网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()
A

probe request/response, authentication request/response, association request/response

B

association request/response, authentication request/response, probe request/response

C

probe request/response, association request/response, authentication request/response

D

association request/response, probe request/response, authentication request/response


参考答案

参考解析
解析: 暂无解析
更多 “单选题A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()A probe request/response, authentication request/response, association request/responseB association request/response, authentication request/response, probe request/responseC probe request/response, association request/response, authentication request/responseD association request/response, probe request/response, authentication request/response” 相关考题
考题 Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()A、Set the SSID value in the client software to public.B、Configure open authentication on the AP and the client.C、Set the SSID value on the client to the SSID configured on the APD、Configure MAC address filtering to permit the client to connect to the AP

考题 What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.D、The AP will map the 802.11e priority value to the DSCP value.E、The AP will map the DSCP value to the outer LWAPP frame.

考题 Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A、client traffic allowed, data captured on all channelsB、client traffic allowed, data captured on a single channelC、no client traffic allowed, data captured on a single channelD、no client traffic allowed, data captured on all channels

考题 A new Aironet 1200 series AP has been installed in the Company WLAN.  What happens when this  device is connected to the LAN, with a default configuration?()A、 The access point will attempt to download an encryption key from the nearest wireless server.B、 The access point makes several attempts to get an IP address from the DHCP server. If the  access point does not receive an address, it assigns itself the IP address 10.0.0.1 for 5 minutes.C、 The access point will attempt to connect to the nearest wireless server using LEAP  authentication.D、 The access point requests an IP address from the DHCP server. If the access point does not  receive an address, it continues to send requests indefinitely.E、 None of the other alternatives apply

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()A、a shared keyB、network EAPC、open authentication plus EAPD、open authentication plus MAC

考题 What are two benefits of clustered access points on a small business network using the Cisco500 Series Access Point? ()A、 Cisco IOS configurationB、 tri-band 11g single radiosC、 rouge AP integrationD、 single view to deploy and manageE、 secure guest access

考题 You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

考题 The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()A、 Real-time frame exchange is accomplished within the access point.B、 The control traffic between the client and the access point is encapsulated with the LWAPP. C、 Authentication, security, and mobility are handled by the access point.D、 Data traffic between the client and the access point is encapsulated with LWAPP.E、 None of the other alternatives apply

考题 In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E、 None of the other alternatives apply

考题 On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()A、 association request/response, probe request/response, authentication request/responseB、 association request/response, authentication request/response, probe request/responseC、 probe request/response, authentication request/response, association request/responseD、 probe request/response, association request/response, authentication request/responseE、 None of the other alternatives apply

考题 A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()A、 probe request/response, authentication request/response, association request/responseB、 association request/response, authentication request/response, probe request/responseC、 probe request/response, association request/response, authentication request/responseD、 association request/response, probe request/response, authentication request/response

考题 Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()A、 The access point has broadcast too many SSIDs.B、 The wireless client has missed too many beacons from the access point.C、 The maximum data retry count, initiated by the wireless client, is exceeded.D、 The wireless client has reduced the data rate.E、 The access point has requested client reauthentication.F、 The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

考题 You are installing a cisco aironet 1000 series controller-based access point. when you boot it, all the leds on the access point blink together. What does this indicate about the access point?()A、duplicate ip addressB、code upgrade in progressC、normal operationD、searching for primary controller

考题 Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()A、Set the SSID value in the client software to public.B、Configure open authentication on the AP and the client.C、Set the SSID value on the client to the SSID configured on the AP.D、Configured MAC address filtering to permit the client to connect to the AP.

考题 Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()A、a minimum rssi value of -50B、rogue access pointsC、a minimum of three access pointsD、non-overlapping channels

考题 单选题In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A  The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B  The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C  The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D  The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E  None of the other alternatives apply

考题 单选题Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()A It indicates that the radio of the client adapter is disabledB It indicates that the client adapter is not associated to an access point or another clientC It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticatedD It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or goodE It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fairF It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor

考题 多选题Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()AThe access point has broadcast too many SSIDs.BThe wireless client has missed too many beacons from the access point.CThe maximum data retry count, initiated by the wireless client, is exceeded.DThe wireless client has reduced the data rate.EThe access point has requested client reauthentication.FThe wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

考题 单选题On the wireless LAN, A client is searching for an access point (AP). What is the correct processorder that this client and access point goes through in order to create a connection?()A association request/response, probe request/response, authentication request/responseB association request/response, authentication request/response, probe request/responseC probe request/response, authentication request/response, association request/responseD probe request/response, association request/response, authentication request/responseE None of the other alternatives apply

考题 单选题Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()A  It indicates that the radio of the client adapter is disabled.B  It indicates that the client adapter is not associated to an access point or another client. C  It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.D  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.E  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.F  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.

考题 单选题What is the correct procedure for adding an access point in WCS?()A Choose Configure Access_Point, then enter the AP MAC addressB Choose Configure Access_Point, then enter the IP address of the APC Wait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menuD Wait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu

考题 单选题On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()A  association request/response, probe request/response, authentication request/responseB  association request/response, authentication request/response, probe request/responseC  probe request/response, authentication request/response, association request/responseD  probe request/response, association request/response, authentication request/responseE  None of the other alternatives apply

考题 单选题A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()A  probe request/response, authentication request/response, association request/responseB  association request/response, authentication request/response, probe request/responseC  probe request/response, association request/response, authentication request/responseD  association request/response, probe request/response, authentication request/response

考题 单选题The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()A  Real-time frame exchange is accomplished within the access point.B  The control traffic between the client and the access point is encapsulated with the LWAPP. C  Authentication, security, and mobility are handled by the access point.D  Data traffic between the client and the access point is encapsulated with LWAPP.E  None of the other alternatives apply

考题 单选题Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A client traffic allowed, data captured on all channelsB client traffic allowed, data captured on a single channelC no client traffic allowed, data captured on a single channelD no client traffic allowed, data captured on all channels

考题 多选题What are two benefits of clustered access points on a small business network using the Cisco500 Series Access Point? ()ACisco IOS configurationBtri-band 11g single radiosCrouge AP integrationDsingle view to deploy and manageEsecure guest access

考题 单选题On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()A a shared keyB network EAPC open authentication plus EAPD open authentication plus MAC

考题 单选题Which set of statements describes the correct order and process of a Company wireless user  client associating with a wireless access point in the Company network? ()A  1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.B  1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.C  1. Client sends probe request.2. Access point sends probe response.3. Access point initiates  association.4. Client accepts association.5. Access point adds client MAC address to association  table.D  1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.E  1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.F  None of the other alternatives apply.