多項(xiàng)選擇題

You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines. 
What should you tell her? ()

A. Layer 3 addressing and distribution
B. SNMP monitoring services
C. Access point certification and software control
D. Packet encapsulation, fragmentation, and formatting
E. Compression and Layer 3 address mapping
F. User behaviors


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

You work as a network technician at Company. Your boss, Mrs., is interested in  LWAPP (Lightweight Access Point Protocol). 
What should you tell her regarding this technology?  ()

A. LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B. Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port  of 12223.
C. Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address  using DHCP.
D. Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of  12223.
E. Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port  of 12223.
F. Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of  12223.

3.單項(xiàng)選擇題

The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.
 Which statement is true about this protocol?()

A. Real-time frame exchange is accomplished within the access point.
B. The control traffic between the client and the access point is encapsulated with the LWAPP. 
C. Authentication, security, and mobility are handled by the access point.
D. Data traffic between the client and the access point is encapsulated with LWAPP.
E. None of the other alternatives apply

4.單項(xiàng)選擇題

LDAP is being utilized throughout the Company Wireless network. 
Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()

A. Reduction of processing in wireless controllers
B. Distributed approach to authentication, encryption, and policy enforcement
C. Access point discovery, information exchange, and configuration
D. Provides security by blocking communication between access points and wireless clients
E. None of the other alternatives apply.

5.單項(xiàng)選擇題

Study the exhibit shown below carefully. A Cisco Aironet Wireless LAN Client Adapter has been  installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has  been enabled during the installation and the icon appears in the system tray area in the lower right  of the desktop as shown:

What is the significance of this icon? ()

A. It indicates that the client adapter is not associated to an access point or another client.  
B. It indicates that the radio of the client adapter is disabled.
C. It indicates that the client adapter is associated to an access point or another client, but the  user is not EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that theuser is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is poor.
E. It indicates that the client adapter is associated to an access point or another client, that the  user is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the  user is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is excellent or good.

最新試題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:?jiǎn)雾?xiàng)選擇題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half  duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true about BPDU port-guard and BPDU filtering?()

題型:多項(xiàng)選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:?jiǎn)雾?xiàng)選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:?jiǎn)雾?xiàng)選擇題