单选题In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()A The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.B The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.C The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages. E None of the other alternatives apply
单选题
In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()
A
The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.
B
The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.
C
The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
D
The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages.
E
None of the other alternatives apply
参考解析
解析:
暂无解析
相关考题:
In the Ezonexam switched LAN environment, what does the IEEE 802.1Q standard describe?A. VLAN pruningB. A method of VLAN trunkingC. An approach to wireless LAN communicationD. The operation of VTPE. The process for root bridge selectionF. None of the above
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()A.19dbmB.10dbmC.67dbmD.86dbm
In a switched environment, what does the IEEE 802.1Q standard describe?() A.the operation of VTPB.a method of VLAN trunkingC.an approach to wireless LAN communicationD.the process for root bridge selectionE.VLAN pruning vlan
What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()A、CiscoWorks Wireless LAN Solution Engine (WLSE)B、CiscoWorks Wireless LAN Solution Engine (WLSE) ExpressC、Cisco Wireless Control System (WCS)D、Wireless Domain Services (WDS)E、WLAN Controllers (WLC)
When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()A、3B、1C、4D、6
What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access
What is the bandwidth requirement of an active duplex wireless call using G.711 codec?()A、64 kb/sB、91.2 kb/sC、173 kb/sD、183 kb/sE、211 kb/s
Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A、 Cisco 1130AG Series Wireless LAN ControllersB、 Cisco 1140AG Series Wireless LAN ControllersC、 Cisco 2000 Series Wireless LAN ControllersD、 Cisco 4400 Series Wireless LAN Controllers
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.E、 None of the other alternatives apply
You need to set up a Company AP to act as a wireless repeater. What are three characteristics of this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is 25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is 50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is 75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.
In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages. E、 None of the other alternatives apply
In a deployment using the lightweight access points, clients set up to authenticate with EAP-PEAPor EAP-Cisco Wireless (LEAP) cannot authenticate. Upon inspection of the Failed Attempts reportyou see the following error: "Unknown network access server NAS." What two problems can causethis type of failure?()A、misconfigured IP address of the AAA server on the wireless controllerB、misconfigured IP address of the wireless LAN controller on the AAA serverC、misconfigured EAP type on the wireless LAN controllerD、misconfigured shared secret on the wireless LAN controllerE、misconfigured EAP type on the AAA server
On the Company wireless LAN, A client is searching for an access point (AP). What is the correct process order that this Company client and access point goes through in order to create a connection?()A、 association request/response, probe request/response, authentication request/responseB、 association request/response, authentication request/response, probe request/responseC、 probe request/response, authentication request/response, association request/responseD、 probe request/response, association request/response, authentication request/responseE、 None of the other alternatives apply
A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters
Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()A、 Authentication B、 MobilityC、 Security managementD、 Transmission of beacon framesE、 Real-time portions of MAC managementF、 Real-time aspects of the 802.11 prtocol managementG、 SNMP collection
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
单选题Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A Cisco 1130AG Series Wireless LAN ControllersB Cisco 1140AG Series Wireless LAN ControllersC Cisco 2000 Series Wireless LAN ControllersD Cisco 4400 Series Wireless LAN Controllers
单选题What is the function of the third paragraph?ATo illustrate the important role and function of the assignment desk.BTo give us a brief introduction of their working conditions.CTo exemplify the cooperation of all sections in the company.DTo emphasize the mission of the correspondents.
单选题What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()ACiscoWorks Wireless LAN Solution Engine (WLSE)BCiscoWorks Wireless LAN Solution Engine (WLSE) ExpressCCisco Wireless Control System (WCS)DWireless Domain Services (WDS)EWLAN Controllers (WLC)
单选题On the Company wireless LAN, A client is searching for an access point (AP). What is the correct process order that this Company client and access point goes through in order to create a connection?()A association request/response, probe request/response, authentication request/responseB association request/response, authentication request/response, probe request/responseC probe request/response, authentication request/response, association request/responseD probe request/response, association request/response, authentication request/responseE None of the other alternatives apply
单选题When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()A3B1C4D6
单选题In a switched environment, what does the IEEE 802.1Q standard describe?()Athe operation of VTPBa method of VLAN trunkingCan approach to wireless LAN communicationDthe process for root bridge selectionEVLAN pruning vlan
多选题What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()Aneed one access pointBwant to provide unsecured wireless accessCneed between two and three access pointsDwant to provide employee wireless accessEneed more than four access pointsFwant to provide guest wireless access
单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A a minimum of one Cisco 4100 Series WLAN ControllerB one WDS per subnetC a minimum of one Wireless LAN Services ModuleD all clients using Cisco Aironet Wireless LAN Adapters
多选题What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()AAuthenticationBMobilityCSecurity managementDTransmission of beacon framesEReal-time portions of MAC managementFReal-time aspects of the 802.11 prtocol managementGSNMP collection