You are configuring a wireless LAN controller for QoS.
Which 802.11e user priority tag should you apply to voice applications?()
A.1
B.3
C.4
D.6
您可能感興趣的試卷
你可能感興趣的試題
A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2.H-REAP AP2 has six other clients associated to it, which continue to pass traffic.
What has causedthis problem?()
A.H-REAP AP1 lost its connection to the controller.
B.H-REAP AP2 lost its connection to the controller.
C.H-REAP AP1 has reached its client limit.
D.H-REAP AP2 has reached its client limit.
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this.
Which two IETF RADIUS attributes should you configure on the CiscoSecure ACS? ()
A.064 Tunnel-Type
B.066 Tunnel-Client-Endpoint
C.067 Tunnel-Server-Endpoint
D.081 Tunnel-Private-Group-ID
E.082 Tunnel-Assignment-ID
F.083 Tunnel-Preference
You are troubleshooting a problem with a Cisco 7920 wireless IP phone that is causing the phoneto drop calls. The problem appears to be roaming bandwidth issue. In order to verify what kind ofissue it is, you decide to increase the bandwidth reserve for roaming on the WLAN controller tomaximum.
What level do you set the bandwidth to?()
A.5 percent
B.15 percent
C.25 percent
D.35 percent
You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients.
In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()
A.Take no action, you have achieved your goal.
B.Implement a Cisco Secure IPS sensor.
C.Implement a protected port on the access switches.
D.Implement 802.1X on the switch ports.
A.Aggressive Load Balancing on
B.Aggressive Load Balancing off
C.Multicast on
D.Multicast off
E.AP Fallback on
F.AP Fallback off
最新試題
You are troubleshooting a one-way call problem with a Cisco 7920 wireless IP phone on a standalone WLAN.What may cause this problem?()
The IOS of a North American Cisco Aironet 1130AG Series standalone access point has becomecorrupt. You must therefore reload the TFTP firmware.Before you press and hold the MODEbutton, you should verify that the file name is which of the following?()
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
A mobility group is created by a Cisco WLCM and 4402 Series Wireless LAN Controller. A client thatis anchored on the Cisco WLCM roams to an access point on the 4402 controller. You then run adebug command on the 4402 controller.Which message would best describe the establishment ofthe tunnel from the foreign controller’s perspective?()
You are configuring a wireless LAN controller for QoS.Which 802.11e user priority tag should you apply to voice applications?()
Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address.Which of the following will cause this problem?()
A Cisco Wireless Location Appliance has been added to track RFID tags placed on laptops beingused in a school.Classrooms at the school have concrete block walls. During testing,you discoverthat the accuracy of the system needs to be improved.You decide to edit the map in the Cisco WCS to add the interior walls.How many interior walls can you add to improve the accuracy of thelocation appliance?()
A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2.H-REAP AP2 has six other clients associated to it, which continue to pass traffic.What has causedthis problem?()
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this.Which two IETF RADIUS attributes should you configure on the CiscoSecure ACS? ()
You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients.In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()