You need to configure the WLAN client utility on a new machine.
Which two of the following are true regarding this utility? ()
A.The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.
B.In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.
C.The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.
D.The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.
您可能感興趣的試卷
你可能感興趣的試題
A Cisco Aironet Wireless LAN Adapter CB21AG is inserted into a user’s PC cardbus slot. Both the green status LED and the amber activity LED are blinking slowly.
What is the condition of the adapter? ()
A.The adapter is scanning for the wireless network for which it is configured.
B.The adapter is in power save mode.
C.The adapter is transmitting or receiving data while associated to an access point or another client.
D.The adapter is not receiving power.
E.The adapter is associated to an access point or another client.
F.None of the other alternatives apply
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network.
Which description correctly describes a MAC address flooding attack?()
A.The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B.Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E.The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F.Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G.None of the other alternatives apply
Study the exhibit shown below carefully.
In this scenario the service provider wants to ensure that switch S1 is the root switch for its own network and the network of .
On which interfaces should root guard be configured to ensure that this happens?()
A.Interfaces 11 and 12
B.Interfaces 1, 2, 3, and 4
C.Interfaces 5 and 6
D.Interfaces 5, 6, 7, and 8
E.Interfaces 1 and 2
F.Interfaces 1, 3, 5, and 6
In order to enhance worker productivity, a Cisco wireless network has been implemented at all locations.
Which three statements regarding WLAN are true?()
A.A WLAN client will operate in half-duplex mode.
B.The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
C.Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D.WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
E.A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
F.Another term for infrastructure mode is independent service set (IBSS).
Switch 1 was configured as shown below:
Based on the output shown above,
which statement is true? ()
A.IP traffic matching access list is forwarded through VLANs 5-10.
B.All VLAN traffic in VLANs 5-10 that match access list will be forwarded, and all else will be dropped.
C.IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
D.All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list is dropped.
E.None of the other alternatives apply
最新試題
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which two statements about the various implementations of STP are true?()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
Which three statements about STP timers are true?()
Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()
If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()
Which router redundancy protocol cannot be configured for interface tracking?()
What two things will occur when an edge port receives a BPDU?()
Which two statements are true when the extended system ID feature is enabled? ()