As the Company wireless administrator, you required to be kn

题目
多选题
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()
A

In the autonomous access point solution, control is provided by the WLAN controller.

B

In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).

C

In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).

D

Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.

E

Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).

F

Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第2题:

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()

  • A、In a SQL Trace log file, you should look for queries with low duration values and high read and write values.
  • B、In a query execution plan, you should look for queries with missing or out-of-date statistics.
  • C、In a SQL Trace log file, you should look for queries with high duration values and low read and write values.
  • D、In a query execution plan, you should look for queries with a large number of table scans.

正确答案:C

第3题:

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

  • A、Secure VPN
  • B、MAC filtering
  • C、IP filtering
  • D、Static IP addresses

正确答案:B

第4题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () 

  • A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. 
  • B、You should identify whether the SQL Server Agent is started on the primary server. 
  • C、You should identify whether the AdventureWorks database uses the Simple recovery model. 
  • D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

正确答案:B

第5题:

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()

  • A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
  • B、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
  • C、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
  • D、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

正确答案:A

第6题:

You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()

  • A、WINS, DHCP and DNS
  • B、At least one domain controller and one DNS server.
  • C、At least one domain controller, Active Directory and DNS server.
  • D、Nothing more is needed.
  • E、Nothing more is needed, we can just subnet the network.

正确答案:C

第7题:

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A user database named Products is included by your SQL Server 2005 computer. SQL Server Integration Services (SSIS) packages are utilized to export data from the Products database to a text file. You deliver the text file to your company’s trading partners by utilizing FTP. You are required to make sure that your SSIS packages can be recovered from the occurrence of a disaster.  Which action should be performed to finish the task?()

  • A、To finish the task,the Products database should be backed up.
  • B、To finish the task,your server should be set to utilize the full recovery model.
  • C、To finish the task,your server should be set to utilize the bulk-logged recovery model.
  • D、To finish the task, the msdb database should be backed up.

正确答案:D

第8题:

You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()

  • A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.
  • B、 Autonomous access points are required.
  • C、 The SSID of the root access point must be configured on the repeater access point.
  • D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.
  • E、 Lightweight access points are required.
  • F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.
  • G、 The SSID of the root access point must be distinct from that of the repeater access point.

正确答案:B,C,D

第9题:

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

  • A、Configure the Network authentication (Shared mode) setting.
  • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
  • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
  • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

正确答案:D

第10题:

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()

  • A、You should consider changing the EWS virtual directory.
  • B、You should consider changing the Federation Trust.
  • C、You should consider changing the Organizational Relationship.
  • D、You should consider changing the default sharing policy.

正确答案:D

更多相关问题