网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()
A

 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.

B

 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.

C

 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.

D

 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.

E

 None of the other alternatives apply


参考答案

参考解析
解析: 暂无解析
更多 “单选题LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A  The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B  LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C  LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D  LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E  None of the other alternatives apply” 相关考题
考题 A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?() A.802.11aB.802.11bC.802.11gD.802.11n

考题 Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?() A. TrunkingB. LANC. VPND. Peer to peer

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 VOIP is being implemented on the Company network. In a properly designed network,  what is the  maximum amount of time a voice package should spend crossing a network?  ()A、90 millisecondsB、120 millisecondsC、150 millisecondsD、240 milliseconds

考题 LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.

考题 LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

考题 In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

考题 An administrator is troubleshooting wireless connectivity issues at a client’s office and discoversthat the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?()A、802.1 1gB、802.1XC、802.11nD、802.11b

考题 Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()A、PIM sparse mode is being used.B、PIM dense mode is being used.C、The BGP multicast address family has not been configured.D、IGMP version 3 is being used.E、IP PIM neighbor filters have not been applied.

考题 What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()A、 Authentication  B、 MobilityC、 Security managementD、 Transmission of beacon framesE、 Real-time portions of MAC managementF、 Real-time aspects of the 802.11 prtocol managementG、 SNMP collection

考题 Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()A、TrunkingB、LANC、VPND、Peer to peer

考题 A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()A、802.11aB、802.11bC、802.11gD、802.11n

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 单选题An administrator is troubleshooting wireless connectivity issues at a client’s office and discoversthat the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?()A 802.1 1gB 802.1XC 802.11nD 802.11b

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.  What should you do to enforce the group policy wireless settings to the laptop computers()A Execute gpupdate/target:computer command at the command prompt on laptop computersB Execute Add a network command and leave the SSID (service set identifier) blankC Execute gpupdate/boot command at the command prompt on laptops computersD Connect each laptop computer to a wired network and log off the laptop computer and then login again.E None of the above

考题 单选题LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A  Reduction of processing in wireless controllersB  Distributed approach to authentication, encryption, and policy enforcementC  Access point discovery, information exchange, and configurationD  Provides security by blocking communication between access points and wireless clientsE  None of the other alternatives apply.

考题 单选题VOIP is being implemented on the Company network. In a properly designed network,  what is the  maximum amount of time a voice package should spend crossing a network?  ()A 90 millisecondsB 120 millisecondsC 150 millisecondsD 240 milliseconds

考题 单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A A public place where guests are free to access the wireless network.B A small office where a defined number of specific wireless devices are used.C A meeting room where various company users will access the wireless network during meetings. D An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 多选题The Cisco AutoQoS feature is being used throughout the Company VOIP network.  Which three  statements about this feature are true?()AThe mls qos global configuration command must be entered before configuring AutoQoS.BCEF must be enabled.CThe no auto qos voip command is used to disable Cisco AutoQos and revoke all  configurations generated by Cisco AutoQos.DCDP must be enabled.ESNMP must be enabled.

考题 单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A Configure a Windows Connect Now Group Policy.B Configure a Wireless Network (IEEE 802.11) Policy.C Delete the rogue network from the Network and Sharing Center on each computer.D Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

考题 单选题Static VLANs are being used on the Company network. What is true about static VLANs?()A Devices use DHCP to request their VLAN.B Attached devices are unaware of any VLANs.C Devices are assigned to VLANs based on their MAC addresses.D Devices are in the same VLAN regardless of which port they attach to.

考题 单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP

考题 单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A Frequency settings should be changedB Additional WAPs should be installedC Channels should be changedD VLANs should be added

考题 多选题What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()AAuthenticationBMobilityCSecurity managementDTransmission of beacon framesEReal-time portions of MAC managementFReal-time aspects of the 802.11 prtocol managementGSNMP collection