A client is searching for an access point (AP). What is the 

题目
单选题
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()
A

probe request/response, authentication request/response, association request/response

B

association request/response, authentication request/response, probe request/response

C

probe request/response, association request/response, authentication request/response

D

association request/response, probe request/response, authentication request/response

参考答案和解析
正确答案: A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()

  • A、client traffic allowed, data captured on all channels
  • B、client traffic allowed, data captured on a single channel
  • C、no client traffic allowed, data captured on a single channel
  • D、no client traffic allowed, data captured on all channels

正确答案:C

第2题:

On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()

  • A、a shared key
  • B、network EAP
  • C、open authentication plus EAP
  • D、open authentication plus MAC

正确答案:B

第3题:

Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()

  • A、Set the SSID value in the client software to public.
  • B、Configure open authentication on the AP and the client.
  • C、Set the SSID value on the client to the SSID configured on the AP
  • D、Configure MAC address filtering to permit the client to connect to the AP

正确答案:C

第4题:

In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()

  • A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.
  • B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.
  • C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
  • D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  
  • E、 None of the other alternatives apply

正确答案:D

第5题:

You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()

  • A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.
  • B、 Autonomous access points are required.
  • C、 The SSID of the root access point must be configured on the repeater access point.
  • D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.
  • E、 Lightweight access points are required.
  • F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.
  • G、 The SSID of the root access point must be distinct from that of the repeater access point.

正确答案:B,C,D

第6题:

A new Aironet 1200 series AP has been installed in the Company WLAN.  What happens when this  device is connected to the LAN, with a default configuration?()

  • A、 The access point will attempt to download an encryption key from the nearest wireless server.
  • B、 The access point makes several attempts to get an IP address from the DHCP server. If the  access point does not receive an address, it assigns itself the IP address 10.0.0.1 for 5 minutes.
  • C、 The access point will attempt to connect to the nearest wireless server using LEAP  authentication.
  • D、 The access point requests an IP address from the DHCP server. If the access point does not  receive an address, it continues to send requests indefinitely.
  • E、 None of the other alternatives apply

正确答案:D

第7题:

What are two benefits of clustered access points on a small business network using the Cisco500 Series Access Point? ()

  • A、 Cisco IOS configuration
  • B、 tri-band 11g single radios
  • C、 rouge AP integration
  • D、 single view to deploy and manage
  • E、 secure guest access

正确答案:D,E

第8题:

What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()

  • A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.
  • B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.
  • C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.
  • D、The AP will map the 802.11e priority value to the DSCP value.
  • E、The AP will map the DSCP value to the outer LWAPP frame.

正确答案:B,D

第9题:

The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()

  • A、 Real-time frame exchange is accomplished within the access point.
  • B、 The control traffic between the client and the access point is encapsulated with the LWAPP. 
  • C、 Authentication, security, and mobility are handled by the access point.
  • D、 Data traffic between the client and the access point is encapsulated with LWAPP.
  • E、 None of the other alternatives apply

正确答案:A

第10题:

On the Company wireless LAN, A client is searching for an access point (AP).  What is the correct  process order that this Company client and access point goes through in order to create a  connection?()

  • A、 association request/response, probe request/response, authentication request/response
  • B、 association request/response, authentication request/response, probe request/response
  • C、 probe request/response, authentication request/response, association request/response
  • D、 probe request/response, association request/response, authentication request/response
  • E、 None of the other alternatives apply

正确答案:C

更多相关问题