多項選擇題Which two statements about the open and shared key wireless-authentication methods are true? ()

A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題What are two features of WCS wireless management? ()

A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement

2.多項選擇題What are two features of WLSE-Express wireless management? ()

A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. centralized management that requires an external AAA server
D. centralized management with integrated AAA server
E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days

3.多項選擇題When a router converts analog signals to digital signals, what three steps are always included in the process? ()

A. involution
B. encoding
C. sampling
D. quantization
E. compression
F. companding

4.單項選擇題Which statement is true about the comparison of voice traffic with video traffic?()

A. Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
B. Latency requirements are less stringent for video traffic than for voice traffic.
C. Video traffic is less sensitive to dropped packets than for voice traffic.
D. Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.
E. Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
F. Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

5.多項選擇題What are two steps needed to define a QoS policy for a traffic class?()

A. Determine a minimum bandwidth guarantee.
B. Determine interfaces to which to apply policy.
C. Assign priorities to the class.
D. Configure access control lists.

6.多項選擇題What are three considerations when choosing the QoS model to deploy in a network? ()

A. the routing protocols being utilized in the network
B. the applications utilizing the network
C. the traffic destinations
D. network addressing scheme
E. cost of implementation
F. the amount of the control needed of the resources

7.多項選擇題Which three statements are true about the application of QoS models? ()

A. The DiffServ model requires applications to signal the network with QoS requirements.
B. The DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addresses.
C. The DiffServ model requires RSVP.
D. The best effort model is suitable for applications such as file transfer and e-mail
E. The IntServ model requires applications to signal the network with QoS requirements.
F. The IntServ model attempts to deliver a level of service based on the QoS specified by each packet

8.多項選擇題Which two statements about the Wireless Location Appliance are true? ()

A. A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.
B. Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).
C. The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.
D. The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).
E. The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.

9.多項選擇題Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true? ()

A. The SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.
B. The SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.
C. The SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.
D. The SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.
E. The SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.
F. The SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.

10.多項選擇題Which two statements about the DiffServ model are true? ()

A. A class can be identified as a single application, multiple applications with similar service needs, or be based on the source or destination IP addresses.
B. A drawback of the DiffServ model is that it does not provide backward compatibility with devices that can only use the ToS field.
C. DiffServ uses the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs). 
D. The DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field.
E. The first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value.
F. The primary goal of DiffServ is scalability.

最新試題

Which Control Plane Policing (CoPP) statement is true?()

題型:單項選擇題

What are the three models of quality of service (QoS) in a network?()

題型:多項選擇題

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

題型:多項選擇題

Which two characteristics are common between traffic policing and traffic shaping?()

題型:多項選擇題

Which three practices are important to the implementation of a DiffServ QoS architecture?()

題型:多項選擇題

Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()

題型:單項選擇題

When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()

題型:單項選擇題

Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()

題型:多項選擇題

Within the WMM policy, how many default QoS radio access categories are there?()

題型:單項選擇題

Which of the items stated is typically the most expensive method of improving QoS across WAN links?()

題型:單項選擇題