网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

  • A、 Layer 1 intercontroller roaming
  • B、 Layer 2 intercontroller roaming
  • C、 Layer 3 intercontroller roaming
  • D、 intracontroller roaming

参考答案

更多 “Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 intracontroller roaming” 相关考题
考题 Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

考题 The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()A、 Real-time frame exchange is accomplished within the access point.B、 The control traffic between the client and the access point is encapsulated with the LWAPP. C、 Authentication, security, and mobility are handled by the access point.D、 Data traffic between the client and the access point is encapsulated with LWAPP.E、 None of the other alternatives apply

考题 A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2.H-REAP AP2 has six other clients associated to it,which continue to pass traffic. What has causedthis problem?()A、H-REAP AP1 has reached its client limit.B、H-REAP AP2 has reached its client limit.C、H-REAP AP2 lost its connection to the controller.D、H-REAP AP1 lost its connection to the controller.

考题 Which of these is true of a Layer 3 out-of-band NAS deployment?()A、 The NAS acts as a gateway for all Layer 3 traffic.B、 Only the MAC address is used to identify the client device.C、 User traffic remains on the same VLAN for the duration of the connection.D、 After authentication and posture assessment, client traffic no longer passes through the NAS.

考题 Which two statements are correct regarding multicast implementation using a WLAN controller (v5.2) and AP?()A、Multicast traffic is sent out on Cisco APs at the highest mandatory data rate.B、Multicast traffic is sent out on Cisco APs at the highest supported data rate.C、On Cisco APs, multicast traffic and beacons are sent out at the same data rates to maintain a common cell size for normal data as well as multicast data.D、If there is more than one mandatory data rate, multicast traffic will be sent at the highest mandatory rate and beacons will be sent at the lowest mandatory rate.E、On Cisco APs, multicast traffic will be sent out at the highest data rate that a client can maintain with the AP.

考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 Layer 4 intercontroller roaming

考题 How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel

考题 You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()A、8B、6C、9D、5

考题 Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.

考题 A customer has just purchased an 8-core POWER 570 which has two dual port 1 Gbps  Integrated Virtual Ethernet (IVE) adapters. The customer wants to implement queue pairs (QPs) to take advantage of parallel processing of network traffic to its client logical partitions. Assuming that the system is to utilize the IVEs in both CECs,  which configuration will allow a logical partition to utilize the entire eight cores for network traffic processing?()A、 Set Multiple Core Scaling (MCS) value of the port group to 8 and set multiple core parameter of the client Ethernet adapters to yes.B、 Set Multiple Core Scaling (MCS) value of the port group to 4 and set multiple core parameter of the client Ethernet adapters to yes.C、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 4 and set multiple core parameter of the client Ethernet adapters to yes.D、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 8 and set the multiple core parameter of the client Ethernet adapters to yes.

考题 单选题A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAPAP2. H-REAP AP2 has six other clients associated to it,which continue to pass traffic. What hascaused thisproblem?()A H-REAP AP1 has reached its client limit.B H-REAP AP2 has reached its client limit.C H-REAP AP2 lost its connection to the controller.D H-REAP AP1 lost its connection to the controller.

考题 单选题Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A  Layer 1 intercontroller roamingB  Layer 2 intercontroller roamingC  Layer 3 intercontroller roamingD  intracontroller roaming

考题 单选题Which of these is true of a Layer 3 out-of-band NAS deployment?()A The NAS acts as a gateway for all Layer 3 traffic.B Only the MAC address is used to identify the client device.C User traffic remains on the same VLAN for the duration of the connection.D After authentication and posture assessment, client traffic no longer passes through the NAS.

考题 多选题A host named client12 is having difficulty communicating with a heavily used server named server14. The server14 server has the ce0, ce1, ce4, and qfe4 interfaces active. The client12, admin6, and appserv5 hosts are all on a private network and access the ce4 interface on server14 exclusively and cannot access other network interfaces on server14. The appserv5 and admin6 hosts are currently generating heavy traffic to server14 due to a running batch process.  Which two commands can you run on server14 to look at the network traffic generated between only client12 and server14 to assist in troubleshooting the communication issue?()Asnoop !admin6Bsnoop -d client12Csnoop -d ce server14Dsnoop -d ce4 client12Esnoop -d ce4 client12 server14Fsnoop -i ce4 server14 client12

考题 单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A  Routed mode requires the ACE run OSPF or EIGRPB  Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC  Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD  One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

考题 单选题Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A Layer 1intercontroller roamingB Layer 2intercontroller roamingC Layer 3intercontroller roamingD Layer 4intercontroller roaming

考题 单选题Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()A Create two virtual adapters on the client, each one from a separate Virtual IO ServerB Enable dead gateway detection on the client so that the network traffic can be reroutedC Have a spare network card on standby in the client in case the Virtual IO Server goes downD Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two separate Virtual IO Servers

考题 单选题Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A  Layer 1 intercontroller roamingB  Layer 2 intercontroller roamingC  Layer 3 intercontroller roamingD  Layer 4 intercontroller roaming

考题 单选题The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()A  Real-time frame exchange is accomplished within the access point.B  The control traffic between the client and the access point is encapsulated with the LWAPP. C  Authentication, security, and mobility are handled by the access point.D  Data traffic between the client and the access point is encapsulated with LWAPP.E  None of the other alternatives apply

考题 单选题Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A client traffic allowed, data captured on all channelsB client traffic allowed, data captured on a single channelC no client traffic allowed, data captured on a single channelD no client traffic allowed, data captured on all channels

考题 多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.

考题 单选题Which statement about the DVS engine is true?()A the DVS engine can useWebroot and McAfee scanning in parallelB the DVS engine generates the WBRSC the DVS engine never inspects the client HTTP requestD the DVS engine is only used for Layer 4 traffic monitoring

考题 单选题Which of these is true of a Layer 3 out-of-band NAS deployment?()A  The NAS acts as a gateway for all Layer 3 traffic.B  Only the MAC address is used to identify the client device.C  User traffic remains on the same VLAN for the duration of the connection.D  After authentication and posture assessment, client traffic no longer passes through the NAS.