网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()
A

 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.

B

 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.

C

 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.

D

 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  

E

 None of the other alternatives apply


参考答案

参考解析
解析: 暂无解析
更多 “单选题In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A  The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B  The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C  The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D  The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E  None of the other alternatives apply” 相关考题
考题 In the Ezonexam switched LAN environment, what does the IEEE 802.1Q standard describe?A. VLAN pruningB. A method of VLAN trunkingC. An approach to wireless LAN communicationD. The operation of VTPE. The process for root bridge selectionF. None of the above

考题 As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()A.19dbmB.10dbmC.67dbmD.86dbm

考题 In a switched environment, what does the IEEE 802.1Q standard describe?() A.the operation of VTPB.a method of VLAN trunkingC.an approach to wireless LAN communicationD.the process for root bridge selectionE.VLAN pruning vlan

考题 What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()A、CiscoWorks Wireless LAN Solution Engine (WLSE)B、CiscoWorks Wireless LAN Solution Engine (WLSE) ExpressC、Cisco Wireless Control System (WCS)D、Wireless Domain Services (WDS)E、WLAN Controllers (WLC)

考题 When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()A、3B、1C、4D、6

考题 What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

考题 What is the bandwidth requirement of an active duplex wireless call using G.711 codec?()A、64 kb/sB、91.2 kb/sC、173 kb/sD、183 kb/sE、211 kb/s

考题 Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A、 Cisco 1130AG Series Wireless LAN ControllersB、 Cisco 1140AG Series Wireless LAN ControllersC、 Cisco 2000 Series Wireless LAN ControllersD、 Cisco 4400 Series Wireless LAN Controllers

考题 LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

考题 You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

考题 In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E、 None of the other alternatives apply

考题 In a deployment using the lightweight access points, clients set up to authenticate with EAP-PEAPor EAP-Cisco Wireless (LEAP) cannot authenticate. Upon inspection of the Failed Attempts reportyou see the following error: "Unknown network access server NAS."  What two problems can causethis type of failure?()A、misconfigured IP address of the AAA server on the wireless controllerB、misconfigured IP address of the wireless LAN controller on the AAA serverC、misconfigured EAP type on the wireless LAN controllerD、misconfigured shared secret on the wireless LAN controllerE、misconfigured EAP type on the AAA server

考题 On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()A、 association request/response, probe request/response, authentication request/responseB、 association request/response, authentication request/response, probe request/responseC、 probe request/response, authentication request/response, association request/responseD、 probe request/response, association request/response, authentication request/responseE、 None of the other alternatives apply

考题 A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

考题 Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

考题 What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()A、 Authentication  B、 MobilityC、 Security managementD、 Transmission of beacon framesE、 Real-time portions of MAC managementF、 Real-time aspects of the 802.11 prtocol managementG、 SNMP collection

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 单选题Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A  Cisco 1130AG Series Wireless LAN ControllersB  Cisco 1140AG Series Wireless LAN ControllersC  Cisco 2000 Series Wireless LAN ControllersD  Cisco 4400 Series Wireless LAN Controllers

考题 单选题What is the function of the third paragraph?A To illustrate the important role and function of the assignment desk.B To give us a brief introduction of their working conditions.C To exemplify the cooperation of all sections in the company.D To emphasize the mission of the correspondents.

考题 单选题What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()A CiscoWorks Wireless LAN Solution Engine (WLSE)B CiscoWorks Wireless LAN Solution Engine (WLSE) ExpressC Cisco Wireless Control System (WCS)D Wireless Domain Services (WDS)E WLAN Controllers (WLC)

考题 单选题On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()A  association request/response, probe request/response, authentication request/responseB  association request/response, authentication request/response, probe request/responseC  probe request/response, authentication request/response, association request/responseD  probe request/response, association request/response, authentication request/responseE  None of the other alternatives apply

考题 单选题When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()A 3B 1C 4D 6

考题 单选题In a switched environment, what does the IEEE 802.1Q standard describe?()A the operation of VTPB a method of VLAN trunkingC an approach to wireless LAN communicationD the process for root bridge selectionE VLAN pruning vlan

考题 多选题What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()Aneed one access pointBwant to provide unsecured wireless accessCneed between two and three access pointsDwant to provide employee wireless accessEneed more than four access pointsFwant to provide guest wireless access

考题 单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A  a minimum of one Cisco 4100 Series WLAN ControllerB  one WDS per subnetC  a minimum of one Wireless LAN Services ModuleD  all clients using Cisco Aironet Wireless LAN Adapters

考题 多选题What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()AAuthenticationBMobilityCSecurity managementDTransmission of beacon framesEReal-time portions of MAC managementFReal-time aspects of the 802.11 prtocol managementGSNMP collection