A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()
第1题:
Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()
第2题:
Random Access Response消息用()加扰。
第3题:
Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()
第4题:
If it is properly deployed,a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu on thecontroller?()
第5题:
Which description best characterizes the Cisco mobility solution? ()
第6题:
When conducting a wireless voice site survey, which two sizing considerations exist for thecoverage cell?()
第7题:
Cisco WCS Base and Cisco WCS Location both indicate rogue AP location only in a Rogue AP Alarm text file
Cisco WCS Base and Cisco WCS Location both indicate rogue AP location in a map at the most probable location that is calculated by two or more APs
Cisco WCS Base identifies the general location of rogue APs based on the signal strength received by the nearest managed Cisco APs, whereas Cisco WCS Location adds high-accuracy location tracking to within a few meters of the rogue AP
Cisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map at the most probable location that is calculated by two or more APs
Cisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map beside the nearest associated AP
第8题:
rogue detector
rogue containment
rldp
ridp
第9题:
Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication
Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication
Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authentication
Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication
第10题:
Configure a Windows Connect Now Group Policy.
Configure a Wireless Network (IEEE 802.11) Policy.
Delete the rogue network from the Network and Sharing Center on each computer.
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第11题:
clients connected to the rogue access point must be able to connect to the containment controller-based access point.
multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
第12题:
shut down rogue access points
configure access points
discover access points
inventory access points
第13题:
Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()
第14题:
常见的网络模型包括:()非广播多点访问网络(NBMA,NON-brOAdCAsTMULTi-ACCess)、()、点到点网络(P2P,POiNTTOPOiNT)。
第15题:
Your customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()
第16题:
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu onthe controller?()
第17题:
Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()
第18题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第19题:
the WCS Base version includes all the features of the WCS Location version as well as additional enhancements
the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)
WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access points
WCS includes a network management tool which is similar to a site survey tool
WCS uses the CDP protocol to communicate with the controllers
第20题:
Port scan
Packet sniffer
IPS
IDS
第21题:
第22题:
rogue detector
rogue containment
RLDP
RIDP
第23题:
known internal
managed
friendly
known external