SSID
RTS/CTS
AES-CCMP
TKIP/MIC
RF channel
authentication method
第1题:
A.SSID
B.RTS/CTS
C.AES-CCMP
D.TKIP/MIC
E.RF channel
F.authentication method
第2题:
What three search criteria does cisco wcs use to search for wireless controllers?()
第3题:
Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
第4题:
You are the network administrator for Company. Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers. What should you do?()
第5题:
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()
第6题:
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
第7题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第8题:
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()
第9题:
Source interface where encrypted traffic originates
IP address for the remote peer
Transform set for the IPsec tunnel
Interface for the VPN connection
第10题:
Change System User Interface
TCP/IP Further Configuration
TCP/IP Minimum Configuration
Network Installation Management
第11题:
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
第12题:
need one access point
want to provide unsecured wireless access
need between two and three access points
want to provide employee wireless access
need more than four access points
want to provide guest wireless access
第13题:
What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()
第14题:
What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()
第15题:
You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()
第16题:
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()
第17题:
What are three basic parameters to configure on a wireless access point?()
第18题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()
第19题:
Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()
第20题:
controller name
outdoor area
floor area
networks
mac address
ip address
第21题:
AlarmSeverity
AlarmKeepalive
AlarmTraits
EventMedia
EventAlarm
EventAction
第22题:
SSID
RTS/CTS
AES-CCMP
TKIP/MIC
RF channel
authentication method
第23题:
IBSS
BSS
ESS
SSID
第24题:
Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server