單項(xiàng)選擇題Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?()

A.using adapters and access points manufactured by the same company
B.overlapping the wireless cell coverage by at least 10%
C.configuring all access points to use the same channel
D.utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which encryption type does WPA2 use?()

A.AES-CCMP
B.PPK via IV
C.PSK
D.TKIP/MIC

2.多項(xiàng)選擇題Which are valid modes for a switch port used as a VLAN trunk? (Choose three.)()

A.transparent
B.auto
C.on
D.desirable
E.blocking
F.forwarding

3.單項(xiàng)選擇題Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?()

A.Full-duplex Ethernet consists of a shared cable segment. Half-duplex Ethernet provides a point-to-point link.
B.Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex Ethernet uses a jam signal.
C.Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth.
D.Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive.

6.多項(xiàng)選擇題Which of the following are types of flow control? (Choose three.)()

A.buffering
B.cut-through
C.windowing
D.congestion avoidance
E.load balancing

7.單項(xiàng)選擇題Acknowledgements, sequencing, and flow control are characteristics of which OSI layer?()

A.Layer 2
B.Layer 3
C.Layer 4
D.Layer 5
E.Layer 6
F.Layer 7

8.單項(xiàng)選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A.By default, all defined VLANs are allowed on the trunk.
B.Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C.Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D.Each single VLAN, or VLAN range, must be specified with the vlan database command.

9.單項(xiàng)選擇題When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined?()

A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.

10.單項(xiàng)選擇題What is one reason that WPA encryption is preferred over WEP?()

A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.

最新試題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:?jiǎn)雾?xiàng)選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:?jiǎn)雾?xiàng)選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:?jiǎn)雾?xiàng)選擇題