多項(xiàng)選擇題Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  

A. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter  and the access point, manage authentication to the wireless network, and enable data encryption.
B. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
C. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a  time.
D. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
E. When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.
B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.
C. No. Traffic will loop back and forth between switch S5 and S2.
D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1.
E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.

2.多項(xiàng)選擇題

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

A. A device is trusted if it correctly classifies packets.
B. A device is trusted if it correctly declassifies packets.
C. The outermost trusted devices represent the trust boundary.
D. Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.  
E. Network trust boundaries are automatically configured in IOS version 12.3 and later.
F. For scalability, classification should be done as close to the edge as possible.

3.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?()


 

A. Endpoint 1 is the only acceptable place to establish a trust boundary.
B. Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places to establish a trust boundary.
C. Endpoint 2 is the only acceptable place to establish a trust boundary.
D. Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places to establish a trust boundary.
E. Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place to establish a trust boundary.
F. Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to  establish a trust boundary.

5.單項(xiàng)選擇題Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

A. reduction of processing in wireless controllers
B. distributed approach to authentication, encryption, and policy enforcement
C. provides security by blocking communication between access points and wireless clients
D. access point discovery, information exchange, and configuration

最新試題

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()

題型:單項(xiàng)選擇題

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which two statements are correct?()

題型:多項(xiàng)選擇題

Which two statements are true about voice packets in a LAN? (Choose two.)  ()

題型:多項(xiàng)選擇題

What are two rules for compacting IPv6 addresses?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

題型:單項(xiàng)選擇題

Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()

題型:單項(xiàng)選擇題

Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology?()

題型:多項(xiàng)選擇題