Reduction of processing in wireless controllers
Distributed approach to authentication, encryption, and policy enforcement
Access point discovery, information exchange, and configuration
Provides security by blocking communication between access points and wireless clients
None of the other alternatives apply.
第1题:
A. The SSID is not set to broadcast
B. An incorrect channel is being used
C. Incorrect client security settings are configured
D. Incorrect client configuration on the laptops
第2题:
第3题:
A.802.11a
B.802.11b
C.802.11g
D.802.11n
第4题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
第5题:
LDAP is being utilized throughout the Company Wireless network. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()
第6题:
In 1979 an extensive ______ program was in progress throughout Suez Canal.
A.A dredge and widen
B.dredged and widened
C.dredging and widening
D.being dredging and widening
第7题:
What are three considerations when choosing the QoS model to deploy in a network? ()
第8题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
第9题:
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
第10题:
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()