單項選擇題

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()

A. The data traffic between the access point and controller is not encrypted.
B. The data traffic is encapsulated with LWAPP.
C. The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.
D. The data traffic is encrypted with AES.
E. All of the above


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

Access Point R1 is an Aironet 1200 that has been converted from autonomous mode to LWAPP  mode. After this conversion, which two statements are true? ()

A. LWAPP-enabled access points can still communicate with Wireless Domain Services (WDS)  devices.
B. An LWAPP-enabled access point console port provides read-only access to the unit.
C. LWAPP-enabled access points support Layer 2 LWAPP.
D. LWAPP-enabled access points must get an IP address and discover the controller using  DHCP, DNS, or an IP subnet broadcast.
E. An LWAPP-enabled access point console port provides read-write access to the unit.

2.多項選擇題

What are three functions of the Cisco wireless LAN controller, 
which is being used in the Company  Centralized WLAN solution network? ()


A. Authentication  
B. Mobility
C. Security management
D. Transmission of beacon frames
E. Real-time portions of MAC management
F. Real-time aspects of the 802.11 prtocol management
G. SNMP collection


3.多項選擇題

A new lightweight access point (LAP) has been installed in the Company WLAN.
 Which two  statements correctly describe the association process between this LAP and a WLAN controller? ()

A. An access point will search for a controller using a broadcast address if using LWAPP Layer 2  and a unicast address if using LWAPP Layer 3 mode.
B. If multiple wireless controllers are detected by an access point, the controller with the fewest  associated access points is chosen to associate with.
C. In order to associate in Layer 3 mode, the access point must have been preconfigured with an  IP address.
D. Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP  address from the controller.
E. An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not  successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.
F. If multiple wireless controllers are detected by an access point, all of them will be used and  traffic will be load balanced.

4.單項選擇題

Refer to the exhibit.  
What type of message will be used by the lightweight access point (LAP) in an attempt to locate  the wireless LAN controller (WLC)? ()

A. The LAP will send out a DNS request. In return, the DNS server will provide the WLC domain  name.
B. The LAP will send out a Layer 3 LWAPP discovery request to the WLC on the wireless network. 
C. The LAP will send out a DHCP request. In return, the DHCP server will provide the IP  addresses for the LAP and the WLC.
D. The LAP will send out a Layer 2 LWAPP discovery request to the WLC on the wireless network.

5.多項選擇題

You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines. 
What should you tell her? ()

A. Layer 3 addressing and distribution
B. SNMP monitoring services
C. Access point certification and software control
D. Packet encapsulation, fragmentation, and formatting
E. Compression and Layer 3 address mapping
F. User behaviors

6.多項選擇題

You work as a network technician at Company. Your boss, Mrs., is interested in  LWAPP (Lightweight Access Point Protocol). 
What should you tell her regarding this technology?  ()

A. LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B. Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port  of 12223.
C. Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address  using DHCP.
D. Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of  12223.
E. Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port  of 12223.
F. Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of  12223.

8.單項選擇題

The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.
 Which statement is true about this protocol?()

A. Real-time frame exchange is accomplished within the access point.
B. The control traffic between the client and the access point is encapsulated with the LWAPP. 
C. Authentication, security, and mobility are handled by the access point.
D. Data traffic between the client and the access point is encapsulated with LWAPP.
E. None of the other alternatives apply

9.單項選擇題

LDAP is being utilized throughout the Company Wireless network. 
Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()

A. Reduction of processing in wireless controllers
B. Distributed approach to authentication, encryption, and policy enforcement
C. Access point discovery, information exchange, and configuration
D. Provides security by blocking communication between access points and wireless clients
E. None of the other alternatives apply.

10.單項選擇題

Study the exhibit shown below carefully. A Cisco Aironet Wireless LAN Client Adapter has been  installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has  been enabled during the installation and the icon appears in the system tray area in the lower right  of the desktop as shown:

What is the significance of this icon? ()

A. It indicates that the client adapter is not associated to an access point or another client.  
B. It indicates that the radio of the client adapter is disabled.
C. It indicates that the client adapter is associated to an access point or another client, but the  user is not EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that theuser is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is poor.
E. It indicates that the client adapter is associated to an access point or another client, that the  user is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the  user is authenticated if the client adapter is configured for EAP authentication, and that the signal  strength is excellent or good.

最新試題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:單項選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項選擇題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:單項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:單項選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:單項選擇題

During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題