单选题In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E None of the other alternatives apply

单选题
In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()
A

 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.

B

 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.

C

 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.

D

 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  

E

 None of the other alternatives apply


参考解析

解析: 暂无解析

相关考题:

In the Ezonexam switched LAN environment, what does the IEEE 802.1Q standard describe?A. VLAN pruningB. A method of VLAN trunkingC. An approach to wireless LAN communicationD. The operation of VTPE. The process for root bridge selectionF. None of the above

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()A.19dbmB.10dbmC.67dbmD.86dbm

In a switched environment, what does the IEEE 802.1Q standard describe?() A.the operation of VTPB.a method of VLAN trunkingC.an approach to wireless LAN communicationD.the process for root bridge selectionE.VLAN pruning vlan

What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()A、CiscoWorks Wireless LAN Solution Engine (WLSE)B、CiscoWorks Wireless LAN Solution Engine (WLSE) ExpressC、Cisco Wireless Control System (WCS)D、Wireless Domain Services (WDS)E、WLAN Controllers (WLC)

When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()A、3B、1C、4D、6

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

What is the bandwidth requirement of an active duplex wireless call using G.711 codec?()A、64 kb/sB、91.2 kb/sC、173 kb/sD、183 kb/sE、211 kb/s

Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A、 Cisco 1130AG Series Wireless LAN ControllersB、 Cisco 1140AG Series Wireless LAN ControllersC、 Cisco 2000 Series Wireless LAN ControllersD、 Cisco 4400 Series Wireless LAN Controllers

LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E、 None of the other alternatives apply

In a deployment using the lightweight access points, clients set up to authenticate with EAP-PEAPor EAP-Cisco Wireless (LEAP) cannot authenticate. Upon inspection of the Failed Attempts reportyou see the following error: "Unknown network access server NAS."  What two problems can causethis type of failure?()A、misconfigured IP address of the AAA server on the wireless controllerB、misconfigured IP address of the wireless LAN controller on the AAA serverC、misconfigured EAP type on the wireless LAN controllerD、misconfigured shared secret on the wireless LAN controllerE、misconfigured EAP type on the AAA server

On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()A、 association request/response, probe request/response, authentication request/responseB、 association request/response, authentication request/response, probe request/responseC、 probe request/response, authentication request/response, association request/responseD、 probe request/response, association request/response, authentication request/responseE、 None of the other alternatives apply

A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()A、 Authentication  B、 MobilityC、 Security managementD、 Transmission of beacon framesE、 Real-time portions of MAC managementF、 Real-time aspects of the 802.11 prtocol managementG、 SNMP collection

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

单选题Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A Cisco 1130AG Series Wireless LAN ControllersB Cisco 1140AG Series Wireless LAN ControllersC Cisco 2000 Series Wireless LAN ControllersD Cisco 4400 Series Wireless LAN Controllers

单选题What is the function of the third paragraph?ATo illustrate the important role and function of the assignment desk.BTo give us a brief introduction of their working conditions.CTo exemplify the cooperation of all sections in the company.DTo emphasize the mission of the correspondents.

单选题What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()ACiscoWorks Wireless LAN Solution Engine (WLSE)BCiscoWorks Wireless LAN Solution Engine (WLSE) ExpressCCisco Wireless Control System (WCS)DWireless Domain Services (WDS)EWLAN Controllers (WLC)

单选题On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()A association request/response, probe request/response, authentication request/responseB association request/response, authentication request/response, probe request/responseC probe request/response, authentication request/response, association request/responseD probe request/response, association request/response, authentication request/responseE None of the other alternatives apply

单选题When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()A3B1C4D6

单选题In a switched environment, what does the IEEE 802.1Q standard describe?()Athe operation of VTPBa method of VLAN trunkingCan approach to wireless LAN communicationDthe process for root bridge selectionEVLAN pruning vlan

多选题What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()Aneed one access pointBwant to provide unsecured wireless accessCneed between two and three access pointsDwant to provide employee wireless accessEneed more than four access pointsFwant to provide guest wireless access

单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A a minimum of one Cisco 4100 Series WLAN ControllerB one WDS per subnetC a minimum of one Wireless LAN Services ModuleD all clients using Cisco Aironet Wireless LAN Adapters

多选题What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()AAuthenticationBMobilityCSecurity managementDTransmission of beacon framesEReal-time portions of MAC managementFReal-time aspects of the 802.11 prtocol managementGSNMP collection