-
In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()
A . The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.
B . The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.
C . The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
D . The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages.
E . None of the other alternatives apply
-
Please have the damage on gangway()as soon as possible for account of the Stevedore Company.
A . repaired
B . repair
C . repairing
D . repair
-
Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.
What should you do?()
https://assets.asklib.com/images/image2/2018073116270156354.jpg
A . A
B . B
C . C
D . D
-
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
A . The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.
B . LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.
C . LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.
D . LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.
E . None of the other alternatives apply
-
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
A . 19dbm
B . 10dbm
C . 67dbm
D . 86dbm
-
You are using standalone cisco aironet 1400 series wireless bridges for a nine-mile point-to-point wireless link between two buildings. Which distance setting should you use for the bridge configured as the root?()
A . 20 km [12.4 miles]
B . 10 km [6.2 miles]
C . 5 km [3.1 miles]
D . 25 km [15.5 miles]
E . 15 km [9.3 miles]
-
LDAP is being utilized throughout the Company Wireless network. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()
A . Reduction of processing in wireless controllers
B . Distributed approach to authentication, encryption, and policy enforcement
C . Access point discovery, information exchange, and configuration
D . Provides security by blocking communication between access points and wireless clients
E . None of the other alternatives apply.
-
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()
A . Real-time frame exchange is accomplished within the access point.
B . The control traffic between the client and the access point is encapsulated with the LWAPP.
C . Authentication, security, and mobility are handled by the access point.
D . Data traffic between the client and the access point is encapsulated with LWAPP.
E . None of the other alternatives apply
-
Under which three conditions does a client initiate roaming between wireless cells in the Company WLAN? ()
A . The access point has broadcast too many SSIDs.
B . The wireless client has missed too many beacons from the access point.
C . The maximum data retry count, initiated by the wireless client, is exceeded.
D . The wireless client has reduced the data rate.
E . The access point has requested client reauthentication.
F . The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
-
Thoroughly conduct a background check on the company, ()as many phone calls and Internet searches as you can.
A . made
B . makes
C . making
D . make
-
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()
A . Control traffic between an access point and a controller is encrypted within LWAPP.
B . Data traffic between an access point and a controller is encrypted within LWAPP.
C . Layer 3 mode packets are transmitted in TCP frames.
D . Data traffic between an access point and a controller is encapsulated within LWAPP.
E . VLAN tagging and QoS markings are applied at the access point.
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
()conduct a background check on the company, making as many phone calls and Internet searches as you can.
A . Though
B . Throughly
C . Thorugh
D . Thoroughly
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
Which set of statements describes the correct order and process of a Company wireless user client associating with a wireless access point in the Company network? ()
A . 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
B . 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
C . 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates association.4. Client accepts association.5. Access point adds client MAC address to association table.
D . 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
E . 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
F . None of the other alternatives apply.
-
The Company wireless network is using 802.11G access points. Which two statements are true about these access points? ()
A . It supports eight different data rates.
B . It is fully backward compatible with 802.11b
C . It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed environment where both clients are present.
D . It is only compatibly with the 11 Mbps 802.11b transfer rate.
E . It has three non-overlapping channels in its channel options.
-
On the Company wireless LAN, A client is searching for an access point (AP). What is the correct process order that this Company client and access point goes through in order to create a connection?()
A . association request/response, probe request/response, authentication request/response
B . association request/response, authentication request/response, probe request/response
C . probe request/response, authentication request/response, association request/response
D . probe request/response, association request/response, authentication request/response
E . None of the other alternatives apply
-
Which two wireless devices acts as a communication connection between the client and WLAN()
A . bridge
B . access point
C . wireless adaptor
D . Layer 3 switch
E . antenna
-
Your company purchased on credit art equipment from Greg’s Equipment Company for $3,900. The transaction will be recorded as:
-
One of your project team members has made a technological breakthrough on an R & D project. The result will be new business for the company, as well as a company patent. The team member received a company bonus. The motivational strategy used here is:
A Job enrichment
B Linking pay and performance
C Behavior. modification
D Freedom in the work place
E All of the above
-
The company's prepayment to its supplier is regarded as a liability item.
A.Right
B.Wrong
C.Doesn't say
-
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()
A. The laptop is missing the software supplicant
B. The access point SSID is hidden.
C. The laptop only supports TKIP and AES encryption,
D. The access point is on the wrong channel.
-
Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remo
Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7.You need to ensure that the current Libraries from users computers are avail able when they logon to the RD Session Host server.What should you do?()
A.Redirect each user ’s Docu ment s f ol der t o a net work shar e
B.Redirect each user ’s Li nks f ol der t o t he RD Sessi on Host server
C.Use a startup script to copy .library - ms files from the client computers to the RD S ession Host server.
D.Use Group Policy Preferences to copy .library - ms files from the client computers to the RD Session Host server.
-
A company has a business application that provides its users with many different reports:receivables reports, payables reports, revenue projects, and so on. The company has just purchased some new, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company‘s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.Which two design concepts most likely explain this situation?()
A.Inheritance
B.Low cohesion
C.Tight coupling
D.High cohesion
E.Loose coupling
F.Object immutability