A.device type and subnet
B.mac address and device type
C.serial number and version number
D.serial number and subnet
您可能感興趣的試卷
你可能感興趣的試題
A.lost connection to the controller
B.duplicate ip address
C.startup
D.site survey mode
A.enable self-healing.
B.configure location manager.
C.conduct client walkabout.
D.conduct radio scan.
A.disable auto rf and configure manually.
B.disable all 802.11b data rates.
C.power access point to full power.
D.hard code the channel.
A.infrastructure devices to associate only to this ssid
B.enable ip redirection on this ssid
C.set data beacon rate
D.multiple basic service set identification (bssid)
E.set infrastructure ssid
A.eap-peap
B.eap-fast
C.eap-cisco wireless (leap)
D.eap-tls
E.eap-md5
最新試題
You review the Failed Attempts logs on an AAA server and find: "unknown network access servererror." Which failure could produce this error?()
Which of the following parameter sets must be configured on the Cisco Wireless Location Appliance?()
Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address.Which of the following will cause this problem?()
What is the maximum number of wireless controllers that the highest-end Cisco WCS server canmanage?()
You are configuring a wireless LAN controller for QoS.Which 802.11e user priority tag should you apply to voice applications?()
The Cisco Wireless Location Appliance provides an audit trail for each device tracked for up to how many days?()
Which of the following commands on the wireless interface of a Cisco 3845 Integrated Service Router allows the SSID to broadcast?()
You are configuring an RF group of controllers that coordinate Radio Resource Management calculations.What is the maximum number of WLAN controllers that you can add?()
Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on.Which situation would result in thistype of problem?()
You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients.In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()