网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()

  • A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.
  • B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.
  • C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).
  • D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.
  • E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.
  • F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

参考答案

更多 “ You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)” 相关考题
考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A.WLAN AutoConfigB.WWAN AutoConfigC.Computer BrowserD.Portable Device Enumerator Service

考题 pany is deploying a Cisco autonomous WLAN solution in their network.  Which three  components are included in this solution?()A、 Wireless Domain Services (WDS)B、 Access Control Server (ACS)C、 Lightweight Access Point Protocol (LWAPP)D、 Wireless LAN solution Engine (WLSE)E、 Wireless Services Module (WISM)F、 Wireless Control System (WCS)

考题 Which three WLAN statements are true? (Choose three.) () A、 A lightweight AP receives control and configuration from a WLAN controller to which it is associated.B、 A WLAN client that is operating in half-duplex mode will delay all clients in that WLANC、 A dhoc mode allows mobile clients to connect directly without an intermediate APD、 Another term for infrastructure mode is independent service set (IBSS)E、 The Aironet 1230 access point is an example of an access point that operates solely as a lightweight  access point.F、 WLANs are designed to share the medium and can easily handle an increased demand of channel  contention.

考题 Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()A、You may use Cisco Network Assistant to set up the initial configurationB、You must use CLI for initial configurationC、You may use either CLI or CAN for configurationD、You may make a direct connection to the PC from any point on the switchE、You may only make a direct connection from the port with the flashing green LED to the PC

考题 LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

考题 Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A、Set the security type to the No authentication (Open) option.B、Configure the wired and wireless network adapters as a network bridge.C、Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D、On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 You install a wireless router and disable the Service Set Identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.  What should you do? ()A、Click the Connect to a network link, right-click the appropriate network, and then click the Connect option.B、Click the View computers and devices link, right-click the wireless router, and then click the Enable option.C、Click the Set up a connection or network link, and then click the Set up a wireless Ad hoc network option.D、Click the Set up a connection or network link, and then click the Manually connect to a wireless network option.

考题 As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()A、 In the autonomous access point solution, control is provided by the WLAN controller.B、 In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).C、 In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).D、 Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.E、 Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).F、 Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.

考题 Which three of these statements about PPPoE are true?()A、PPPoE can provide a host with access to a destination over Ethernet. You can have only one  PPPoE session per PVCB、You must install PPPoE client software on all hosts that connect to the Ethernet segment. This means that the access provider must maintain a CPEC、You cannot use PPPoE with Cisco Service Selection GatewayD、PPPoE implementation is susceptible to broadcast storms and possible denial-of-service attacksE、Per-session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. The service provider can also require a minimum access charge

考题 You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

考题 In order to enhance worker productivity, a Cisco wireless network has been implemented at all    locations.  Which three statements regarding WLAN are true?()A、A WLAN client will operate in half-duplex mode.B、The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.C、Ad hoc mode allows mobile clients to connect directly without an intermediate AP.D、WLANs are designed to share the medium and can easily handle an increased demand of channel contention.E、A lightweight AP receives control and configuration from a WLAN controller to which it is associated.F、Another term for infrastructure mode is independent service set (IBSS).

考题 Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 You use the segment advisor to help determine objects for which space may be reclaimed. Which three statements are true about the advisor given by the segment advisor?()A、It may advise the use of online table redefinition for tables in dictionary managed tablespace.B、It may advise the use of segment shrink for tables in dictionary managed tablespaces it the no chained rows.C、It may advise the use of online table redefinition for tables in locally managed tablespacesD、It will detect and advise about chained rows.E、It may advise the use of segment shrink for free list managed tables.

考题 Which one of the following statements about the TNSPING utility is correct?()A、It helps you to determine whether or not the Oracle database is running.B、It requires the username and password to check the connectivity of the service.C、It does not require the username and password to check the connectivity of the service.D、It establishes a session with the database and checks the connectivity of the service.

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

考题 Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1x authentication.B、Configure all protable computers to use MS-CHAP v2 authentication.C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

考题 多选题Which three statements are true about persistent configuration?() (Choose three.)AA user cannot set privileges on the persistent lightweight jobsBPersistent lightweight jobs generate a large amount of metadataCIt is possible to create fully self-contained persistent lightweight jobsDThe use of a template is mandatory to create persistent lightweight jobsEPersistent lightweight jobs are useful when users need to create a large number of jobs in a short time

考题 多选题In order to enhance worker productivity, a Cisco wireless network has been implemented at all    locations.  Which three statements regarding WLAN are true?()AA WLAN client will operate in half-duplex mode.BThe Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.CAd hoc mode allows mobile clients to connect directly without an intermediate AP.DWLANs are designed to share the medium and can easily handle an increased demand of channel contention.EA lightweight AP receives control and configuration from a WLAN controller to which it is associated.FAnother term for infrastructure mode is independent service set (IBSS).

考题 单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A Set the security type to the No authentication (Open) option.B Configure the wired and wireless network adapters as a network bridge.C Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 单选题Which one of the following statements about the TNSPING utility is correct?()A It helps you to determine whether or not the Oracle database is running.B It requires the username and password to check the connectivity of the service.C It does not require the username and password to check the connectivity of the service.D It establishes a session with the database and checks the connectivity of the service.

考题 多选题You use the segment advisor to help determine objects for which space may be reclaimed. Which three statements are true about the advisor given by the segment advisor?()AIt may advise the use of online table redefinition for tables in dictionary managed tablespace.BIt may advise the use of segment shrink for tables in dictionary managed tablespaces it the no chained rows.CIt may advise the use of online table redefinition for tables in locally managed tablespacesDIt will detect and advise about chained rows.EIt may advise the use of segment shrink for free list managed tables.

考题 多选题Which three of these statements about PPPoE are true?()APPPoE can provide a host with access to a destination over Ethernet. You can have only one  PPPoE session per PVCBYou must install PPPoE client software on all hosts that connect to the Ethernet segment. This means that the access provider must maintain a CPECYou cannot use PPPoE with Cisco Service Selection GatewayDPPPoE implementation is susceptible to broadcast storms and possible denial-of-service attacksEPer-session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. The service provider can also require a minimum access charge

考题 单选题All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A WLAN AutoConfigB WWAN AutoConfigC Computer BrowserD Portable Device Enumerator Service

考题 多选题Which three of these statements about PPPoP are true?()AYou must install PPPoP client software on all hosts that connects to the Ethernet segment this means that the access provider must maintain a CPEBPPPoP can provide a host with access to a destination over Ethernet. You can have only one PPPoPsession per PVCCPPPoP implementation is susceptible to broadcast storms and possible denial-of-service attacksDYou cannot use PPPoP with Cisco Service Selection GatewayEPer-session accounting is possible, which allows the service provider to charge the subscribe based onsession time for various services offered. The service provider can also require a minimum access change