Which access point (AP) connection does not represent a Distributed AP deployment?
A. APs connected to a Layer 2 switch connected to a Layer 3 switch
B. APs directly connected to WSS
C. APs connected to a Layer 2 switch
D. APs connected to a PoE switch
正解:B
質問 2:
You have implemented the WLAN Location Engine 2340 on a WLAN. This Engine is constantly reporting that WLAN devices are situated in one locale, however a physical inspection shows that these devices are actually located in another locale. Which circumstances can explain this problem? (Choose two.)
A. The orientation of the AP 2332 access points need to be changed.
B. The MAC addresses on the WLAN devices are incorrect.
C. The RF fingerprints are associated with the wrong locale.
D. The RF fingerprints need to be re-calibrated.
正解:C,D
質問 3:
One possible security risk posed to a WLAN is a "Rogue AP". A Rogue access point (AP) can be used to steal clients from a customer's Wireless LAN. It could also be placed to circumvent their corporate security. Which two methods can the WLAN 2300 series use as part of its detect and avoidance feature to contain Rogue APs? (Choose two.)
A. It can coordinate wired DoS attacks against the rogue.
B. It can coordinate wireless DoS attacks against the rogue.
C. It can force the rouge to require encryption of associated clients.
D. It can triangulate the location of the rogue.
正解:B,D
質問 4:
A customer is setting up the WLAN 2300 series to provide security. They have an existing
PKI environment in place and would like to leverage the existing environment. Which two supported authentication/encryption methods meet this requirement? (Choose two.)
A. WPA-PSK
B. EAP-MD5
C. PEAP-TLS
D. EAP-TLS
正解:C,D
質問 5:
You would like the WLAN Management software service to monitor network data. You have determined which WSSs to monitor and have uploaded their configuration into the WMS.
What else must you do to be able to monitor the WSS from WMS?
A. Enable the Notification Profile for each WSS you want to monitor.
B. Enter the IP address for each WSS you want to monitor.
C. Enable the Target Properties port for each WSS you want to monitor.
D. Enable SNMP traps on each WSS you want to monitor.
正解:D
大坂** -
書籍を読むだけでは理解が難しい(つまずきやすい)箇所について、動画でわかりやすく解説している。これのおかげで合格いたしました。