disabled
AP ↔ WLCCAPWAP tunnel
Multiple Choice
Q1/15

What does Port Security primarily use to identify and control devices?

Progress0 correct
Q1Q15

Lessons Reinforced

Lesson 75: Port SecurityLesson 76: Wireless FundamentalsLesson 77: Wireless ArchitectureLesson 78: Wireless Security