單項選擇題

Exhibit:

In this scenario the signal transmitted from the AP is reflected off a wall, resulting in multipathinterference at the client end (ClientA). Which of the following statements is true?()

A.The transmitted signal from the AP arrives at the client at slightly different times resulting inphase shifting
B.Multipath interference can be solved by using dual antennas
C.If signal 2 is close to 360 degrees out of phase with signal 1, the result is essentially zero signalor a dead spot in the WLAN
D.Multipath interference is less of an issue when using a DSSS technology because multipath isfrequency selective
E.If signal 1 is in phase with signal 2, the result is essentially zero signal or a dead spot in theWLAN
F.None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Exhibit:

You work as a network technician. Please study the exhibit carefully. In this wireless network, theLAP (lightweight access point) attempts to register to a WLC (Wireless LAN Controller). What kindof message is transmitted?()

A.The lightweight access point will send Layer 2 and Layer 3 Lightweight Access Point (LWAPP)mode discovery request messages at the same time
B.The lightweight access point will send Layer 3 Lightweight Access Point (LWAPP) modediscovery request messages only
C.The lightweight access point will send Layer 2 Lightweight Access Point (LWAPP) mode discovery request messages. If the attempt fails, the LAP will try Layer 3 LWAPP WLC discovery
D.The lightweight access point will send Layer 2 Lightweight Access Point (LWAPP) modediscovery request messages only

2.單項選擇題Which statement best describes Cisco supervisor engine redundancy using Stateful Switchover?()

A.Switchover ensures that Layer 2 through Layer 4 traffic is not interrupted
B.Redundancy requires BGP, OSPF, EIGRP, or IS-IS
C.Redundancy provides fast supervisor switchover for all Cisco Catalyst 6500 series switches
D.Switchover can be caused by clock synchronization failure between supervisors

3.多項選擇題Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancyusing NSF?()

A.independent of SSO
B.NSF combined with SSO enables supervisor engine load balancing
C.supported by RIPv2, OSPF, IS-IS, and EIGRP
D.supports IPv4 and IPv6 multicast
E.prevents route flapping
F.dependent on FIB tables

4.多項選擇題Company has a Catalyst 6500 and you need to configure redundancy between the supervisormodules. With route processor redundancy (RPR+), the redundant supervisor engine is fullyinitialized and configured, which shortens the switchover time if the active supervisor engine fails.Which three statements are true about the RPR + operations when the redundant supervisorengine switched over the failed primary supervisor engine?()

A.Static IP routes are maintained across a switchover because they are configured from entries inthe configuration file
B.Information about dynamic routing states, maintained on the active supervisor engine, issynchronized to the redundant supervisor engine and is transferred during the switchover
C.Information about dynamic routing states, maintained on the active supervisor engine, is notsynchronized to the redundant supervisor engine and is lost on switchover
D.The Forwarding Information Base (FIB) tables are cleared on a switchover. As a result, routedtraffic is interrupted until route tables reconverge
E.Static IP routes are cleared across a switchover and recreated from entries in the configurationfile on the redundant supervisor engine
F.The Forwarding Information Base (FIB) tables are maintained during the switchover. As aresult, routed traffic continues without any interruption when the failover occurs

5.多項選擇題An SVI has been configured on a device. Which two statements are true about a switched virtualinterface (SVI)?()

A.An SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministration
B.Multiple SVIs can be associated with a VLAN
C.SVI is another name for a routed port
D.An SVI is created by entering the no switchport command in interface configuration mode
E.An SVI provides a default gateway for a VLAN

7.多項選擇題What is true about access control on bridged and routed VLAN traffic?()

A.Router ACLs can be applied to the input and output directions of a VLAN interface
B.Bridged ACLs can be applied to the input and output directions of a VLAN interface
C.Only router ACLs can be applied to a VLAN interface
D.VLAN maps and router ACLs can be used in combination
E.VLAN maps can be applied to a VLAN interfac

8.單項選擇題Switch SW1 has been configured with Private VLANs. With that type of PVLAN port should thedefault gateway be configured?()

A.Trunk
B.Isolated
C.Primary
D.Community
E.Promiscuous
F.None of the other alternatives apply

9.單項選擇題

Refer to the exhibit. The user who is connected to interface FastEthernet 0/1 is on VLAN 10 andcannot access network resources. On the basis of the information in the exhibit, which commandsequence would correct the problem?()

A.SW1(config)# interface fastethernet 0/1   SW1(config-if)# no shut
B.SW1(config)# interface fastethernet 0/1   SW1(config-if)# switchport mode access   SW1(config-if)# switchport access vlan 10
C.SW1(config)# vlan 10   SW1(config-vlan)# state active
D.SW1(config)# interface fastethernet 0/1   SW1(config-if)# switchport mode access
E.SW1(config)# vlan 10   SW1(config-vlan)# no shut

最新試題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:問答題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項選擇題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

題型:多項選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題