A.configuration of APs
B.auto discovery of rogue APs
C.reporting
D.WLSE in two versions: base and location
E.graphical view of multiple controllers and managed APs
您可能感興趣的試卷
你可能感興趣的試題
A.protocol type
B.CoS
C.DSCP
D.IP precedence
E.destination address
F.input interface
A.QoS preclassification is only supported on generic routing encapsulation (GRE) and IPsec VPNs
B.QoS preclassification is not required in Layer 2 Tunneling Protocol (L2TP), Layer2 Forwarding (L2F), and Point-to-Point Tunneling Protocol (PPTP) VPNs
C.QoS preclassification is supported on IPsec AH VPNs, but not on IPsec ESP VPNs
D.the QoS-for-VPNs feature (QoS preclassification) is designed for VPN transport interfaces
E.with IPsec tunnel mode, the type of service (ToS) byte value is copied automatically from the original IP header to the tunnel header
A.timing
B.queuing
C.differential
D.serialization
E.packetization
F.propagation
A.latency must be kept below 150 ms
B.latency is not a concern as long as jitter is kept below 30 ms
C.voice packets do not require a specific type of queuing
D.voice packets are rather small
E.voice packets require TCP for rapid retransmission of dropped packets
F.voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload
A.header compression
B.payload compression
C.low latency queuing (LLQ)
D.weighted random early detection (WRED)
E.traffic policing
F.traffic shaping
A.a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocol
B.RSVP uses DSCP to signal QoS requirements to routers
C.RSVP is a routing protocol
D.RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455
E.RSVP specifically provides a level of service for rate-sensitive and delay-sensitive traffic
F.the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP)
uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) 
uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
A.WMM using DCF
B.WMM using EDCAF
C.802.1e using DCF
D.802.1e using EDCAF
A.shared key authentication is considered more secure than open authentication
B.shared key authentication is considered less secure than open authentication
C.if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
最新試題
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
Which two commands should be entered on a WLAN controller to remove any residual configuration?()
Which Control Plane Policing (CoPP) statement is true?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
What are three Cisco Unified CallManager features? ()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
Within the WMM policy, how many default QoS radio access categories are there?()