By default, on the WLAN controller for a voice application using Cisco 7921 wireless IP phones. What is the percentage of RF bandwidth that can be dedicated to the phones?()
A.75 percent B.85 percent C.56 percent D.55 percent
单项选择题The IOS of a North American Cisco Aironet 1130AG Series standalone access point has becomecorrupt. You must therefore reload the TFTP firmware. Before you press and hold the MODEbutton. You should verify that the file name is which of the following?()
A. c1130-k9w7-tar.boot B. c1130-k9w7-tar.123-7.JA1.tar C. c1130-k9w7-tar.default D. c1130-k9w7-tar.recove
单项选择题Intheoperatephase,providingandmaintainingreliable,currentinformationabouttheWLAN system hardware,software,andapplicationspertinenttothesystem’sindividualcomponentsandattributesispartofwhichservicecomponent?()
A.Problem Management B.Configuration Management C.Incident Management D.Change Management
单项选择题Inorderforacontroller-basedaccesspointtobeallowedtoparticipateinaggressiveloadbalancing,it musthaveheardtheclientwithinhowmanyseconds?()
A.15 B.10 C.1 D.5
单项选择题A mobility group is created by a Cisco WLCM and 4402 Series Wireless LAN Controller. A client thatis anchored on the Cisco WLCM roams to an access point on the 4402 controller. You then run adebug command on the 4402 controller. Which message would best describe the establishment of the tunnel from the foreign controller’sperspective?()
A.Received Mobile Anchor Export message B.Transmit Plumbing duplex mobility tunnel message C.Received Plumbing duplex mobility tunnel message D.Transmit Mobile Anchor Export message
单项选择题You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()
A.Implement a Cisco Secure IPS sensor. B.Implement 802.1X on the switch ports. C.Take no action, you have achieved your goal. D.Implement a protected port on the access switches.