考题
A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()
A.802.11aB.802.11bC.802.11gD.802.11n
考题
Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()
A. TrunkingB. LANC. VPND. Peer to peer
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A、90 millisecondsB、120 millisecondsC、150 millisecondsD、240 milliseconds
考题
LDAP is being utilized throughout the Company Wireless network. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.
考题
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.E、 None of the other alternatives apply
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.
考题
An administrator is troubleshooting wireless connectivity issues at a client’s office and discoversthat the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?()A、802.1 1gB、802.1XC、802.11nD、802.11b
考题
Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()A、PIM sparse mode is being used.B、PIM dense mode is being used.C、The BGP multicast address family has not been configured.D、IGMP version 3 is being used.E、IP PIM neighbor filters have not been applied.
考题
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()A、 Authentication B、 MobilityC、 Security managementD、 Transmission of beacon framesE、 Real-time portions of MAC managementF、 Real-time aspects of the 802.11 prtocol managementG、 SNMP collection
考题
Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()A、TrunkingB、LANC、VPND、Peer to peer
考题
A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()A、802.11aB、802.11bC、802.11gD、802.11n
考题
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
考题
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
考题
单选题An administrator is troubleshooting wireless connectivity issues at a client’s office and discoversthat the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?()A
802.1 1gB
802.1XC
802.11nD
802.11b
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network. What should you do to enforce the group policy wireless settings to the laptop computers()A
Execute gpupdate/target:computer command at the command prompt on laptop computersB
Execute Add a network command and leave the SSID (service set identifier) blankC
Execute gpupdate/boot command at the command prompt on laptops computersD
Connect each laptop computer to a wired network and log off the laptop computer and then login again.E
None of the above
考题
单选题LDAP is being utilized throughout the Company Wireless network. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()A
Reduction of processing in wireless controllersB
Distributed approach to authentication, encryption, and policy enforcementC
Access point discovery, information exchange, and configurationD
Provides security by blocking communication between access points and wireless clientsE
None of the other alternatives apply.
考题
单选题VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A
90 millisecondsB
120 millisecondsC
150 millisecondsD
240 milliseconds
考题
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A
A public place where guests are free to access the wireless network.B
A small office where a defined number of specific wireless devices are used.C
A meeting room where various company users will access the wireless network during meetings. D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
多选题The Cisco AutoQoS feature is being used throughout the Company VOIP network. Which three statements about this feature are true?()AThe mls qos global configuration command must be entered before configuring AutoQoS.BCEF must be enabled.CThe no auto qos voip command is used to disable Cisco AutoQos and revoke all configurations generated by Cisco AutoQos.DCDP must be enabled.ESNMP must be enabled.
考题
单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A
Configure a Windows Connect Now Group Policy.B
Configure a Wireless Network (IEEE 802.11) Policy.C
Delete the rogue network from the Network and Sharing Center on each computer.D
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
考题
单选题Static VLANs are being used on the Company network. What is true about static VLANs?()A
Devices use DHCP to request their VLAN.B
Attached devices are unaware of any VLANs.C
Devices are assigned to VLANs based on their MAC addresses.D
Devices are in the same VLAN regardless of which port they attach to.
考题
单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A
IGPB
EIGRPC
EGPD
BGP
考题
单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A
Frequency settings should be changedB
Additional WAPs should be installedC
Channels should be changedD
VLANs should be added
考题
多选题What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()AAuthenticationBMobilityCSecurity managementDTransmission of beacon framesEReal-time portions of MAC managementFReal-time aspects of the 802.11 prtocol managementGSNMP collection