A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()A、known internalB、managedC、friendlyD、known external
A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()
- A、known internal
- B、managed
- C、friendly
- D、known external
相关考题:
Which of the following solutions will detect and disable a rogue access point?() A.Port scanB.Packet snifferC.IPSD.IDS
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a networkwhen you select which of the following modes from the AP Mode drop-down menu on the controller?()A、MonitorB、Rogue DetectorC、SnifferD、Mirror
What is the correct procedure for adding an access point in WCS?()A、Choose Configure Access_Point, then enter the AP MAC addressB、Choose Configure Access_Point, then enter the IP address of the APC、Wait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menuD、Wait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu
A new lightweight access point (LAP) has been installed in the Company WLAN. Which two statements correctly describe the association process between this LAP and a WLAN controller? ()A、 An access point will search for a controller using a broadcast address if using LWAPP Layer 2 and a unicast address if using LWAPP Layer 3 mode.B、 If multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.C、 In order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.D、 Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.E、 An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.F、 If multiple wireless controllers are detected by an access point, all of them will be used and traffic will be load balanced.
our client has deployed a Cisco Wireless Location Appliance within their warehouse environment.They have been experiencing problems with tracking objects using active RFID tags. To verify proper access point deployment for Location Server,the results from an access point scan should show what information?()A、a minimum RSSI value of -50B、rogue access pointsC、a minimum of three access pointsD、non-overlapping channels
Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()A、rogue detectorB、rogue containmentC、RLDPD、RIDP
A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()A、known internalB、managedC、friendlyD、known external
Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()A、WLAN controllersB、WLAN Solution Engine (WLSE)C、Cisco Wireless Control System (WCS)D、Cisco Wireless Location ApplianceE、lightweight access point (AP)F、autonomous access point (AP)
Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS
Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()A、rogue detectorB、rogue containmentC、rldpD、ridp
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()A、 In the autonomous access point solution, control is provided by the WLAN controller.B、 In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).C、 In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).D、 Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.E、 Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).F、 Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.
If it is properly deployed,a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu on thecontroller?()A、MirrorB、Rogue DetectorC、SnifferD、Monitor
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu onthe controller?()A、MonitorB、Rogue DetectorC、SnifferD、Mirror
Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()A、open authentication plus MACB、open authentication plus EAPC、shared keyD、network EAP
There are 30 managed access points on the wlse. a radio scan is started but fails. Upon inspection of the device list in the reports tab, you notice a red indicator on the wds access point. upon inspection of the wds access point through its guid, it is discovered that the security keys are not set up between the wds access point and the wlse. Which of the following is mis configured?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password
Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.
Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()A、a minimum rssi value of -50B、rogue access pointsC、a minimum of three access pointsD、non-overlapping channels
A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()A、MeshB、Point to pointC、Point to multipointD、Ring
多选题As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()AIn the autonomous access point solution, control is provided by the WLAN controller.BIn the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).CIn the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).DCisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.EIi the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).FCisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
单选题Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()Arogue detectorBrogue containmentCrldpDridp
单选题You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()AAESBPSKCSSIDDTKIPEWEP
多选题Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()AWLAN controllersBWLAN Solution Engine (WLSE)CCisco Wireless Control System (WCS)DCisco Wireless Location ApplianceElightweight access point (AP)Fautonomous access point (AP)
单选题A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()Aknown internalBmanagedCfriendlyDknown external
单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()Arogue detectorBrogue containmentCRLDPDRIDP
单选题A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()Aknown internalBmanagedCfriendlyDknown external