-
When configuring cisco secure acs to support wireless eap authentication,which device must be configured as a aaa client?()
A . location appliance
B . controller-based access points
C . wireless clients
D . wireless control system
E . wireless controller
-
In which service component of the wireless operate phase are incident trends analyzed to identifypatterns and systemic conditions?()
A . System Monitoring
B . Security Administration
C . Operations Setup
D . Problem Management
-
Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?()
A . designated ports.
B . duplex operating mode.
C . fast mode ports.
D . root bridge.
E . root ports.
F . BDPU priority.
-
Which three wireless service components belong to the operate phase?()
A . operations plan
B . operations assessment
C . security administration
D . system monitoring
E . operations implementation
F . incident management
-
Select the wireless service component in the implement phase in which operations responsibilities are defined and transferred to the operate phase team?()
A . ongoing support handoff meeting
B . staff training
C . detailed design development
D . staging and system migratio
-
Which service component in the wireless operate phase helps isolate and resolve an incident?()
A . change management
B . configuration management
C . incident management
D . acceptance test pla
-
Which service component in the implement phase is typically performed prior to the handover of a wireless solution to the customer’s operations organization?()
A . systems integration
B . skill assessment
C . systems acceptance testing
D . wireless check
E . project close out
-
In which service component of the wireless operate phase are incident trends analyzed to identify patternsand systemic conditions?()
A . System Monitoring
B . Security Administration
C . Operations Setup
D . Problem Management
-
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
A . Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
B . Configure IEEE 802.1x authentication with smart cards
C . Configure the wireless network to use Wired Equivalent Privacy (WEP)
D . Install and configure an Internet Authentication Service (IAS) server
-
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()
A . In the autonomous access point solution, control is provided by the WLAN controller.
B . In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).
C . In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).
D . Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.
E . Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).
F . Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
-
Which of the following parameter sets must be configured on the cisco wireless location appliance?()
A . network connections
B . location views
C . access points
D . object definitio
-
When configuring Cisco Secure ACS to support wireless EAP authentication,which device must beconfigured as a AAA client?()
A . Location Appliance
B . controller-based access points
C . wireless clients
D . Wireless Control System
E . wireless controller
-
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
A . Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
B . Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
C . Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
D . Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas network
-
Which three Cisco CRS 4.0 components must be active on a Call Recording expansion server?()
A . Cisco CRS Repository Datastore, Cisco CRS Historical Datastore, Cisco CRS Config Datastore, CiscoCRS Agent Datastore
B . Cisco Recording
C . Cisco CRS Engine
D . Cisco Monitoring
E . Cisco CRS Node Manager
F . Historical Reporting client&e
-
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
A . Wireless Control System
B . wireless clients
C . wireless controllers
D . controller-based access points
E . Location Appliance
-
You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()
A . Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
B . Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
C . Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
D . Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server
-
Which of the following parameter sets must be configured on the Cisco Wireless Location Appliance?()
A . network connections
B . location views
C . access points
D . object definitio
-
Which two components are unique to controller-based wireless installations? ()
A . Mobility Services Engine
B . WLAN controller
C . Cisco Wireless Control System
D . rugged/exterior access points
E . interior access point
-
You need to design an authentication solution for wireless network access. Your solution must meet business and technical requirements. Which two actions should you perform?()
A . Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B . Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C . Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D . Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server
-
Select the wireless service component in the implement phase in which operations responsibilities are defined and transferred to the operate phase team.()
A . Ongoing Support Handoff Meeting
B . Staff Training
C . Detailed Design Development
D . Staging and System Migratio
-
You have finished physically installing an access point on the ceiling at your office. At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()
A . AES
B . PSK
C . SSID
D . TKIP
E . WEP
-
Which of the following four CRS components must be active on a Historical Reporting Database (HRDB) and Call Recording expansion server?()
A . CRS Node Manager
B . CRS Engine
C . Cisco Recording
D . CRS Application Editor
E . Cisco Monitoring
F . CRS Repository Datastore, CRS Historical Datastore, CRS Config Datastore, CRS Agent Datastore
-
Epsilon Inc., a U.S. based company, must pay ¥1,000,000,000 to its Japanese component supplier in 3 months. Epsilon approaches a dealer and enters into a USD/JPY currency forward contract, containing
A、The dealer will deliver yen on expiration.
B、The amount of USD exchanged for JPY is determined at expiration.
C、Epsilon may receive or pay JPY,depending on the exchange rate at expiration.