多项选择题Which two statements about the open and shared key wireless-authentication methods are true?()

A.shared key authentication is considered more secure than open authentication
B.shared key authentication is considered less secure than open authentication
C.if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data


您可能感兴趣的试卷

你可能感兴趣的试题

2.多项选择题What are three features of voice traffic on a network?()

A.bursty
B.constant
C.bandwidth intensive
D.small packet sizes
E.time-sensitive
F.retransmittable

4.单项选择题Which statement is true about the distributed call control in a VoIP network?()

A.the VoIP endpoints have the intelligence to set up and control calls
B.Call setup and control functionality is centralized in one call agent or cluster
C.Call setup and control resides in call agents that are distributed throughout the network
D.Each VoIP device has separate call control, voice packetization, and transport mechanisms

5.单项选择题What is the purpose of the NBAR protocol discovery?()

A.to build a Packet Description Language Module (PDLM) file to be used in protocol matching
B.to discover applications and build class maps for data classification
C.to look into the TCP or UDP payload and classify packets based on the content
D.to build a database of all application data that passes through the router and queue the data accordingly

7.多项选择题Which two Cisco Wireless Control System (WCS) statements are true?()

A.the WCS Base version includes all the features of the WCS Location version as well as additional enhancements
B.the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)
C.WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access points
D.WCS includes a network management tool which is similar to a site survey tool
E.WCS uses the CDP protocol to communicate with the controllers

8.单项选择题What is a drawback to using the IntServ model?()

A.RSVP that signals QoS requests per individual flow
B.not scalable to large implementations
C.admission control not supported
D.use of dynamic port numbers 
E.UDP not supported

9.单项选择题What is the best description of serialization delay? ()

A.the time it takes for a Layer 3 switch or a router to switch a packet from an inbound interface to the queue of the outbound interface
B.the time it takes for a propagate from source to destination
C.the time it takes to place a frame on the physical medium for transport
D.the time a packet resides in the outbound queue of a router

10.多项选择题Which two statements about the best effort model for QoS are true?()

A.delay sensitive packets are given preferential treatment
B.the default policy identifies a delay sensitive class and default class
C.the default policy identifies a delay sensitive class, best effort class, and default class
D.the model is highly scalable
E.the model is still predominant on the internet F the model provides guaranteed service

最新试题

Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()

题型:多项选择题

Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()

题型:单项选择题

Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()

题型:多项选择题

When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()

题型:单项选择题

Which three functions can an Integrated Services Router perform in a VoIP network?()

题型:多项选择题

What is the term that is used to describe the process of converting a signal from digital to analog?()

题型:单项选择题

End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()

题型:单项选择题

Which of the items stated is typically the most expensive method of improving QoS across WAN links?()

题型:单项选择题

Which three practices are important to the implementation of a DiffServ QoS architecture?()

题型:多项选择题

Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()

题型:多项选择题