单选题Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A port-based RADIUSB 802.1q trunk

题目
单选题
Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()
A

port-based RADIUS

B

802.1q trunking

C

inline power

D

protected port


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“Two access points running the core feature set are connected”相关问题
  • 第1题:

    To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()

    • A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
    • B、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
    • C、 to two core switches from redundant distribution switches connected with Layer 2 link
    • D、 to two core switches from redundant distribution switches connected with Layer 3 link
    • E、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

    正确答案:D

  • 第2题:

    Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()

    • A、port-based RADIUS
    • B、802.1q trunking
    • C、inline power
    • D、protected port

    正确答案:D

  • 第3题:

    You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()

    • A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.
    • B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.
    • C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).
    • D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.
    • E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.
    • F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

    正确答案:A,B,C

  • 第4题:

    In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()

    • A、PSK authentication
    • B、EAP authentication
    • C、WPA authentication
    • D、Web authentication

    正确答案:D

  • 第5题:

    A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()

    • A、 Cisco Aironet 1000 Series
    • B、 Cisco Aironet 1100 Series
    • C、 Cisco Aironet 1200 Series
    • D、 Cisco Aironet 1300 Series
    • E、 Cisco Aironet 1400 Series

    正确答案:D

  • 第6题:

    In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()

    • A、1813
    • B、1645
    • C、1646
    • D、1812

    正确答案:D

  • 第7题:

    A customer has just purchased an 8-core POWER 570 which has two dual port 1 Gbps  Integrated Virtual Ethernet (IVE) adapters. The customer wants to implement queue pairs (QPs) to take advantage of parallel processing of network traffic to its client logical partitions. Assuming that the system is to utilize the IVEs in both CECs,  which configuration will allow a logical partition to utilize the entire eight cores for network traffic processing?()

    • A、 Set Multiple Core Scaling (MCS) value of the port group to 8 and set multiple core parameter of the client Ethernet adapters to yes.
    • B、 Set Multiple Core Scaling (MCS) value of the port group to 4 and set multiple core parameter of the client Ethernet adapters to yes.
    • C、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 4 and set multiple core parameter of the client Ethernet adapters to yes.
    • D、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 8 and set the multiple core parameter of the client Ethernet adapters to yes.

    正确答案:A

  • 第8题:

    单选题
    Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()
    A

    port-based RADIUS

    B

    802.1q trunking

    C

    inline power

    D

    protected port


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()
    A

    port-based radius

    B

    802.1q trunking

    C

    inline power

    D

    protected port


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()
    A

    It is compatible with all wireless clients.

    B

    It reduces roaming latency through reduced client RF channel scanning enhancements.

    C

    It reduces roaming latency to targeted times of less than 75ms.

    D

    Roaming occurs without reauthentication through a centralized RADIUS server.

    E

    It is enabled through WLSE deployment.


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()
    A

    clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    B

    multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.

    C

    clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.

    D

    each controller-based access point can handle only a limited amount of clients connected to the rogue access points.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()
    A

     a minimum of one Cisco 4100 Series WLAN Controller

    B

     one WDS per subnet

    C

     a minimum of one Wireless LAN Services Module

    D

     all clients using Cisco Aironet Wireless LAN Adapters


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two components are unique to controller-based wireless installations? ()

    • A、 Mobility Services Engine
    • B、 WLAN controller
    • C、 Cisco Wireless Control System
    • D、 rugged/exterior access points
    • E、 interior access points

    正确答案:A,B

  • 第14题:

    Which set of rf characteristics is directly monitored by the core feature set products?()

    • A、interference,utilization,and rf diffraction
    • B、clients,utilization,and multipath interference
    • C、noise,interference,and coverage holes
    • D、noise interference,and multipath interference

    正确答案:B

  • 第15题:

    Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()

    • A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
    • B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
    • C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
    • D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    正确答案:B

  • 第16题:

    In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()

    • A、1813
    • B、1645
    • C、1646
    • D、1812

    正确答案:D

  • 第17题:

    A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()

    • A、 a minimum of one Cisco 4100 Series WLAN Controller
    • B、 one WDS per subnet
    • C、 a minimum of one Wireless LAN Services Module
    • D、 all clients using Cisco Aironet Wireless LAN Adapters

    正确答案:B

  • 第18题:

    Which two statements about a wireless repeater topology are true?()

    • A、A wireless repeater is an access point that is not connected to the wired LAN.
    • B、The repeater feature is only available in lightweight access point topologies.
    • C、The SSID of the root access point must be configured on the repeater access point.
    • D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
    • E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
    • F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

    正确答案:A,C

  • 第19题:

    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()

    • A、When you configure access to the wired network at home, set the wired network adapter location type to Private.
    • B、When you configure access to the wired network at home, set the wired network adapter location type to Public.
    • C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
    • D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

    正确答案:A,D

  • 第20题:

    多选题
    Which two components are unique to controller-based wireless installations? ()
    A

    Mobility Services Engine

    B

    WLAN controller

    C

    Cisco Wireless Control System

    D

    rugged/exterior access points

    E

    interior access points


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    多选题
    The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()
    A

    security contexts

    B

    - transparent firewall

    C

    WebVPN

    D

    Active/Active failover

    E

    low latency queuing

    F

    AIP-SSM intrusion prevention


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    单选题
    In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()
    A

    1813

    B

    1645

    C

    1646

    D

    1812


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()
    A

     to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link

    B

     to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link

    C

     to two core switches from redundant distribution switches connected with Layer 2 link

    D

     to two core switches from redundant distribution switches connected with Layer 3 link

    E

     to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()
    A

     Cisco Aironet 1000 Series

    B

     Cisco Aironet 1100 Series

    C

     Cisco Aironet 1200 Series

    D

     Cisco Aironet 1300 Series

    E

     Cisco Aironet 1400 Series


    正确答案: B
    解析: 暂无解析