网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()
A

port-based RADIUS

B

802.1q trunking

C

inline power

D

protected port


参考答案

参考解析
解析: 暂无解析
更多 “单选题Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A port-based RADIUSB 802.1q trunkingC inline powerD protected port” 相关考题
考题 To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?() A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC. to two core switches from redundant distribution switches connected with a Layer 2 linkD. to two core switches from redundant distribution switches connected with a Layer 3 linkE. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

考题 Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()A、 It is compatible with all wireless clients.B、 It reduces roaming latency through reduced client RF channel scanning enhancements.C、 It reduces roaming latency to targeted times of less than 75ms.D、 Roaming occurs without reauthentication through a centralized RADIUS server.E、 It is enabled through WLSE deployment.

考题 Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A、port-based radiusB、802.1q trunkingC、inline powerD、protected port

考题 A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()A、hostB、IP phoneC、access layer switchD、distribution layer switchE、core layer switch

考题 To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC、 to two core switches from redundant distribution switches connected with Layer 2 linkD、 to two core switches from redundant distribution switches connected with Layer 3 linkE、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

考题 Which two components are unique to controller-based wireless installations? ()A、 Mobility Services EngineB、 WLAN controllerC、 Cisco Wireless Control SystemD、 rugged/exterior access pointsE、 interior access points

考题 Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A、port-based RADIUSB、802.1q trunkingC、inline powerD、protected port

考题 Which set of rf characteristics is directly monitored by the core feature set products?()A、interference,utilization,and rf diffractionB、clients,utilization,and multipath interferenceC、noise,interference,and coverage holesD、noise interference,and multipath interference

考题 You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

考题 A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()A、 Cisco Aironet 1000 SeriesB、 Cisco Aironet 1100 SeriesC、 Cisco Aironet 1200 SeriesD、 Cisco Aironet 1300 SeriesE、 Cisco Aironet 1400 Series

考题 A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

考题 In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

考题 Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 A customer has just purchased an 8-core POWER 570 which has two dual port 1 Gbps  Integrated Virtual Ethernet (IVE) adapters. The customer wants to implement queue pairs (QPs) to take advantage of parallel processing of network traffic to its client logical partitions. Assuming that the system is to utilize the IVEs in both CECs,  which configuration will allow a logical partition to utilize the entire eight cores for network traffic processing?()A、 Set Multiple Core Scaling (MCS) value of the port group to 8 and set multiple core parameter of the client Ethernet adapters to yes.B、 Set Multiple Core Scaling (MCS) value of the port group to 4 and set multiple core parameter of the client Ethernet adapters to yes.C、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 4 and set multiple core parameter of the client Ethernet adapters to yes.D、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 8 and set the multiple core parameter of the client Ethernet adapters to yes.

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

考题 多选题Which two components are unique to controller-based wireless installations? ()AMobility Services EngineBWLAN controllerCCisco Wireless Control SystemDrugged/exterior access pointsEinterior access points

考题 单选题Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A port-based radiusB 802.1q trunkingC inline powerD protected port

考题 多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

考题 多选题Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()AIt is compatible with all wireless clients.BIt reduces roaming latency through reduced client RF channel scanning enhancements.CIt reduces roaming latency to targeted times of less than 75ms.DRoaming occurs without reauthentication through a centralized RADIUS server.EIt is enabled through WLSE deployment.

考题 单选题In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A 1813B 1645C 1646D 1812

考题 单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A clients connected to the rogue access point must be able to connect to the containment controller-based access point.B multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

考题 单选题To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A  to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB  to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC  to two core switches from redundant distribution switches connected with Layer 2 linkD  to two core switches from redundant distribution switches connected with Layer 3 linkE  to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

考题 单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A  a minimum of one Cisco 4100 Series WLAN ControllerB  one WDS per subnetC  a minimum of one Wireless LAN Services ModuleD  all clients using Cisco Aironet Wireless LAN Adapters

考题 单选题A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()A  Cisco Aironet 1000 SeriesB  Cisco Aironet 1100 SeriesC  Cisco Aironet 1200 SeriesD  Cisco Aironet 1300 SeriesE  Cisco Aironet 1400 Series