网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A standard installation for wireless will use which of the following antenna types?()
A

Sector

B

Patch

C

Yagi

D

Omni-Directional


参考答案

参考解析
解析: 暂无解析
更多 “单选题A standard installation for wireless will use which of the following antenna types?()A SectorB PatchC YagiD Omni-Directional” 相关考题
考题 You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform. a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.You want to accomplish the following goals:1. An unattended installation of Windows 2000 Professional will be performed.2. An unattended installation of company's standard applications will be performed during the installation of Windows 2000 Professional.3. Each computer will be assigned a unique security identifier description.4. The unattended installation script. will be modified so that the computers automatically join the contoso.com domain.You take the following actions:1. Install Windows 2000 Professional on a Windows 98 computer named computer1.2. Install and configure computer standard applications on computer1.3. Use Setup Manager on computer1 to create an unattended.txt file based on the current configuration including domain membership.4. Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use the unattended.txt file to provide the setting for the installation.Which result or results do these actions produce? (Choose all that apply)A.An unattended installation of Windows 2000 Professional will be performed.B.An unattended installation of company's standard applications will be performed during the installation of Windows 2000 Professional.C.Each computer will be assigned a unique security identifier description.D.The unattended installation script. will be modified so that the computers automatically join the contoso.com domain.

考题 After a technician replaces a laptop display, the technician now notices that the wireless no longer works. Which of the following would be the MOST likely cause?() A. The wireless switch was damaged during the display installation.B. The network card has failed.C. The new display is interfering with the wireless signal.D. The antenna connector was not reconnected.

考题 Which of the following wireless standards was the FIRST standard to be ratified and is used to support legacy wireless devices?() A.802.11aB.802.11gC.802.11bD.802.11n

考题 Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

考题 An administrator receives reports from users in an office that their 802.11g wireless connectivityhas been problematic since the installation of the new wireless phone system.At which of the following frequencies are both systems operating at to cause this issue?()A.2.4GHzB.900MHzC.1.1GHzD.5GHz

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

考题 Which two features or capabilities are valid options for both an Autonomous WLAN solution and a  Lightweight WLAN solution? ()A、 PoE capabilityB、 Use of Cisco Secure Access Control Server (ACS) for securityC、 Cisco IOS software for configurationD、 Cisco Wireless Control System (WCS) for managementE、 Use of a Cisco Wireless Location Appliance location for tracking

考题 Cisco Small Business products address which installation requirement more effectively than standard Cisco products?()A、wireless technology integrationB、use of advanced reporting functionsC、VPN technology integrationD、minimal technical complexity

考题 After a technician replaces a laptop display, the technician now notices that the wireless no longer works. Which of the following would be the MOST likely cause?()A、The wireless switch was damaged during the display installation.B、The network card has failed.C、The new display is interfering with the wireless signal.D、The antenna connector was not reconnected.

考题 In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 A standard installation for wireless will use which of the following antenna types?()A、SectorB、PatchC、YagiD、Omni-Directional

考题 Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

考题 Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 Which two statements about the implementation of WLAN QoS are true?()A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

考题 Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

考题 You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.

考题 Which of these is not part of the pre_ installation worksheet?()A、 deployment optionB、 acceptable use policiesC、 S-Series interface settingsD、 authentication infrastructure

考题 A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house

考题 An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()A、2.4GHzB、900MHzC、1.1GHzD、5GHz

考题 Which of the following wireless standards was the FIRST standard to be ratified and is used to support legacy wireless devices?()A、802.11aB、802.11gC、802.11bD、802.11n

考题 You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones

考题 多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK

考题 多选题A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)AThe length of the houseBHow many rooms are in the houseCHow many users will be using the wireless networkDThe building material of the houseEThe cost of the house

考题 多选题You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.   You want to accomplish the following goals:   • An unattended installation of Windows 2000 Professional will be performed.  • An unattended installation of company's standard applications will be performed during the     installation of Windows 2000 Professional.  • Each computer will be assigned a unique security identifier description.  • The unattended installation script will be modified so that the computers automatically join the    contoso.com domain.   You take the following actions:  • Install Windows 2000 Professional on a Windows 98 computer named computer1. • Install and configure computer standard applications on computer1.  • Use Setup Manager on computer1 to create an unattended.txt file based on the current    configuration including domain membership.  • Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use    the unattended.txt file to provide the setting for the installation.   Which result or results do these actions produce?()AAn unattended installation of Windows 2000 Professional will be performed.BAn unattended installation of company’s standard applications will be performed during the   Installation of Windows 2000 Professional.CEach computer will be assigned a unique security identifier description.DThe unattended installation script will be modified so that the computers automatically join the  contoso.com domain.

考题 单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()A 802.1xB WPA-PersonalC WPA2-EnterpriseD WPA2-Personal

考题 单选题Cisco Small Business products address which installation requirement more effectively than standard Cisco products?()A wireless technology integrationB use of advanced reporting functionsC VPN technology integrationD minimal technical complexity

考题 单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A A public place where guests are free to access the wireless network.B A small office where a defined number of specific wireless devices are used.C A meeting room where various company users will access the wireless network during meetings. D An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.