Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()A、Clients connected to the rogue access point must be able to connect to the c

题目

Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()

  • A、Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.
  • B、Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.
  • C、Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.
  • D、Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

相似考题
更多“Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()A、Clients connected to the rogue access point must be able to connect to the c”相关问题
  • 第1题:

    Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()

    • A、access point ethernet port set to ssl trunking
    • B、switchport set to 802.1q trunking
    • C、switchport set to ssl trunking
    • D、access point ethernet port not set to 802.1q trunking

    正确答案:B

  • 第2题:

    A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()

    • A、known internal
    • B、managed
    • C、friendly
    • D、known external

    正确答案:D

  • 第3题:

    A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()

    • A、known internal
    • B、managed
    • C、friendly
    • D、known external

    正确答案:D

  • 第4题:

    All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()

    • A、The wireless access point is using MAC address filtering
    • B、The user has connected to a nearby wireless access point from another office
    • C、The user has configured the wireless settings with the wrong encryption type
    • D、The wireless access point has SSID broadcast disabled

    正确答案:B

  • 第5题:

    You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()

    • A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.
    • B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.
    • C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).
    • D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.
    • E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.
    • F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

    正确答案:A,B,C

  • 第6题:

    Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()

    • A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
    • B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
    • C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
    • D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    正确答案:B

  • 第7题:

    A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()

    • A、Mesh
    • B、Point to point
    • C、Point to multipoint
    • D、Ring

    正确答案:C

  • 第8题:

    单选题
    Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()
    A

    clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    B

    multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.

    C

    clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.

    D

    each controller-based access point can handle only a limited amount of clients connected to the rogue access points.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()
    A

    In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.

    B

    In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.

    C

    In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).

    D

    In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.

    E

    In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.

    F

    In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)


    正确答案: F,E
    解析: 暂无解析

  • 第10题:

    单选题
    You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()
    A

    AES

    B

    PSK

    C

    SSID

    D

    TKIP

    E

    WEP


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()
    A

    Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.

    B

    Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.

    C

    Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

    D

    Clients connected to the rogue access point must be able to connect to the containment controller-based access point.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()
    A

    access point ethernet port set to ssl trunking

    B

    switchport set to 802.1q trunking

    C

    switchport set to ssl trunking

    D

    access point ethernet port not set to 802.1q trunking


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()

    • A、rogue detector
    • B、rogue containment
    • C、RLDP
    • D、RIDP

    正确答案:C

  • 第14题:

    Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()

    • A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.
    • B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
    • C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
    • D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

    正确答案:C

  • 第15题:

    Which of the following solutions will detect and disable a rogue access point?()

    • A、Port scan
    • B、Packet sniffer
    • C、IPS
    • D、IDS

    正确答案:C

  • 第16题:

    Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()

    • A、rogue detector
    • B、rogue containment
    • C、rldp
    • D、ridp

    正确答案:C

  • 第17题:

    VLANs have been enabled on an autonomous access point. In order for clients associating toVLANs other than the native VLAN to receive an IP address which of the following must beconfigured?()

    • A、access point Ethernet port set to SSL trunking
    • B、switchport set to 802.1q trunking
    • C、switchport set to SSL trunking
    • D、access point Ethernet port not set to 802.1q trunking

    正确答案:B

  • 第18题:

    Which two statements about a wireless repeater topology are true?()

    • A、A wireless repeater is an access point that is not connected to the wired LAN.
    • B、The repeater feature is only available in lightweight access point topologies.
    • C、The SSID of the root access point must be configured on the repeater access point.
    • D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
    • E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
    • F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

    正确答案:A,C

  • 第19题:

    单选题
    VLANs have been enabled on an autonomous access point. In order for clients associating toVLANs other than the native VLAN to receive an IP address which of the following must beconfigured?()
    A

    access point Ethernet port set to SSL trunking

    B

    switchport set to 802.1q trunking

    C

    switchport set to SSL trunking

    D

    access point Ethernet port not set to 802.1q trunking


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()
    A

    rogue detector

    B

    rogue containment

    C

    rldp

    D

    ridp


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()
    A

    Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.

    B

    Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.

    C

    Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.

    D

    Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements about a wireless repeater topology are true?()
    A

    A wireless repeater is an access point that is not connected to the wired LAN.

    B

    The repeater feature is only available in lightweight access point topologies.

    C

    The SSID of the root access point must be configured on the repeater access point.

    D

    This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.

    E

    This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.

    F

    To avoid interference, the repeater access point must use a different channel from what the root access point uses.


    正确答案: E,D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()
    A

    rogue detector

    B

    rogue containment

    C

    RLDP

    D

    RIDP


    正确答案: A
    解析: 暂无解析