网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()
A

In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.

B

In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.

C

In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).

D

In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.

E

In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.

F

In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)” 相关考题
考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

考题 Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D

考题 You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless netework is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile.What should you do?()A.AB.BC.CD.D

考题 You install a wireless router and disable the Service Set identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.What should you do?() A.AB.BC.CD.D

考题 Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created()。 A.BSSB.ESSC.IBSSD.SSID

考题 What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

考题 What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()A、 determine types of protocols to be supportedB、 determine the environment in which the router will be usedC、 select the number of WAN ports requiredD、 select the number of LAN ports required

考题 Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A、 Cisco 1130AG Series Wireless LAN ControllersB、 Cisco 1140AG Series Wireless LAN ControllersC、 Cisco 2000 Series Wireless LAN ControllersD、 Cisco 4400 Series Wireless LAN Controllers

考题 You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

考题 You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created()。A、BSSB、ESSC、IBSSD、SSID

考题 In a deployment using the lightweight access points, clients set up to authenticate with eap-peap or eap-cisco wireless (leap) cannot authenticatE.  upon inspection of the failed attempts report you see the following error: "unknown network access server nas." What two problems can cause this type of failure?()A、misconfigured ip address of the aaa server on the wireless controllerB、misconfigured ip address of the wireless lan controller on the aaa serverC、misconfigured eap type on the wireless lan controllerD、misconfigured shared secret on the wireless lan controllerE、misconfigured eap type on the aaa server

考题 You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you apply tovoice applications?()A、1B、3C、4D、6

考题 Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house

考题 You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A、From the Previous Versions tab, restore the version of the file that contains the correct data.B、Restore a version of the folder that contains the correct version of the file.C、Open a version of the folder that contains the correct version of the file.D、Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()A、Turn off the Windows Firewall feature.B、Disable the Block all incoming connections option.C、Turn off the Spyware and other malware protection option.D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

考题 单选题Which series of wireless LAN controllers delivers WLAN services to small and midsize enterprise environments?()A  Cisco 1130AG Series Wireless LAN ControllersB  Cisco 1140AG Series Wireless LAN ControllersC  Cisco 2000 Series Wireless LAN ControllersD  Cisco 4400 Series Wireless LAN Controllers

考题 单选题Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()A rogue detectorB rogue containmentC rldpD ridp

考题 单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()A 802.1xB WPA-PersonalC WPA2-EnterpriseD WPA2-Personal

考题 多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()A rogue detectorB rogue containmentC RLDPD RIDP

考题 单选题You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you apply to voice applications?()A 1B 3C 4D 6

考题 多选题Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()ARight-click and click the Diagnose option in the Connect to a network window.BSet the security type value to No authentication in the wireless network properties dialog box.CClick the Manually connect to a wireless network option in the Set up a connection or network window.DIn the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.EConfigure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.

考题 单选题On the Cisco Aironet Access Points connected to a Cisco Unified Wireless LAN controller, which TCLAS queue transmits RTP packets with correct 802.11e QoS markings?()A UPB VOC VID BKE BE