Exhibit:
You work as a network technician at. Study the exhibit carefully. You are required configure the static WEP keys on the wireless client adapter using the Cisco ADU (Aironet Desktop Utility).
What should you have in mind when doing this?()
A.Before the client adapter WEP key is generated, all wireless infrastructure devices (such as access points, servers, etc.) must be properly configured for LEAP authentication.
B.The client adapter WEP key should be generated by the AP and forwarded to the client adapter efore the client adapter can establish communication with the wireless network.
C.In infrastructure mode the client adapter WEP key must match the WEP key used by the access point. In ad hoc mode all client WEP keys within the wireless network must match each other.
D.The client adapter WEP key should be generated by the authentication server and forwarded to the client adapter before the client adapter can establish communication with the wireless network.
E.None of the other alternatives apply
您可能感興趣的試卷
你可能感興趣的試題
A.to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless code
B.to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless products
C.to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovations
D.to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless
Exhibit:
You work as a network administrator at . You study the exhibit carefully.
What information can be drawn from the output?()
A.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter, but traffic is still forwarded across the ports.
B.Interfaces FastEthernet3/1 and FastEthernet3/2 are candidate for becoming the STP root port, but neither can realize that role until BPDUs with a superior root bridge parameter are no longer received on at least one of the interfaces.
C.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces automatically recover and resume normal operation.
D.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces will need to be administratively shut down, and brought back up, to resume normal operation.
Exhibit:
You work as a network administrator at . You study the exhibit carefully.
What can be drawn about VLANs 200 and 202 from the exhibit?()
A.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic between community ports and to promiscuous ports.
B.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic from isolated ports to a promiscuous port.
C.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic from isolated ports to a promiscuous port.
D.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic between community ports and to promiscuous ports.
A.Place unused ports in a common VLAN.
B.Implement private VLANs.
C.Implement DHCP snooping.
D.Implement port security.
E.Implement VLAN access maps.
Study the exhibit below carefully:
When a profile is configured for a user on the network in the Aironet Desktop Utility, which security option permits the configuration of AES (Advanced Encryption Standard) and Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling?()
A.Pre-Shared Key (Static WEP)
B.WPA/WPA2/CCKM
C.802.1x
D.WPA/WPA2 Passphrase
E.None of the other alternatives apply
最新試題
Which three statements are true of the Link Aggregation Control Protocol (LACP)?()
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()