网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()

  • A、Implement a Cisco Secure IPS sensor.
  • B、Implement 802.1X on the switch ports.
  • C、Take no action, you have achieved your goal.
  • D、Implement a protected port on the access switches.

参考答案

更多 “ You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.” 相关考题
考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 Which device is installed in user devices and makes wireless connections between them and a network?() A.Access pointB.BridgeC.RouterD.Client adapter

考题 You are charged with implementing a secure wireless installation which will provide internet  access to client devices but will not allow communications between wireless clients. In addition to implementing pspf or peer-to-peer blocking on the wireless side,which of the following actions should you perform on the wired infrastructure?()A、implement a cisco secure ips sensor.B、implement 802.1x on the switch ports.C、take no action, you have achieved your goal.D、implement a protected port on the access switches.

考题 When configuring Cisco Secure ACS to support wireless EAP authentication,which device mustbeconfigured as a AAA client?()A、Location ApplianceB、controller-based access pointsC、wireless clientsD、Wireless Control SystemE、wireless controllers

考题 What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

考题 Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()A、Antenna power is a relative value reference to dBiB、LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.C、Characteristics of antennas are directionality, gain, and polarizationD、Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetworkE、The WLAN solution Engine (WLSE) is used to control lightweight access pointsF、One of the advantages of the lightweight WLAN solution is that the devices act indepently

考题 Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System?()A、 allow for guest accessB、 increase connection speedsC、 add additional access pointsD、 network management with CLI

考题 You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()A、Take no action, you have achieved your goal.B、Implement a Cisco Secure IPS sensor.C、Implement a protected port on the access switches.D、Implement 802.1X on the switch ports.

考题 Which device is installed in user devices and makes wireless connections between them and a network?()A、Access pointB、BridgeC、RouterD、Client adapter

考题 What is needed to allow IT managers to design, control, and monitor their wireless networks form a centralized location as wireless networks grow in scale and complexity?()A、 network unificationB、 network managementC、 mobility platformD、 client devices

考题 When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()A、Wireless Control SystemB、wireless clientsC、wireless controllersD、controller-based access pointsE、Location Appliance

考题 What is the objective of the Cisco Compatible Extensions program?()A、to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless codeB、to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless productsC、to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovationsD、to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless

考题 You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.

考题 You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()A、Take no action, you have achieved your goal.B、Implement a Cisco Secure IPS sensor.C、Implement a protected port on the access switches.D、Implement 802.1X on the switch ports.

考题 Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()A、 The access point has broadcast too many SSIDs.B、 The wireless client has missed too many beacons from the access point.C、 The maximum data retry count, initiated by the wireless client, is exceeded.D、 The wireless client has reduced the data rate.E、 The access point has requested client reauthentication.F、 The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

考题 Which two wireless devices acts as a communication connection between the client and WLAN()A、 bridgeB、 access pointC、 wireless adaptorD、 Layer 3 switchE、 antenna

考题 A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A、Add another wireless access point.B、Add another DHCP server.C、Disable the wireless DHCP server.D、Change the default gateway of the wireless router

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

考题 单选题A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues.  Which of the following would resolve this issue? ()A  Add another wireless access point.B  Add another DHCP server.C  Disable the wireless DHCP server.D  Change the default gateway of the wireless router.

考题 多选题What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()Aneed one access pointBwant to provide unsecured wireless accessCneed between two and three access pointsDwant to provide employee wireless accessEneed more than four access pointsFwant to provide guest wireless access

考题 单选题What is the objective of the Cisco Compatible Extensions program?()A to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless codeB to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless productsC to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovationsD to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless

考题 多选题Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()AThe access point has broadcast too many SSIDs.BThe wireless client has missed too many beacons from the access point.CThe maximum data retry count, initiated by the wireless client, is exceeded.DThe wireless client has reduced the data rate.EThe access point has requested client reauthentication.FThe wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

考题 单选题What is needed to allow IT managers to design, control, and monitor their wireless networks form a centralized location as wireless networks grow in scale and complexity?()A  network unificationB  network managementC  mobility platformD  client devices

考题 多选题Which two wireless devices acts as a communication connection between the client and WLAN()AbridgeBaccess pointCwireless adaptorDLayer 3 switchEantenna