多項選擇題

You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines. 
What should you tell her? ()

A. Layer 3 addressing and distribution
B. SNMP monitoring services
C. Access point certification and software control
D. Packet encapsulation, fragmentation, and formatting
E. Compression and Layer 3 address mapping
F. User behaviors


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

You work as a network technician at Company. Your boss, Mrs., is interested in  LWAPP (Lightweight Access Point Protocol). 
What should you tell her regarding this technology?  ()

A. LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B. Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port  of 12223.
C. Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address  using DHCP.
D. Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of  12223.
E. Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port  of 12223.
F. Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of  12223.

3.單項選擇題

The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.
 Which statement is true about this protocol?()

A. Real-time frame exchange is accomplished within the access point.
B. The control traffic between the client and the access point is encapsulated with the LWAPP. 
C. Authentication, security, and mobility are handled by the access point.
D. Data traffic between the client and the access point is encapsulated with LWAPP.
E. None of the other alternatives apply

4.單項選擇題

LDAP is being utilized throughout the Company Wireless network. 
Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()

A. Reduction of processing in wireless controllers
B. Distributed approach to authentication, encryption, and policy enforcement
C. Access point discovery, information exchange, and configuration
D. Provides security by blocking communication between access points and wireless clients
E. None of the other alternatives apply.

5.單項選擇題

Study the exhibit shown below carefully. A Cisco Aironet Wireless LAN Client Adapter has been  installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has  been enabled during the installation and the icon appears in the system tray area in the lower right  of the desktop as shown:

What is the significance of this icon? ()

A. It indicates that the client adapter is not associated to an access point or another client.  
B. It indicates that the radio of the client adapter is disabled.
C. It indicates that the client adapter is associated to an access point or another client, but the  user is not EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that theuser is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is poor.
E. It indicates that the client adapter is associated to an access point or another client, that the  user is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the  user is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is excellent or good.

6.多項選擇題

Which three statements are true about implementing wireless LANs in the Company network using  Cisco devices?()

A. Antenna power is a relative value reference to dBi.
B. LWAPP allows encrypted communications between lightweight access points and WLAN  controllers.
C. Characteristics of antennas are directionality, gain, and polarization.
D. Power over Ethernet (PoE) is only available when a WLAN controller is integrated into the  network.
E. The WLAN solution Engine (WLSE) is used to control lightweight access points.
F. One of the advantages of the lightweight WLAN solution is that the devices act indepently.

7.多項選擇題

Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()

A. The access point has broadcast too many SSIDs.
B. The wireless client has missed too many beacons from the access point.
C. The maximum data retry count, initiated by the wireless client, is exceeded.
D. The wireless client has reduced the data rate.
E. The access point has requested client reauthentication.
F. The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

8.多項選擇題

Refer to the exhibit. The wireless user is moving from right to left towards AP2. 
What are three  reasons that the wireless client would initiate roaming?()

A. The minimum data retry count from AP1 is exceeded.
B. The maximum data retry count from AP1 is exceeded.
C. The client has missed too many beacons from AP1.
D. The client data rate from AP1 has been reduced.
E. The client has received too many beacons from AP2.
F. The client data rate from AP2 has been increased.

9.單項選擇題

Refer to the exhibit. 
Which protocol establishes an optimal path to the root in a wireless mesh  network? ()

A. Adaptive Wireless Path (AWP)
B. WLAN Quality of Service (WQoS)
C. Lightweight Access Point Protocol (LWAPP)
D. 802.1Q WLAN trunking protocol
E. Layer 2 Roaming (IAPP)

10.單項選擇題

Refer to the exhibit. 
Which statement is true about the repeater access point that is deployed in  this wireless network?()

A. The repeater access point should use a different SSID than the SSID configured on the parent  access point.
B. The repeater access point reduces the throughput in half because it receives and then retransmits  each packet on the same channel.
C. The repeater access point requires a 10 percent channel overlap with channel of the root  access point.
D. The repeater access point should use a different WEP encryption method than the WEP  encryption that is enabled on the parent access point.

最新試題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項選擇題

What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()

題型:單項選擇題

Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()

題型:多項選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題

Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half  duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()

題型:單項選擇題

During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項選擇題