A.probe request/response, authentication request/response, association request/response
B.association request/response, authentication request/response, probe request/response
C.probe request/response, association request/response, authentication request/response
D.association request/response, probe request/response, authentication request/response
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()
A.It indicates that the radio of the client adapter is disabled
B.It indicates that the client adapter is not associated to an access point or another client
C.It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated
D.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good
E.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair
F.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
A.Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1
B.No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0
C.No. Traffic will loop back and forth between switch S5 and S2
D.Yes. Traffic will pass from switch S6 to S3 to S2 to S1
E.No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
A.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual route
B.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, it will regain the master virtual router role
C.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.
D.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, it will regain the master virtual router role
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()
A.Router A is responsible for answering ARP requests sent to the virtual IP address
B.If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address ofRouter A
C.If another router were added to this GLBP group, there would be two backup AVGs
D.Router B is in GLBP listen state
E.Router A alternately responds to ARP requests with different virtual MAC addresses
F.Router B will transition from blocking state to forwarding state when it becomes the AVG
A.A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients
B.A Cisco Aironet solution includes intelligent Cisco Aironet access points (APs) and Cisco Catalyst switches
C.In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface
D.The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive
E.Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch
Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()
A.Effectively the trust boundary has been moved to the IP phone
B.The host is now establishing the CoS value and has effectively become the trust boundary
C.The switch is rewriting packets it receives from the IP phone and determining the CoS value
D.The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set the CoS
E.RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link
Refer to the exhibit. Which statement is true about a voice VLAN?()
A.Physically the voice network and the data network are separate
B.The voice traffic will normally be on a different IP subnet than will the data traffic
C.End user intervention is necessary to place the phone into the proper VLAN
D.The same security policy should be implemented for both voice and data traffic
E.The data VLAN must be configured as the native VLAN
A.::/0 is the unspecified address, and ::/128 is the multicast address
B.::/0 is the unicast address, and ::/128 is the anycast address
C.::/0 is the unicast address, and ::/128 is the multicast address
D.::/0 is the anycast address, and ::/128 is the multicast address
E.::/0 is the default route, and ::/128 is the unspecified address
F.::/0 is the anycast address, and ::/128 is the default address
A.The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two
B.The leading zeroes in any 16-bit segment do not have to be written.
C.Every 16-bit segment that consists of all zeroes can be represented with a single colon
D.The trailing zeroes in any 16-bit segment do not have to be written.
E.Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon
F.Two zeroes in the middle of any 16-bit segment do not have to be written
Refer to the exhibit. Which two statements are correct?()
A.All six routes will be installed in the routing table
B.Two routes will be installed in the routing table
C.Four routes will be installed in the routing table
D.All the routes were redistributed into BGP from an IGP
E.All the routes were originated by BGP with the network command
最新試題
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes?()
Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?()
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which two statements about voice VLANs are correct?()
Which two Aironet enterprise solution statements are true?()
Which two statements are true about voice packets in a LAN? (Choose two.) ()
What is the difference between the IPv6 addresses ::/0 and ::/128?()
Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()