The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()A、 It supports eight different data rates.B、 It is fully backward compatible with 802.11bC、 It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.D、 It is only compatibly with the 11 Mbps 802.11b transfer rate.E、 It has three non-overlapping channels in its channel options.

The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()

  • A、 It supports eight different data rates.
  • B、 It is fully backward compatible with 802.11b
  • C、 It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.
  • D、 It is only compatibly with the 11 Mbps 802.11b transfer rate.
  • E、 It has three non-overlapping channels in its channel options.

相关考题:

Ezonexam is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? (Choose two)A. VLANB. SubinterfaceC. STPD. HubE. SwitchF. RouterG. Wireless Access PointH. VTP

Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

Which two Cisco Wireless Control System (WCS) statements are true?()A、the WCS Base version includes all the features of the WCS Location version as well as additional enhancementsB、the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)C、WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access pointsD、WCS includes a network management tool which is similar to a site survey toolE、WCS uses the CDP protocol to communicate with the controllers

Access Point R1 is an Aironet 1200 that has been converted from autonomous mode to LWAPP  mode. After this conversion, which two statements are true? ()A、 LWAPP-enabled access points can still communicate with Wireless Domain Services (WDS)  devices.B、 An LWAPP-enabled access point console port provides read-only access to the unit.C、 LWAPP-enabled access points support Layer 2 LWAPP.D、 LWAPP-enabled access points must get an IP address and discover the controller using  DHCP, DNS, or an IP subnet broadcast.E、 An LWAPP-enabled access point console port provides read-write access to the unit.

Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  A、 The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter  and the access point, manage authentication to the wireless network, and enable data encryption.B、 The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.C、 The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a  time.D、 The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.E、 When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.

Which three statements are true about implementing wireless LANs in the Company network using  Cisco devices?()A、 Antenna power is a relative value reference to dBi.B、 LWAPP allows encrypted communications between lightweight access points and WLAN  controllers.C、 Characteristics of antennas are directionality, gain, and polarization.D、 Power over Ethernet (PoE) is only available when a WLAN controller is integrated into the  network.E、 The WLAN solution Engine (WLSE) is used to control lightweight access points.F、 One of the advantages of the lightweight WLAN solution is that the devices act indepently.

Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()A、Antenna power is a relative value reference to dBiB、LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.C、Characteristics of antennas are directionality, gain, and polarizationD、Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetworkE、The WLAN solution Engine (WLSE) is used to control lightweight access pointsF、One of the advantages of the lightweight WLAN solution is that the devices act indepently

LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.

LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()A、 In the autonomous access point solution, control is provided by the WLAN controller.B、 In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).C、 In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).D、 Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.E、 Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).F、 Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.

A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.

Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?()A、using adapters and access points manufactured by the same companyB、overlapping the wireless cell coverage by at least 10%C、configuring all access points to use the same channelD、utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs

Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()A、When you configure access to the wired network at home, set the wired network adapter location type to Public.B、When you configure access to the wired network at home, set the wired network adapter location type to Private.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.

多选题A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。AhubBrouterCswitchDSTPEsubinterfacesFVLAN

多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

多选题Access Point R1 is an Aironet 1200 that has been converted from autonomous mode to LWAPP  mode. After this conversion, which two statements are true? ()ALWAPP-enabled access points can still communicate with Wireless Domain Services (WDS)  devices.BAn LWAPP-enabled access point console port provides read-only access to the unit.CLWAPP-enabled access points support Layer 2 LWAPP.DLWAPP-enabled access points must get an IP address and discover the controller using  DHCP, DNS, or an IP subnet broadcast.EAn LWAPP-enabled access point console port provides read-write access to the unit.

单选题LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A Reduction of processing in wireless controllersB Distributed approach to authentication, encryption, and policy enforcementC Access point discovery, information exchange, and configurationD Provides security by blocking communication between access points and wireless clientsE None of the other alternatives apply.

单选题LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E None of the other alternatives apply

多选题The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()AIt supports eight different data rates.BIt is fully backward compatible with 802.11bCIt provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.DIt is only compatibly with the 11 Mbps 802.11b transfer rate.EIt has three non-overlapping channels in its channel options.