Study the exhibit below carefully:
When a profile is configured for a user on the network in the Aironet Desktop Utility, which security option permits the configuration of AES (Advanced Encryption Standard) and Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling?()
A.Pre-Shared Key (Static WEP)
B.WPA/WPA2/CCKM
C.802.1x
D.WPA/WPA2 Passphrase
E.None of the other alternatives apply
您可能感興趣的試卷
你可能感興趣的試題
A.A wireless repeater is an access point that is not connected to the wired LAN.
B.The repeater feature is only available in lightweight access point topologies.
C.The SSID of the root access point must be configured on the repeater access point.
D.This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E.This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F.To avoid interference, the repeater access point must use a different channel from what the root access point uses.
You need to configure the WLAN client utility on a new machine.
Which two of the following are true regarding this utility? ()
A.The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.
B.In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.
C.The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.
D.The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.
A Cisco Aironet Wireless LAN Adapter CB21AG is inserted into a user’s PC cardbus slot. Both the green status LED and the amber activity LED are blinking slowly.
What is the condition of the adapter? ()
A.The adapter is scanning for the wireless network for which it is configured.
B.The adapter is in power save mode.
C.The adapter is transmitting or receiving data while associated to an access point or another client.
D.The adapter is not receiving power.
E.The adapter is associated to an access point or another client.
F.None of the other alternatives apply
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network.
Which description correctly describes a MAC address flooding attack?()
A.The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B.Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E.The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F.Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G.None of the other alternatives apply
Study the exhibit shown below carefully.
In this scenario the service provider wants to ensure that switch S1 is the root switch for its own network and the network of .
On which interfaces should root guard be configured to ensure that this happens?()
A.Interfaces 11 and 12
B.Interfaces 1, 2, 3, and 4
C.Interfaces 5 and 6
D.Interfaces 5, 6, 7, and 8
E.Interfaces 1 and 2
F.Interfaces 1, 3, 5, and 6
最新試題
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Which two statements are true about BPDU port-guard and BPDU filtering?()
Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()