网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by()and shares many properties with wired Ethernet

A.IEEE 802.1

B.IEEE 802.3

C.IEEE 802.5

D.IEEE 802.11


参考答案

更多 “ wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by()and shares many properties with wired EthernetA.IEEE 802.1B.IEEE 802.3C.IEEE 802.5D.IEEE 802.11 ” 相关考题
考题 The most widely used LAN system is ______ which adopts a form. of access known as CSMA-CD.A.EthemetB.ATMC.FDDID.Wireless

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

考题 The most well-known member of the el hemet protocol family is IEEE 802.11,otherwise known as (74).A.virtual private networkB.local area networkC.storage arca networkD.WLAN

考题 Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is ( ) .A.IEEE 802.1 B.IEEE 802.2 C.IEEE 802.3 D.IEEE 802.11

考题 IEEE 802规范定义了网卡如何访问传输介质,以及如何在传输介质上传输数据的方法。其中,( )是重要的局域网协议。A.IEEE 802.1 B.IEEE 802.3 C.IEEE 802.6 D.IEEE 802.11

考题 An architectural Style defines as a family of such systems in terms of a ( )of structural organization. More specifically an architectural style defines a vocabulary of( ) and connector types, and a set of( )on how they can be combined. For many styles there may also exist one or more ( ) that specify how to determine a system's overall properties from the properties of its parts. Many of architectural styles have been developed over the years. The best-known examples of (请作答此空)architectures are programs written in the Unix shell.A.event-based B.object-oriented C.pipe-and-filter D.layered

考题 An architectural Style defines as a family of such systems in terms of a ( )of structural organization. More specifically an architectural style defines a vocabulary of( ) and connector types, and a set of( )on how they can be combined. For many styles there may also exist one or more (请作答此空) that specify how to determine a system's overall properties from the properties of its parts. Many of architectural styles have been developed over the years. The best-known examples of ( )architectures are programs written in the Unix shell.A.semantic models B.weak entities C.data schemas D.business models

考题 wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by ( ) and shares many properties with wired Ethernet. A.IEEE 802.1 B.IEEE 802.3 C.IEEE 802.5 D.IEEE 802.11

考题 pany is deploying a Cisco autonomous WLAN solution in their network.  Which three  components are included in this solution?()A、 Wireless Domain Services (WDS)B、 Access Control Server (ACS)C、 Lightweight Access Point Protocol (LWAPP)D、 Wireless LAN solution Engine (WLSE)E、 Wireless Services Module (WISM)F、 Wireless Control System (WCS)

考题 Which statement is correct for both the LWAPP and CAPWAP AP upstream 802.1Q tagged wired QoS priority for a non-WMM-associated client frame that is H-REAP locally switched running v5.2?()A、Wireless client WMM UP classification is translated to a wired DSCP priority.B、Wireless client 802.11p classification is translated to a wired DSCP priority.C、Wireless client WMM UP classification is translated to a wired 802.1p CoS priority.D、Wireless client 802.11p classification is translated to a wired 802.1p CoS priority.E、WLAN configured QoS level is used to set the wired DSCP priority.F、Wired 802.1p CoS priority is not set.

考题 Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A、 Cisco 1130AG Series Wireless LAN ControllersB、 Cisco 1140AG Series Wireless LAN ControllersC、 Cisco 2000 Series Wireless LAN ControllersD、 Cisco 4400 Series Wireless LAN Controllers

考题 LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

考题 Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()A、MAC addressB、DNS serverC、DHCP serverD、resolve addressE、endpoint address

考题 You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

考题 Which statement is correct for the LWAPP/CAPWAP AP upstream encapsulated frame for a WMM-associated client frame that is centrally switched running v5.2?()A、Wireless client WMM UP classification is translated to a wired DSCP priority.B、Wireless client 802.11p classification is translated to a wired DSCP priority.C、Wireless client WMM UP classification is translated to a wired 802.1p CoS priority.D、Wireless client 802.11p classification is translated to a wired 802.1p CoS priority.

考题 Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

考题 Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()A、 The access point has broadcast too many SSIDs.B、 The wireless client has missed too many beacons from the access point.C、 The maximum data retry count, initiated by the wireless client, is exceeded.D、 The wireless client has reduced the data rate.E、 The access point has requested client reauthentication.F、 The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

考题 Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.B、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.C、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.D、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

考题 The Cisco Unified Wireless Network minimizes the TCO and maximizes wireless network uptimeby optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS

考题 A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 You are the network administrator for Fabrikam, Inc. The network contains a DNS server named Server1.  Server1 is configured to resolve queries for external internet resources. Server1 also hosts the fabrikam.com internal zone for Active Directory. Users report that they are directed to the wrong Web site when browsing for well-known Internet Web sites.  You need to minimize the occurrence of unexpected results when users browse the Internet in the future. You also need to minimize disruption to users. What should you do?()A、Enable the Disable recursion setting in the advanced properties of Server1.B、Enable Fail on load if bad zone data setting in the advanced properties of Server1.C、Enable the Secure cache against pollution setting in the advanced properties of Server1.D、Enable the Enable automatic scavenging of stale resource records setting in the advanced properties of Server1 and set it to 7 days.

考题 单选题Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A  Cisco 1130AG Series Wireless LAN ControllersB  Cisco 1140AG Series Wireless LAN ControllersC  Cisco 2000 Series Wireless LAN ControllersD  Cisco 4400 Series Wireless LAN Controllers

考题 单选题Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A  The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.B  LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.C  LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.D  LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

考题 多选题A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)AThe length of the houseBHow many rooms are in the houseCHow many users will be using the wireless networkDThe building material of the houseEThe cost of the house

考题 单选题Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A wireless monitoring deviceB wireless LAN controllerC wireless bridgeD wireless management deviceE access point