网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP orEAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attemptsreport on the Cisco Secure ACS,you find this error:"Unknown network access server NAS." Which problemmayhave caused this failure?()
A

misconfigured IP address of the AAA server on the access point

B

misconfigured EAP type on the access point

C

misconfigured IP address of the access point on the AAA server

D

misconfigured EAP type on the AAA server


参考答案

参考解析
解析: 暂无解析
更多 “单选题In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP orEAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attemptsreport on the Cisco Secure ACS,you find this error:"Unknown network access server NAS." Which problemmayhave caused this failure?()A misconfigured IP address of the AAA server on the access pointB misconfigured EAP type on the access pointC misconfigured IP address of the access point on the AAA serverD misconfigured EAP type on the AAA server” 相关考题
考题 Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()A、 It is compatible with all wireless clients.B、 It reduces roaming latency through reduced client RF channel scanning enhancements.C、 It reduces roaming latency to targeted times of less than 75ms.D、 Roaming occurs without reauthentication through a centralized RADIUS server.E、 It is enabled through WLSE deployment.

考题 Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabledB、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authenticationC、Clients and server are not using certificatesD、Clients have been set to validate the server identity

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()A、a shared keyB、network EAPC、open authentication plus EAPD、open authentication plus MAC

考题 Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A、port-based RADIUSB、802.1q trunkingC、inline powerD、protected port

考题 Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

考题 Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

考题 When using which application may it be necessary to deploy access points in monitor-only mode?()A、voipB、rfid tagsC、data collectionD、802.11b and g clients

考题 In a deployment using the lightweight access points, clients set up to authenticate with EAP-PEAPor EAP-Cisco Wireless (LEAP) cannot authenticate. Upon inspection of the Failed Attempts reportyou see the following error: "Unknown network access server NAS."  What two problems can causethis type of failure?()A、misconfigured IP address of the AAA server on the wireless controllerB、misconfigured IP address of the wireless LAN controller on the AAA serverC、misconfigured EAP type on the wireless LAN controllerD、misconfigured shared secret on the wireless LAN controllerE、misconfigured EAP type on the AAA server

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()A、 Cisco Aironet 1000 SeriesB、 Cisco Aironet 1100 SeriesC、 Cisco Aironet 1200 SeriesD、 Cisco Aironet 1300 SeriesE、 Cisco Aironet 1400 Series

考题 The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()A、 It supports eight different data rates.B、 It is fully backward compatible with 802.11bC、 It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.D、 It is only compatibly with the 11 Mbps 802.11b transfer rate.E、 It has three non-overlapping channels in its channel options.

考题 Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabled.B、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.C、Clients and server are not using certificates.D、Clients have been set to validate the server identity.

考题 A standalone wireless AP solution is being installed into the campus infrastructure. The access points appear to boot correctly, however, wireless clients are not obtaining correct access. You verify that the local switch configuration connected to the access point appears as the following:  interface ethernet 0/1  switchport access vlan 10  switchport mode access  spanning-tree portfast  mls qos trust dscp  What is the most likely issue causing the problem?()A、QoS trust should not be configured on a port attached to a standalone AP.B、QoS trust for switchport mode access should be defined as "cos".C、switchport mode should be defined as "trunk" with respective QoS.D、switchport access vlan should be defined as "1".

考题 A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

考题 In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP orEAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attempts reporton the Cisco Secure ACS, you find this error: "Unknown network access server NAS."  Which problem may have caused this failure?()A、misconfigured IP address of the AAA server on the access pointB、misconfigured EAP type on the access pointC、misconfigured IP address of the access point on the AAA serverD、misconfigured EAP type on the AAA server

考题 You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application.You need to ensure that on deployment, the application meets the following requirements:  (1)It is executed on the client computer   (2)It is removed from the client computer after the application is closed   (3)It is not displayed in theAdd/Remove programs panel on the client computer    What should you do?()A、Deploy the application to a central network server.Access the application by using the Remote Desktop Connection tool.B、Deploy the application by using the ClickOnce technology.Use the Mage exe tool to set the Online Only option in the deployment manifest.C、Deploy the application by using the ClickOnce technology.Set the Install attribute of the deployment tag to true in the deployment manifest.D、Deploy the application to a CDROM by using the ClickOnce technology.Execute the application from the CDROM

考题 Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 单选题Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A port-based RADIUSB 802.1q trunkingC inline powerD protected port

考题 单选题When using which application may it be necessary to deploy access points in monitor-only mode?()A voipB rfid tagsC data collectionD 802.11b and g clients

考题 多选题The Company wireless network is using 802.11G access points.  Which two statements are true  about these access points? ()AIt supports eight different data rates.BIt is fully backward compatible with 802.11bCIt provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed  environment where both clients are present.DIt is only compatibly with the 11 Mbps 802.11b transfer rate.EIt has three non-overlapping channels in its channel options.

考题 多选题Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()AIt is compatible with all wireless clients.BIt reduces roaming latency through reduced client RF channel scanning enhancements.CIt reduces roaming latency to targeted times of less than 75ms.DRoaming occurs without reauthentication through a centralized RADIUS server.EIt is enabled through WLSE deployment.

考题 单选题What does a Cisco Unified Wireless IP Phone 7921G deployment require()?A more access points than a data networkB fewer access points than a data networkC less SNR than a data networkD specific relative access point placement

考题 单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A clients connected to the rogue access point must be able to connect to the containment controller-based access point.B multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

考题 多选题What are two functions that WLAN management provides? ()Aenhances securityBsystem testsCaccommodates additional routersDsimplifies daily operationsEuses standalone access points

考题 单选题A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A  a minimum of one Cisco 4100 Series WLAN ControllerB  one WDS per subnetC  a minimum of one Wireless LAN Services ModuleD  all clients using Cisco Aironet Wireless LAN Adapters

考题 单选题A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()A  Cisco Aironet 1000 SeriesB  Cisco Aironet 1100 SeriesC  Cisco Aironet 1200 SeriesD  Cisco Aironet 1300 SeriesE  Cisco Aironet 1400 Series