A.WEP
B.HTTP
C.SSID
D.EAP
第1题:
Wireless components must work together for interoperability and performance. Which standard has specifications that are 2.4 GHz, 54 Mb/s, and a range of 150 feet?()
第2题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第3题:
Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()
第4题:
What is the objective of the Cisco Compatible Extensions program?()
第5题:
Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?()
第6题:
A system is being designed with many LPARs which will be clients of dual VIO Servers. The VIO Servers must be redundant so that, in the event of scheduled maintenance, the clients do not need to be shut down. Which of these strategies could be used to ensure that the client LPARs continue to be able to use the network in the event of a VIO Server being shut down?()
第7题:
Your network includes the servers shown in the following table. Server n ame Operating s ystem Role s ervices S erver 1 Windows Server 2008 R2 Standard RDS Licensing S erver 2 Windows Server 2008 R2 Enterprise Remote Desktop Server3 Windows Server 2008 R2 Enterprise Remote Desktop Per-device Remote Desktop Services client access licenses (RDS CALs) are installed on Server1. After you refresh a group of client computers with Windows 7, users on those computers can no longer connect to Server2. You need to ensure that the users can connect to remote applications. What should you do?()
第8题:
802.11n
802.11b
802.11a
802.11g
第9题:
to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless code
to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless products
to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovations
to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless
第10题:
Set the security type to the No authentication (Open) option.
Configure the wired and wireless network adapters as a network bridge.
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
第11题:
variations of his own mental abilities from season to season
the result of research done by him and other scientists among peoples in different climates
detailed records of temperature changes in different places
detailed records of different ways of thinking among peoples in different climates
第12题:
WEP
HTTP
SSID
EAP
第13题:
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()
第14题:
Is an open standard promotes interoperability among the wireless client adapters and dial-in servers from different vendors.()
第15题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第16题:
Under which three conditions does a client initiate roaming between wireless cells in the Company WLAN? ()
第17题:
Which two statements about the open and shared key wireless-authentication methods are true?()
第18题:
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?()
第19题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK
第20题:
You should consider using TCP ports 80 and 443 from the client subnet to TESTKING-EX13 You should also open TCP port 1024 to 65535 from the client subnet to TESTKING-EX11.
You should consider using TCP ports 80, 135 and 1024 to 65535 from the client subnet to TESTKING-EX11.You should also open TCP port 25 to TESTKING-EX12.
You should consider using TCP ports 441, 135, and 1024 to 65535 from the client subnet to TESTKING-EX11.You should also open TCP port 135 and 1024 to 65535 from the subnet to TESTKING-EX13.
You should consider using TCP ports 80, 443, 135 and 1024 to 65535 from the client subnet to TESTKING-EX13.You should also open TCP port 25 to TESTKING-EX13.
第21题:
The access point has broadcast too many SSIDs.
The wireless client has missed too many beacons from the access point.
The maximum data retry count, initiated by the wireless client, is exceeded.
The wireless client has reduced the data rate.
The access point has requested client reauthentication.
The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
第22题:
Create two virtual adapters on the client, each one from a separate Virtual IO Server
Enable dead gateway detection on the client so that the network traffic can be rerouted
Have a spare network card on standby in the client in case the Virtual IO Server goes down
Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two separate Virtual IO Servers
第23题:
Shared key authentication is considered more secure than open authentication.
Shared key authentication is considered less secure than open authentication.
If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.