Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()A、Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.B、Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.C、Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.D、Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()

  • A、Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.
  • B、Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.
  • C、Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.
  • D、Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

相关考题:

A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?() A. MeshB. Point to pointC. Point to multipointD. Ring

Which of the following solutions will detect and disable a rogue access point?() A.Port scanB.Packet snifferC.IPSD.IDS

If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a networkwhen you select which of the following modes from the AP Mode drop-down menu on the controller?()A、MonitorB、Rogue DetectorC、SnifferD、Mirror

Which three WLAN statements are true? (Choose three.) () A、 A lightweight AP receives control and configuration from a WLAN controller to which it is associated.B、 A WLAN client that is operating in half-duplex mode will delay all clients in that WLANC、 A dhoc mode allows mobile clients to connect directly without an intermediate APD、 Another term for infrastructure mode is independent service set (IBSS)E、 The Aironet 1230 access point is an example of an access point that operates solely as a lightweight  access point.F、 WLANs are designed to share the medium and can easily handle an increased demand of channel  contention.

Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()A、access point ethernet port set to ssl trunkingB、switchport set to 802.1q trunkingC、switchport set to ssl trunkingD、access point ethernet port not set to 802.1q trunking

Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()A、rogue detectorB、rogue containmentC、RLDPD、RIDP

A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()A、known internalB、managedC、friendlyD、known external

Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()A、known internalB、managedC、friendlyD、known external

Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()A、rogue detectorB、rogue containmentC、rldpD、ridp

You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

VLANs have been enabled on an autonomous access point. In order for clients associating toVLANs other than the native VLAN to receive an IP address which of the following must beconfigured?()A、access point Ethernet port set to SSL trunkingB、switchport set to 802.1q trunkingC、switchport set to SSL trunkingD、access point Ethernet port not set to 802.1q trunking

Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()A、MeshB、Point to pointC、Point to multipointD、Ring

单选题VLANs have been enabled on an autonomous access point. In order for clients associating toVLANs other than the native VLAN to receive an IP address which of the following must beconfigured?()Aaccess point Ethernet port set to SSL trunkingBswitchport set to 802.1q trunkingCswitchport set to SSL trunkingDaccess point Ethernet port not set to 802.1q trunking

单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()Aclients connected to the rogue access point must be able to connect to the containment controller-based access point.Bmultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.Cclients connected to the rogue access point may be out of the range of the controller-based access point providing containment.Deach controller-based access point can handle only a limited amount of clients connected to the rogue access points.

单选题Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()Arogue detectorBrogue containmentCrldpDridp

多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

单选题Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()AClients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.BMultiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.CClients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.DEach controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

单选题You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()AAESBPSKCSSIDDTKIPEWEP

多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.

单选题Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()AMultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.BClients connected to the rogue access point may be out of the range of the controller-based access point providing containment.CEach controller-based access point can handle only a limited amount of clients connected to the rogue access points.DClients connected to the rogue access point must be able to connect to the containment controller-based access point.

单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()Arogue detectorBrogue containmentCRLDPDRIDP

单选题Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()Aaccess point ethernet port set to ssl trunkingBswitchport set to 802.1q trunkingCswitchport set to ssl trunkingDaccess point ethernet port not set to 802.1q trunking