Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()
第1题:
Vlans have been enabled on an autonomous access point. in order for clients associating to vlans other than the native vlan to receive an ip address. Which of the following must be configured?()
第2题:
A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()
第3题:
A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()
第4题:
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()
第5题:
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
第6题:
Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()
第7题:
A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()
第8题:
clients connected to the rogue access point must be able to connect to the containment controller-based access point.
multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
第9题:
In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
第10题:
AES
PSK
SSID
TKIP
WEP
第11题:
Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
Clients connected to the rogue access point must be able to connect to the containment controller-based access point.
第12题:
access point ethernet port set to ssl trunking
switchport set to 802.1q trunking
switchport set to ssl trunking
access point ethernet port not set to 802.1q trunking
第13题:
Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()
第14题:
Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()
第15题:
Which of the following solutions will detect and disable a rogue access point?()
第16题:
Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()
第17题:
VLANs have been enabled on an autonomous access point. In order for clients associating toVLANs other than the native VLAN to receive an IP address which of the following must beconfigured?()
第18题:
Which two statements about a wireless repeater topology are true?()
第19题:
access point Ethernet port set to SSL trunking
switchport set to 802.1q trunking
switchport set to SSL trunking
access point Ethernet port not set to 802.1q trunking
第20题:
rogue detector
rogue containment
rldp
ridp
第21题:
Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.
Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.
Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.
Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.
第22题:
A wireless repeater is an access point that is not connected to the wired LAN.
The repeater feature is only available in lightweight access point topologies.
The SSID of the root access point must be configured on the repeater access point.
This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
To avoid interference, the repeater access point must use a different channel from what the root access point uses.
第23题:
rogue detector
rogue containment
RLDP
RIDP