Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
A. The data traffic between the access point and controller is not encrypted.
B. The data traffic is encapsulated with LWAPP.
C. The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
D. The data traffic is encrypted with AES.
E. All of the above
您可能感興趣的試卷
你可能感興趣的試題
Access Point R1 is an Aironet 1200 that has been converted from autonomous mode to LWAPP mode. After this conversion, which two statements are true? ()
A. LWAPP-enabled access points can still communicate with Wireless Domain Services (WDS) devices.
B. An LWAPP-enabled access point console port provides read-only access to the unit.
C. LWAPP-enabled access points support Layer 2 LWAPP.
D. LWAPP-enabled access points must get an IP address and discover the controller using DHCP, DNS, or an IP subnet broadcast.
E. An LWAPP-enabled access point console port provides read-write access to the unit.
What are three functions of the Cisco wireless LAN controller,
which is being used in the Company Centralized WLAN solution network? ()
A. Authentication
B. Mobility
C. Security management
D. Transmission of beacon frames
E. Real-time portions of MAC management
F. Real-time aspects of the 802.11 prtocol management
G. SNMP collection
A new lightweight access point (LAP) has been installed in the Company WLAN.
Which two statements correctly describe the association process between this LAP and a WLAN controller? ()
A. An access point will search for a controller using a broadcast address if using LWAPP Layer 2 and a unicast address if using LWAPP Layer 3 mode.
B. If multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.
C. In order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.
D. Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.
E. An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.
F. If multiple wireless controllers are detected by an access point, all of them will be used and traffic will be load balanced.
Refer to the exhibit.
What type of message will be used by the lightweight access point (LAP) in an attempt to locate the wireless LAN controller (WLC)? ()
A. The LAP will send out a DNS request. In return, the DNS server will provide the WLC domain name.
B. The LAP will send out a Layer 3 LWAPP discovery request to the WLC on the wireless network.
C. The LAP will send out a DHCP request. In return, the DHCP server will provide the IP addresses for the LAP and the WLC.
D. The LAP will send out a Layer 2 LWAPP discovery request to the WLC on the wireless network.
You work as a network technician at Company. Your boss, Ms., is interested LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of activities this protocol defines.
What should you tell her? ()
A. Layer 3 addressing and distribution
B. SNMP monitoring services
C. Access point certification and software control
D. Packet encapsulation, fragmentation, and formatting
E. Compression and Layer 3 address mapping
F. User behaviors
You work as a network technician at Company. Your boss, Mrs., is interested in LWAPP (Lightweight Access Point Protocol).
What should you tell her regarding this technology? ()
A. LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B. Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
C. Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.
D. Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
E. Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
F. Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program.
What are three features of this program? ()
A. Accounting
B. Analog and digital voice
C. Mobility
D. Security
E. Routing and switching
F. VLAN and QoS
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.
Which statement is true about this protocol?()
A. Real-time frame exchange is accomplished within the access point.
B. The control traffic between the client and the access point is encapsulated with the LWAPP.
C. Authentication, security, and mobility are handled by the access point.
D. Data traffic between the client and the access point is encapsulated with LWAPP.
E. None of the other alternatives apply
LDAP is being utilized throughout the Company Wireless network.
Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()
A. Reduction of processing in wireless controllers
B. Distributed approach to authentication, encryption, and policy enforcement
C. Access point discovery, information exchange, and configuration
D. Provides security by blocking communication between access points and wireless clients
E. None of the other alternatives apply.
Study the exhibit shown below carefully. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop as shown:
What is the significance of this icon? ()
A. It indicates that the client adapter is not associated to an access point or another client.
B. It indicates that the radio of the client adapter is disabled.
C. It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that theuser is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.
E. It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good.
最新試題
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()
If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
What two things will occur when an edge port receives a BPDU?()
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
What is the configured priority value of the Vlan105’s group on DS2 ?()
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()