单选题One of your customers is using the G.711 codec with 802.11a access point radios. This cansupport a maximum of how many phones per access point?()A 8B 14C 23D 7E 19

单选题
One of your customers is using the G.711 codec with 802.11a access point radios. This cansupport a maximum of how many phones per access point?()
A

 8

B

 14

C

 23

D

 7

E

 19


参考解析

解析: 暂无解析

相关考题:

You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?() A.5B.10C.14D.20

You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A、5B、10C、14D、20

A new lightweight access point (LAP) has been installed in the Company WLAN.  Which two  statements correctly describe the association process between this LAP and a WLAN controller? ()A、 An access point will search for a controller using a broadcast address if using LWAPP Layer 2  and a unicast address if using LWAPP Layer 3 mode.B、 If multiple wireless controllers are detected by an access point, the controller with the fewest  associated access points is chosen to associate with.C、 In order to associate in Layer 3 mode, the access point must have been preconfigured with an  IP address.D、 Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP  address from the controller.E、 An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not  successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.F、 If multiple wireless controllers are detected by an access point, all of them will be used and  traffic will be load balanced.

Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()A、Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.B、Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.C、Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.D、Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

One of your customers is using the G.711 codec with 802.11a access point radios. This cansupport a maximum of how many phones per access point?()A、 8B、 14C、 23D、 7E、 19

An reap was supporting 16 wlans, but now it only supports one. What happened to cause the change?()A、controller connectivity has been lost.B、the access point lost its configuration.C、the access point was rebooted.D、an access point firmware upgrade is in progress.

Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()A、known internalB、managedC、friendlyD、known external

An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?()A、Turn down the transmission strength of the access point.B、Replace the antenna with a smaller one.C、Change the wireless password to a more complex one.D、Change the SSID of the access point

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()A、 The access point has broadcast too many SSIDs.B、 The wireless client has missed too many beacons from the access point.C、 The maximum data retry count, initiated by the wireless client, is exceeded.D、 The wireless client has reduced the data rate.E、 The access point has requested client reauthentication.F、 The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()A、a minimum rssi value of -50B、rogue access pointsC、a minimum of three access pointsD、non-overlapping channels

During the initial cluster design,a disk heartbeat,Point-to-Point non-IP network is being planned  as part of a three-node cluster implementation. The disk environment will use LVM mirroring for disk redundancy. The volume groups will be created as Enhanced Concurrent Capable.  To facilitate disk heartbeating,how many disks per node and how many networks will be required?()  A、 One disk per node,one networkB、 Two disks per node,one networkC、 Two disks per node,six networksD、 Two disks per node,three networks

单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()Aclients connected to the rogue access point must be able to connect to the containment controller-based access point.Bmultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.Cclients connected to the rogue access point may be out of the range of the controller-based access point providing containment.Deach controller-based access point can handle only a limited amount of clients connected to the rogue access points.

单选题An REAP was supporting 16 WLANs, but now it only supports one. What happened to cause the change?()AController connectivity has been lost.BThe access point lost its configuration.CThe access point was rebooted.DAn access point firmware upgrade is in progress.

单选题One of your customers is using the G.711 codec with 802.11a access point radios. This cansupport a maximum of how many phones per access point?()A 8B 14C 23D 7E 19

多选题Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()AThe access point has broadcast too many SSIDs.BThe wireless client has missed too many beacons from the access point.CThe maximum data retry count, initiated by the wireless client, is exceeded.DThe wireless client has reduced the data rate.EThe access point has requested client reauthentication.FThe wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

单选题You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A5B10C14D20

单选题Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()Aa minimum rssi value of -50Brogue access pointsCa minimum of three access pointsDnon-overlapping channels

单选题During the initial cluster design,a disk heartbeat,Point-to-Point non-IP network is being planned  as part of a three-node cluster implementation. The disk environment will use LVM mirroring for disk redundancy. The volume groups will be created as Enhanced Concurrent Capable.  To facilitate disk heartbeating,how many disks per node and how many networks will be required?()A One disk per node,one networkB Two disks per node,one networkC Two disks per node,six networksD Two disks per node,three networks

单选题An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?()ATurn down the transmission strength of the access point.BReplace the antenna with a smaller one.CChange the wireless password to a more complex one.DChange the SSID of the access point

单选题Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()AClients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.BMultiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.CClients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.DEach controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

单选题You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()AAESBPSKCSSIDDTKIPEWEP

单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled

单选题A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()Aknown internalBmanagedCfriendlyDknown external

单选题Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()AMultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.BClients connected to the rogue access point may be out of the range of the controller-based access point providing containment.CEach controller-based access point can handle only a limited amount of clients connected to the rogue access points.DClients connected to the rogue access point must be able to connect to the containment controller-based access point.

单选题A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()Aknown internalBmanagedCfriendlyDknown external