A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()A、known internalB、mana

题目

A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()

  • A、known internal
  • B、managed
  • C、friendly
  • D、known external

相似考题
更多“A rogue access p”相关问题
  • 第1题:

    Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()

    • A、rogue detector
    • B、rogue containment
    • C、RLDP
    • D、RIDP

    正确答案:C

  • 第2题:

    Random Access Response消息用()加扰。

    • A、SI-RNTI
    • B、RA-RNTI
    • C、P-RNTI
    • D、Temp C-RNTI

    正确答案:B

  • 第3题:

    Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()

    • A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
    • B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
    • C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
    • D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    正确答案:B

  • 第4题:

    If it is properly deployed,a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu on thecontroller?()

    • A、Mirror
    • B、Rogue Detector
    • C、Sniffer
    • D、Monitor

    正确答案:B

  • 第5题:

    Which description best characterizes the Cisco mobility solution? ()

    • A、provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit
    • B、authenticates users and devices so that it is impossible for a rogue device to be connected to the network
    • C、allows you to centralize management, automate repetitive tasks, and provision IP services easily
    • D、centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

    正确答案:A

  • 第6题:

    When conducting a wireless voice site survey, which two sizing considerations exist for thecoverage cell?()

    • A、rogue access point detection in the coverage area
    • B、multipath issues in the coverage area
    • C、number of VoWLAN users in the coverage cell
    • D、call capacity requirements of the coverage area

    正确答案:C,D

  • 第7题:

    单选题
    Which statement best describes the rogue AP location display of the WCS wireless management server? ()
    A

    Cisco WCS Base and Cisco WCS Location both indicate rogue AP location only in a Rogue AP Alarm text file

    B

    Cisco WCS Base and Cisco WCS Location both indicate rogue AP location in a map at the most probable location that is calculated by two or more APs

    C

    Cisco WCS Base identifies the general location of rogue APs based on the signal strength received by the nearest managed Cisco APs, whereas Cisco WCS Location adds high-accuracy location tracking to within a few meters of the rogue AP

    D

    Cisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map at the most probable location that is calculated by two or more APs

    E

    Cisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map beside the nearest associated AP


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()
    A

    rogue detector

    B

    rogue containment

    C

    rldp

    D

    ridp


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()
    A

    Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication

    B

    Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

    C

    Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authentication

    D

    Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
    A

    Configure a Windows Connect Now Group Policy.

    B

    Configure a Wireless Network (IEEE 802.11) Policy.

    C

    Delete the rogue network from the Network and Sharing Center on each computer.

    D

    Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()
    A

    clients connected to the rogue access point must be able to connect to the containment controller-based access point.

    B

    multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.

    C

    clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.

    D

    each controller-based access point can handle only a limited amount of clients connected to the rogue access points.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Wlse uses snmp communication with an ethernet switch for what purpose?()
    A

    shut down rogue access points

    B

    configure access points

    C

    discover access points

    D

    inventory access points


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()

    • A、rogue detector
    • B、rogue containment
    • C、rldp
    • D、ridp

    正确答案:C

  • 第14题:

    常见的网络模型包括:()非广播多点访问网络(NBMA,NON-brOAdCAsTMULTi-ACCess)、()、点到点网络(P2P,POiNTTOPOiNT)。


    正确答案:广播网络(BrOAdCAsT)、;点到多点网络(P2MP,POiNTTOMULTi-POiNT)

  • 第15题:

    Your customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()

    • A、ensure channels are deployed such that they do not overlap
    • B、allow for the automatic containment of rogue access points
    • C、ensure each area is covered by a minimum of three access points
    • D、ensure a minimum rssi value of -50

    正确答案:C

  • 第16题:

    If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu onthe controller?()

    • A、Monitor
    • B、Rogue Detector
    • C、Sniffer
    • D、Mirror

    正确答案:B

  • 第17题:

    Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. to verify proper access point deployment for location server. The results from an access point scan should show what information?()

    • A、a minimum rssi value of -50
    • B、rogue access points
    • C、a minimum of three access points
    • D、non-overlapping channels

    正确答案:C

  • 第18题:

    多选题
    Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
    A

    Attacker sends multiple DHCP requests flooding DHCP server

    B

    Attacker connects rogue server initiating DHCP requests

    C

    Attacker connects rogue server replying to DHCP requests

    D

    Attacker sends DHCP jam signal causing DHCP server to crash

    E

    Attacker sends gratuitous ARP replies, thereby jamming the DHCP server

    F

    Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server


    正确答案: E,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which two Cisco Wireless Control System (WCS) statements are true?()
    A

    the WCS Base version includes all the features of the WCS Location version as well as additional enhancements

    B

    the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)

    C

    WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access points

    D

    WCS includes a network management tool which is similar to a site survey tool

    E

    WCS uses the CDP protocol to communicate with the controllers


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following solutions will detect and disable a rogue access point?()
    A

    Port scan

    B

    Packet sniffer

    C

    IPS

    D

    IDS


    正确答案: A
    解析: 暂无解析

  • 第21题:

    填空题
    常见的网络模型包括:()非广播多点访问网络(NBMA,NON-brOAdCAsTMULTi-ACCess)、()、点到点网络(P2P,POiNTTOPOiNT)。

    正确答案: 广播网络(BrOAdCAsT)、,点到多点网络(P2MP,POiNTTOMULTi-POiNT)
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()
    A

    rogue detector

    B

    rogue containment

    C

    RLDP

    D

    RIDP


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()
    A

    known internal

    B

    managed

    C

    friendly

    D

    known external


    正确答案: D
    解析: 暂无解析