Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabledB、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authenticationC、Clients and server are not using certificatesD、Clients have been set to validate the server identity

Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()

  • A、Posture validation has not been enabled
  • B、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication
  • C、Clients and server are not using certificates
  • D、Clients have been set to validate the server identity

相关考题:

(b) Using the information contained in Appendix 1.1, discuss the financial performance of HLP and MAS,incorporating details of the following in your discussion:(i) Overall client fees (total and per consultation)(ii) Advisory protection scheme consultation ‘utilisation levels’ for both property and commercial clients(iii) Cost/expense levels. (10 marks)

What is the purpose of configuring router R1 with the "IP Helper address" command?()A、IP Helper is used to direct BOOTP clients to a BOOTP serverB、IP Helper is used to prevent the router form forwarding IP broadcastsC、IP Helper is used to allow IPX clients to communicate with IP-based serversD、IP Helper is used to accommodate compatibility routers using different IP routing protocolsE、None of the other alternatives apply

What is the purpose of the WLC Controller-Multicast-IGMP Timeout feature operating on v5.2?()A、to determine if there are more clients that are using the multicast streamB、to limit the time that a client has to request an IGMP join to the controller multicast groupC、to determine if the multicast router is still alive and responding to multicast clientsD、to remove clients from the multicast group if the multicast traffic exceeds the allotted bandwidth allowed for multicast clients

Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

When using which application may it be necessary to deploy access points in monitor-only mode?()A、voipB、rfid tagsC、data collectionD、802.11b and g clients

Which statement describes the WLCv5.2 delivery of a multicast packet from a wired PC source on VLAN_X to a respective wireless client using SSID_X, using a WLAN controller enabled for multicast?()A、A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, and finally to all wireless clients of that Cisco WLC, via wireless multicast.B、A packet is delivered to Cisco WLC and forwarded via unicast to all of its associated APs, and finally to all wireless clients of that Cisco WLC, via wireless unicast.C、A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joinedwireless clients via wireless multicast.D、A packet is delivered to Cisco WLC and forwarded via unicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joined wireless clients via wireless multicast.E、A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joinedwireless clients via wireless unicast.F、A packet is delivered to Cisco WLC and forwarded via unicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joined wireless clients via wireless unicast.

The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()A、 It supports eight different data rates.B、 It is fully backward compatible with 802.11bC、 It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.D、 It is only compatibly with the 11 Mbps 802.11b transfer rate.E、 It has three non-overlapping channels in its channel options.

Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabled.B、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.C、Clients and server are not using certificates.D、Clients have been set to validate the server identity.

A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

What restrictions apply to using virtual Ethernet within a cluster containing VIO clients?()A、IPAT via Aliasing must be usedB、IPAT via Replacement must be usedC、Resilience must be provided by the use of dual VIO serversD、Hardware Address Takeover (HWAT) must be used to ensure a consistent virtual MAC address

You have an Active Directory domain named contoso.com.You have an Exchange Server 2010  organization that contains a Client Access server named CAS1.Users connect to CAS1 from the Internet by using mail.contoso.com.The organization contains the following mobile clients:  (1)Windows Mobile 5.0 (2)Windows Mobile 6.1  (3)Windows Mobile 6.5  You plan to install a certificate on CAS1.You need to ensure that all clients can connect to CAS1 from the Internet by using Exchange ActiveSync.Which name should you include in the certificate?()A、contoso.comB、CAS1.contoso.comC、EAS.contoso.comD、mail.contoso.com

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

You have a Hub Transport server named Server1 that runs Exchange Server 2010.All Exchange users use IMAP4 to retrieve e-mail.You need to ensure that all users can send e-mail by using SMTP.Your solution must not require any modifications to the default connectors. What should you do?()A、Configure IMAP4 clients to send e-mail by using TCP port 25.B、Configure IMAP4 clients to send e-mail by using TCP port 587.C、Create a new Send connector and configure the connector to use port 110.D、Create a new Send connector and configure the connector to use port 143.

