A.using adapters and access points manufactured by the same company
B.overlapping the wireless cell coverage by at least 10%
C.configuring all access points to use the same channel
D.utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs
您可能感興趣的試卷
你可能感興趣的試題
A.AES-CCMP
B.PPK via IV
C.PSK
D.TKIP/MIC
A.transparent
B.auto
C.on
D.desirable
E.blocking
F.forwarding
A.Full-duplex Ethernet consists of a shared cable segment. Half-duplex Ethernet provides a point-to-point link.
B.Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex Ethernet uses a jam signal.
C.Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth.
D.Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive.
A.copier
B.microwave oven
C.toaster
D.cordless phone
E.IP phone
F.AM radio
A.VTP
B.STP
C.ISL
D.802.1Q
E.VLSM
A.buffering
B.cut-through
C.windowing
D.congestion avoidance
E.load balancing
A.Layer 2
B.Layer 3
C.Layer 4
D.Layer 5
E.Layer 6
F.Layer 7
A.By default, all defined VLANs are allowed on the trunk.
B.Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C.Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D.Each single VLAN, or VLAN range, must be specified with the vlan database command.
A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.
A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.
最新試題
Which command encrypts all plaintext passwords?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which IPsec security protocol should be used when confidentiality is required?()
Which pairing reflects a correct protocol-and-metric relationship?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()