A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()A、known internalB、managedC、friendlyD、known external

A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()

  • A、known internal
  • B、managed
  • C、friendly
  • D、known external

相关考题:

Which of the following solutions will detect and disable a rogue access point?() A.Port scanB.Packet snifferC.IPSD.IDS

Which description best characterizes the Cisco mobility solution?() A. provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transitB. authenticates users and devices so that it is impossible for a rogue device to be connected to the networkC. allows you to centralize management, automate repetitive tasks, and provision IP services easilyD. centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a networkwhen you select which of the following modes from the AP Mode drop-down menu on the controller?()A、MonitorB、Rogue DetectorC、SnifferD、Mirror

What statement best describes Cisco WCS support for antennas?()A、Cisco WCS supports third-party antennas for location applications.B、Access points that are defined with third-party antennas will not participate in rogue on-demand location tracking.C、Cisco WCS supports third-party antenna gain, azimuth, and elevation progation patterns.D、Access points that are defined with a third-party antenna in Cisco WCS will display coverage heat maps.

Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()A、rogue detectorB、rogue containmentC、RLDPD、RIDP

A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()A、known internalB、managedC、friendlyD、known external

Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()A、rogue detectorB、rogue containmentC、rldpD、ridp

Random Access Response消息用()加扰。A、SI-RNTIB、RA-RNTIC、P-RNTID、Temp C-RNTI

常见的网络模型包括:()非广播多点访问网络(NBMA,NON-brOAdCAsTMULTi-ACCess)、()、点到点网络(P2P,POiNTTOPOiNT)。

Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

Your customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()A、ensure channels are deployed such that they do not overlapB、allow for the automatic containment of rogue access pointsC、ensure each area is covered by a minimum of three access pointsD、ensure a minimum rssi value of -50

If it is properly deployed,a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu on thecontroller?()A、MirrorB、Rogue DetectorC、SnifferD、Monitor

If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu onthe controller?()A、MonitorB、Rogue DetectorC、SnifferD、Mirror

Which description best characterizes the Cisco mobility solution? ()A、provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transitB、authenticates users and devices so that it is impossible for a rogue device to be connected to the networkC、allows you to centralize management, automate repetitive tasks, and provision IP services easilyD、centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()A、a minimum rssi value of -50B、rogue access pointsC、a minimum of three access pointsD、non-overlapping channels

When conducting a wireless voice site survey, which two sizing considerations exist for thecoverage cell?()A、rogue access point detection in the coverage areaB、multipath issues in the coverage areaC、number of VoWLAN users in the coverage cellD、call capacity requirements of the coverage area

多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server

单选题Which statement best describes the rogue AP location display of the WCS wireless management server? ()ACisco WCS Base and Cisco WCS Location both indicate rogue AP location only in a Rogue AP Alarm text fileBCisco WCS Base and Cisco WCS Location both indicate rogue AP location in a map at the most probable location that is calculated by two or more APsCCisco WCS Base identifies the general location of rogue APs based on the signal strength received by the nearest managed Cisco APs, whereas Cisco WCS Location adds high-accuracy location tracking to within a few meters of the rogue APDCisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map at the most probable location that is calculated by two or more APsECisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map beside the nearest associated AP

多选题Which two Cisco Wireless Control System (WCS) statements are true?()Athe WCS Base version includes all the features of the WCS Location version as well as additional enhancementsBthe WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)CWCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access pointsDWCS includes a network management tool which is similar to a site survey toolEWCS uses the CDP protocol to communicate with the controllers

单选题Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()Arogue detectorBrogue containmentCrldpDridp

单选题Which of the following solutions will detect and disable a rogue access point?()APort scanBPacket snifferCIPSDIDS

单选题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()AIssue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationBIssue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationCIssue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationDIssue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

填空题常见的网络模型包括:()非广播多点访问网络(NBMA,NON-brOAdCAsTMULTi-ACCess)、()、点到点网络(P2P,POiNTTOPOiNT)。

单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()AConfigure a Windows Connect Now Group Policy.BConfigure a Wireless Network (IEEE 802.11) Policy.CDelete the rogue network from the Network and Sharing Center on each computer.DCreate a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()Arogue detectorBrogue containmentCRLDPDRIDP

单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()Aclients connected to the rogue access point must be able to connect to the containment controller-based access point.Bmultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.Cclients connected to the rogue access point may be out of the range of the controller-based access point providing containment.Deach controller-based access point can handle only a limited amount of clients connected to the rogue access points.

单选题A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()Aknown internalBmanagedCfriendlyDknown external

单选题Wlse uses snmp communication with an ethernet switch for what purpose?()Ashut down rogue access pointsBconfigure access pointsCdiscover access pointsDinventory access points