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

单选题When using which application may it be necessary to deploy access points in monitor-only mode?()AvoipBrfid tagsCdata collectionD802.11b and g clients

单选题You are designing a Windows Azure application that will generate events for multiple clients. Client web services might be behind NAT gateways.  You need to recommend an approach that will allow you to broadcast the events to clients.  What should you recommend?()A Use ADO.NET Data Services and provide a shared key to clients.B Use Windows Azure Queues and provide a shared key to clients.C Use Windows Azure Table storage and providea shared key to clients.D Use the Windows Azure AppFabric Service Bus and provide a shared secret to clients.

单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to the wirelessnetwork, but clients using PEAP are failing to log on. Which situation would result in this type of problem?()AThe AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.BClients have been set to validate the server identity.CPosture validation has not been enabled.DClients and server are not using certificates.

多选题You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.

单选题You have an Active Directory domain named contoso.com.You have an Exchange Server 2010  organization that contains a Client Access server named CAS1.Users connect to CAS1 from the Internet by using mail.contoso.com.The organization contains the following mobile clients:  (1)Windows Mobile 5.0 (2)Windows Mobile 6.1  (3)Windows Mobile 6.5  You plan to install a certificate on CAS1.You need to ensure that all clients can connect to CAS1 from the Internet by using Exchange ActiveSync.Which name should you include in the certificate?()Acontoso.comBCAS1.contoso.comCEAS.contoso.comDmail.contoso.com

单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()APosture validation has not been enabledBThe AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authenticationCClients and server are not using certificatesDClients have been set to validate the server identity

单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()APosture validation has not been enabled.BThe AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.CClients and server are not using certificates.DClients have been set to validate the server identity.

多选题The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()AIt supports eight different data rates.BIt is fully backward compatible with 802.11bCIt provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.DIt is only compatibly with the 11 Mbps 802.11b transfer rate.EIt has three non-overlapping channels in its channel options.

单选题Your company has an Active Directory Domain Services (AD DS) domain. You have a main office and a branch office that are connected by a slow WAN link. All servers are located in the main office. You virtualize an application by using Microsoft Application Virtualization (App - V) 4.5. The available bandwidth is not sufficient for branch office users to run the virtualized application. You need to ensure that branch office users can run the virtualized application by using the Microsoft Application Virtualization Desktop Client. What should you do?()AOn each App - V server in the main office, upgrade the App - V desktop clients to 4.6.BOn each client computer in the branch office, upgrade the App - V desktop clients to 4.6.COn each client computer in the branch office, install the application by using Windows Installer (.msi) files created by the App - V Sequencer.DIn the Micr osoft System Center Application Virtualization Management Server, configure an Application Virtualization file server for the main office.

单选题What is the purpose of the WLC Controller-Multicast-IGMP Timeout feature operating on v5.2?()Ato determine if there are more clients that are using the multicast streamBto limit the time that a client has to request an IGMP join to the controller multicast groupCto determine if the multicast router is still alive and responding to multicast clientsDto remove clients from the multicast group if the multicast traffic exceeds the allotted bandwidth allowed for multicast clients

单选题What is the purpose of configuring router R1 with the "IP Helper address" command?()AIP Helper is used to direct BOOTP clients to a BOOTP serverBIP Helper is used to prevent the router form forwarding IP broadcastsCIP Helper is used to allow IPX clients to communicate with IP-based serversDIP Helper is used to accommodate compatibility routers using different IP routing protocolsENone of the other alternatives apply

单选题Your company has an Active Directory Domain Services (AD DS) domain. You have a main office and a branch office that are connected by a slow WAN link. All servers are located in the main office. You virtualize an application by using Microsoft Application Virtualization (App-V) 4.5. The available bandwidth is not sufficient for branch office users to run the virtualized application. You need to ensure that branch office users can run the virtualized application by using the Microsoft Application Virtualization Desktop Client. What should you do?()AOn each App-V server in the main office, upgrade the App-V desktop clients to 4.6.BOn each client computer in the branch office, upgrade the App-V desktop clients to 4.6.COn each client computer in the branch office, install the application by using Windows Installer (.msi) files created by the App-V Sequencer.DIn the Microsoft System Center Application Virtualization Management Server, configure an Application Virtualization file server for the main office.

单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A a minimum of one Cisco 4100 Series WLAN ControllerB one WDS per subnetC a minimum of one Wireless LAN Services ModuleD all clients using Cisco Aironet Wireless LAN Adapters