网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
判断题
NSAPI的全称为Network layer Service Access Point Identifier。()
A
对
B
错
参考答案
参考解析
解析:
暂无解析
更多 “判断题NSAPI的全称为Network layer Service Access Point Identifier。()A 对B 错” 相关考题
考题
PRB总利用率是在时域和频域计算得来的,其参考点是『____』层和『____』层之间的服务接入点 。(PRB total utilization is calculated in the time domain and frequency domain, and its reference point is the service access point between 『____』and 『____』 layer.)
考题
How is network layer addressing accomplished in the OSI protocol suite?()
A. Internet Protocol addressB. Media Access Control addressC. Packet Layer Proto col addressD. Network Service Access Point addressE. Authority and Format Identifier address
考题
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()
A. Flex LinksB. loop-free UC. looped squareD. looped triangle
考题
When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()A、Layer 2 access link QoS designB、enterprise-to-service-provider mapping modelsC、Layer 3 link access QoS designD、service provider service level agreementsE、Layer 2 link access load balancing
考题
Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.
考题
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
考题
You work as a network technician at Company. Your boss, Ms., is interested LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of activities this protocol defines. What should you tell her? ()A、 Layer 3 addressing and distributionB、 SNMP monitoring servicesC、 Access point certification and software controlD、 Packet encapsulation, fragmentation, and formattingE、 Compression and Layer 3 address mappingF、 User behaviors
考题
In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages. E、 None of the other alternatives apply
考题
How is network layer addressing accomplished in the OSI protocol suite?()A、Internet Protocol addressB、Media Access Control addressC、Packet Layer Proto col addressD、Network Service Access Point addressE、Authority and Format Identifier address
考题
Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()A、 access point certification and software controlB、 compression and Layer 3 address mappingC、 Layer 3 addressing and distributionD、 packet encapsulation, fragmentation, and formattingE、 SNMP monitoring services
考题
In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812
考题
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()A、Flex LinksB、loop-free UC、looped squareD、looped triangle
考题
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.
考题
In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812
考题
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A、Windows native supplicantB、Odyssey Access ClientC、Junos PulseD、Network Connect
考题
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.
考题
单选题In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()A
The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.B
The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.C
The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D
The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages. E
None of the other alternatives apply
考题
多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
考题
多选题You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
考题
多选题A new lightweight access point (LAP) has been installed in the Company WLAN. Which two statements correctly describe the association process between this LAP and a WLAN controller? ()AAn access point will search for a controller using a broadcast address if using LWAPP Layer 2 and a unicast address if using LWAPP Layer 3 mode.BIf multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.CIn order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.DOnce an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.EAn access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.FIf multiple wireless controllers are detected by an access point, all of them will be used and traffic will be load balanced.
考题
单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A
Configure a Windows Connect Now Group Policy.B
Configure a Wireless Network (IEEE 802.11) Policy.C
Delete the rogue network from the Network and Sharing Center on each computer.D
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
考题
单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()A
rogue detectorB
rogue containmentC
RLDPD
RIDP
考题
单选题In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A
1813B
1645C
1646D
1812
考题
单选题Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()A
From Credential Manager, modify the generic credentials.B
From Credential Manager, modify the Windows credentials.C
From Network and Sharing Center, turn on Network discovery.D
From Network and Sharing Center, modify the wireless network connection settings.
考题
单选题How is network layer addressing accomplished in the OSI protocol suite?()A
Internet Protocol addressB
Media Access Control addressC
Packet Layer Proto col addressD
Network Service Access Point addressE
Authority and Format Identifier address
热门标签
最新试卷