单选题When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()A802.1q trunkingBvtp trunkingCisl trunkingDdpt trunking

单选题
When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()
A

802.1q trunking

B

vtp trunking

C

isl trunking

D

dpt trunking


参考解析

解析: 暂无解析

相关考题:

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?() A. Configure a location groupB. Createan authentication protocol setC. Configure the RADIUS AV pair listD. Configure RADIUS clientsE. Configure role and role-mapping rules

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?() A. HostnameB. fully qualified domain nameC. IP addressD. address book entry

An 802.1x client cannot authenticate to an autonomous access point configured for multiple vlans. the native vlan does not have an ssid configured. Which one of the following links being down would prevent the clients from authenticating?()A、between the radius and the access pointB、between the client’s vlan and the wlseC、between the native vlan and the wlseD、between the client’s vlan and the radius

Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()A、access point ethernet port set to ssl trunkingB、switchport set to 802.1q trunkingC、switchport set to ssl trunkingD、access point ethernet port not set to 802.1q trunking

Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()A、Configure a location groupB、Createan authentication protocol setC、Configure the RADIUS AV pair listD、Configure RADIUS clientsE、Configure role and role-mapping rules

What are three advantages of VLANs?()A、VLANs establish broadcast domains in switched networks.B、VLANs utilize packet filtering to enhance network security.C、VLANs provide a method of conserving IP addresses in large networks.D、VLANs provide a low-latency internetworking alternative to routed networks.E、VLANs allow access to network services based on department, not physical location.F、VLANs can greatly simplify adding, moving, or changing hosts on the network.

You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

VLANs have been enabled on an autonomous access point. In order for clients associating toVLANs other than the native VLAN to receive an IP address which of the following must beconfigured?()A、access point Ethernet port set to SSL trunkingB、switchport set to 802.1q trunkingC、switchport set to SSL trunkingD、access point Ethernet port not set to 802.1q trunking

Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.

In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

Client association using eap-cisco wireless (leap) is failing, but eap-peap is functioning on an autonomous access point.  Which of the following needs to be enabled on the access point so eap-cisco wireless (leap) is enabled?()A、open authentication plus macB、open authentication plus eapC、shared keyD、network eap

In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)

You are installing a cisco aironet 1000 series controller-based access point. when you boot it, all the leds on the access point blink together. What does this indicate about the access point?()A、duplicate ip addressB、code upgrade in progressC、normal operationD、searching for primary controller

What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()A、75B、100C、25D、50

单选题Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()Aaccess point ethernet port set to ssl trunkingBswitchport set to 802.1q trunkingCswitchport set to ssl trunkingDaccess point ethernet port not set to 802.1q trunking

单选题When configuring VLANs on an autonomous access point,what must be configured on theconnected switchport?()A802.1q trunkingBVTP trunkingCISL trunkingDDPT trunking

多选题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()AConfigure a location groupBCreatean authentication protocol setCConfigure the RADIUS AV pair listDConfigure RADIUS clientsEConfigure role and role-mapping rules

单选题In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A1813B1645C1646D1812

单选题When configuring a serial interface on a router, what is the default encapsulation?()Aatm-dxiBframe-relayChdlcDlapbEppp

单选题When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()AHostnameBfully qualified domain nameCIP addressDaddress book entry

单选题Which statement about data center access layer design modes is correct?()A The access layer is the first oversubscription point in a data center design.B When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.E The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A a minimum of one Cisco 4100 Series WLAN ControllerB one WDS per subnetC a minimum of one Wireless LAN Services ModuleD all clients using Cisco Aironet Wireless LAN Adapters