单选题In order for a controller-based access point to be allowed to participate in aggressive load balancing,it must have heard the client within how many seconds?()A 15B 10C 1D 5

题目
单选题
In order for a controller-based access point to be allowed to participate in aggressive load balancing,it must have heard the client within how many seconds?()
A

15

B

10

C

1

D

5


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题In order for a controller-based access point to be allowed to participate in aggressive load balancing,it must have heard the client within how many seconds?()A 15B 10C 1D 5”相关问题
  • 第1题:

    In order for a controller-based access point to be allowed to participate in aggressive load balancing, it musthave heard the client within how many seconds?()

    • A、1
    • B、5
    • C、10
    • D、15

    正确答案:B

  • 第2题:

    Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()

    • A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
    • B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
    • C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
    • D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    正确答案:B

  • 第3题:

    For a lightweight access point to participate in aggressive load balancing,it must have heard the client for how many seconds?()

    • A、15
    • B、10
    • C、1
    • D、5

    正确答案:B

  • 第4题:

    In order for a controller-based access point to be allowed to participate in aggressive load balancing,it must have heard the client within how many seconds?()

    • A、15
    • B、10
    • C、1
    • D、5

    正确答案:D

  • 第5题:

    You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()

    • A、AES
    • B、PSK
    • C、SSID
    • D、TKIP
    • E、WEP

    正确答案:C

  • 第6题:

    You have an Exchange Server 2010 organization.  The organization contains two servers named Server1 and Server2.  Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG).  You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server  What should you include in your plan?()

    • A、On Server1 and Server2, install the Client Access server role. Implement failover clustering.
    • B、On Server1 and Server2, install the Client Access server role. Configure network interface card (NIC) teaming on each server.
    • C、Deploy two new Client Access servers. Implement load balancing by using DNS round robin.Create a Client Access server array.
    • D、Deploy two new Client Access servers. Implement load balancing by using a Windows Network Load Balancing cluster. Create a Client Access server array.

    正确答案:D

  • 第7题:

    单选题
    Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()
    A

    clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    B

    multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.

    C

    clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.

    D

    each controller-based access point can handle only a limited amount of clients connected to the rogue access points.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()
    A

    Client Access server array and hardware load-balancer

    B

    database availability group (DAG) and hardware load-balancer

    C

    failover clustering and database availability group (DAG)

    D

    Windows Network Load Balancing and failover clustering


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()
    A

    Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.

    B

    Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.

    C

    Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.

    D

    Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    In order for a controller-based access point to be allowed to participate in aggressive loadbalancing, it must have heard the client within how many seconds?()
    A

    15

    B

    10

    C

    1

    D

    5


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()
    A

    Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.

    B

    Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.

    C

    Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

    D

    Clients connected to the rogue access point must be able to connect to the containment controller-based access point.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    How does a controller-based access point configured to operate in sniffer mode behave?()
    A

    allows client traffic, captures data on all channels

    B

    allows client traffic, captures data on a single channel

    C

    allows no client traffic, captures data on all channels

    D

    allows no client traffic, captures data on a single channel


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()

    • A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.
    • B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
    • C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
    • D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

    正确答案:C

  • 第14题:

    In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()

    • A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.
    • B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.
    • C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
    • D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  
    • E、 None of the other alternatives apply

    正确答案:D

  • 第15题:

    How does a controller-based access point configured to operate in sniffer mode behave?()

    • A、allows client traffic, captures data on all channels
    • B、allows client traffic, captures data on a single channel
    • C、allows no client traffic, captures data on all channels
    • D、allows no client traffic, captures data on a single channel

    正确答案:D

  • 第16题:

    In order for a controller-based access point to be allowed to participate in aggressive loadbalancing,it must have heard the client within how many seconds?()

    • A、15
    • B、10
    • C、1
    • D、5

    正确答案:D

  • 第17题:

    You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()

    • A、Client Access server array and hardware load-balancer
    • B、database availability group (DAG) and hardware load-balancer
    • C、failover clustering and database availability group (DAG)
    • D、Windows Network Load Balancing and failover clustering

    正确答案:A

  • 第18题:

    单选题
    In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()
    A

     The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.

    B

     The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.

    C

     The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.

    D

     The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  

    E

     None of the other alternatives apply


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    In order for a controller-based access point to be allowed to participate in aggressive load balancing, it musthave heard the client within how many seconds?()
    A

    1

    B

    5

    C

    10

    D

    15


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    In order for a controller-based access point to be allowed to participate in aggressive load balancing,it must have heard the client within how many seconds?()
    A

    15

    B

    10

    C

    1

    D

    5


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()
    A

    AES

    B

    PSK

    C

    SSID

    D

    TKIP

    E

    WEP


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    For a lightweight access point to participate in aggressive load balancing, it must have heard the client for how many seconds?()
    A

    15

    B

    10

    C

    1

    D

    5


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You have an Exchange Server 2010 organization.  The organization contains two servers named Server1 and Server2.  Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG).  You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server  What should you include in your plan?()
    A

    On Server1 and Server2, install the Client Access server role. Implement failover clustering.

    B

    On Server1 and Server2, install the Client Access server role. Configure network interface card (NIC) teaming on each server.

    C

    Deploy two new Client Access servers. Implement load balancing by using DNS round robin.Create a Client Access server array.

    D

    Deploy two new Client Access servers. Implement load balancing by using a Windows Network Load Balancing cluster. Create a Client Access server array.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()
    A

    Create and configure a Client Access server array,and then install a hardware load balancer.

    B

    Create and configure a Client Access server array,and then install Windows Network Load Balancing on both servers.

    C

    Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then implement DNS round robin.

    D

    Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then install Windows Network Load Balancing.


    正确答案: B
    解析: 暂无解析