网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
- A、 The data traffic between the access point and controller is not encrypted.
- B、 The data traffic is encapsulated with LWAPP.
- C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
- D、 The data traffic is encrypted with AES.
- E、 All of the above
参考答案
更多 “ Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above” 相关考题
考题
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A. Router routes traffic between different networks and a switch does notB. The new switch is faulty and needs to be replaced and configured correctlyC. The firewall needs to be setup to allow traffic to reach the InternetD. The switch needs to be setup to forward data traffic to the Internet
考题
Which two statements are true about voice packets in a LAN? (Choose two.) ()A、 Voice traffic data flow involves large volumes of large packets.B、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.C、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.D、 Voice packets are very sensitive to delay and jitter.E、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
考题
What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A、 The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B、 The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C、 The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D、 The Ethanalyzer captures only control traffic, while SPAN captures data traffic.
考题
Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A、 LWAPP encrypts control traffic between the AP and the controller.B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC、 LWAPP encrypts both control traffic and user data.D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
考题
A new lightweight access point (LAP) has been installed in the Company WLAN. Which two statements correctly describe the association process between this LAP and a WLAN controller? ()A、 An access point will search for a controller using a broadcast address if using LWAPP Layer 2 and a unicast address if using LWAPP Layer 3 mode.B、 If multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.C、 In order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.D、 Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.E、 An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.F、 If multiple wireless controllers are detected by an access point, all of them will be used and traffic will be load balanced.
考题
Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A、client traffic allowed, data captured on all channelsB、client traffic allowed, data captured on a single channelC、no client traffic allowed, data captured on a single channelD、no client traffic allowed, data captured on all channels
考题
You work as a network technician at Company. Your boss, Mrs., is interested in LWAPP (Lightweight Access Point Protocol). What should you tell her regarding this technology? ()A、 LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.B、 Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.C、 Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.D、 Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.E、 Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.F、 Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
考题
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.E、 None of the other alternatives apply
考题
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()A、 Real-time frame exchange is accomplished within the access point.B、 The control traffic between the client and the access point is encapsulated with the LWAPP. C、 Authentication, security, and mobility are handled by the access point.D、 Data traffic between the client and the access point is encapsulated with LWAPP.E、 None of the other alternatives apply
考题
Which two statements are correct regarding multicast implementation using a WLAN controller (v5.2) and AP?()A、Multicast traffic is sent out on Cisco APs at the highest mandatory data rate.B、Multicast traffic is sent out on Cisco APs at the highest supported data rate.C、On Cisco APs, multicast traffic and beacons are sent out at the same data rates to maintain a common cell size for normal data as well as multicast data.D、If there is more than one mandatory data rate, multicast traffic will be sent at the highest mandatory rate and beacons will be sent at the lowest mandatory rate.E、On Cisco APs, multicast traffic will be sent out at the highest data rate that a client can maintain with the AP.
考题
Which statement is true about voice VLANs? ()A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B、The voice VLAN feature is enabled by default.C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D、The default CoS value is 1 for incoming voice and data traffic.
考题
How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel
考题
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.
考题
Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.C、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.D、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN
考题
Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A、 LWAPP encrypts both control traffic and user data.B、 LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.D、 LWAPP encrypts control traffic between the AP and the controller.E、 None of the other alternatives apply.
考题
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet
考题
Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing
考题
多选题The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()AControl traffic between an access point and a controller is encrypted within LWAPP.BData traffic between an access point and a controller is encrypted within LWAPP.CLayer 3 mode packets are transmitted in TCP frames.DData traffic between an access point and a controller is encapsulated within LWAPP.EVLAN tagging and QoS markings are applied at the access point.
考题
单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A
Physically the voice network and the data network are separate.B
The voice traffic will normally be on a different IP subnet than will the data traffic.C
End user intervention is necessary to place the phone into the proper VLAN.D
The same security policy should be implemented for both voice and data traffic.E
The data VLAN must be configured as the native VLAN.
考题
单选题The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()A
Real-time frame exchange is accomplished within the access point.B
The control traffic between the client and the access point is encapsulated with the LWAPP. C
Authentication, security, and mobility are handled by the access point.D
Data traffic between the client and the access point is encapsulated with LWAPP.E
None of the other alternatives apply
考题
单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A
LWAPP encrypts both control traffic and user data.B
LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C
When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.D
LWAPP encrypts control traffic between the AP and the controller.E
None of the other alternatives apply.
考题
单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A
LWAPP encrypts control traffic between the AP and the controller.B
LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC
LWAPP encrypts both control traffic and user data.D
When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
考题
单选题Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A
client traffic allowed, data captured on all channelsB
client traffic allowed, data captured on a single channelC
no client traffic allowed, data captured on a single channelD
no client traffic allowed, data captured on all channels
考题
单选题Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A
The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B
LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.C
LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.D
LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN
考题
单选题LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A
The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B
LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.C
LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.D
LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.E
None of the other alternatives apply
考题
单选题Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A
The data traffic between the access point and controller is not encrypted.B
The data traffic is encapsulated with LWAPP.C
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D
The data traffic is encrypted with AES.E
All of the above
考题
单选题Which statement is true about voice VLANs? ()A
When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B
The voice VLAN feature is enabled by default.C
The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D
The default CoS value is 1 for incoming voice and data traffic.
热门标签
最新试卷