CMS专题

单选题Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()AThe data traffic between the access point and controller is not encrypted.BThe data traffic is encapsulated with LWAPP.CThe data traffic is swit

题目
单选题
Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()
A

 The data traffic between the access point and controller is not encrypted.

B

 The data traffic is encapsulated with LWAPP.

C

 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.

D

 The data traffic is encrypted with AES.

E

 All of the above

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statement is true about a worm attack?()

  • A、Human interaction is required to facilitate the spread.
  • B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
  • C、Extremely large volumes of requests are sent over a network or over the Internet.
  • D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.

正确答案:B

第2题:

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()

  • A、 The data traffic between the access point and controller is not encrypted.
  • B、 The data traffic is encapsulated with LWAPP.
  • C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.
  • D、 The data traffic is encrypted with AES.
  • E、 All of the above

正确答案:B

第3题:

Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()

A. DNS traffic is denied.

B. Telnet traffic is denied.

C. SMTP traffic is denied.

D. Ping traffic is permitted.


参考答案:B, D

第4题:

Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()

  • A、The tunnel that is not configured with the policy-class command acts as the default
  • B、EXP selection is between multiple tunnels to the same destination
  • C、There is no requirement for IGP extensions
  • D、Tunnels are configured using the policy-class command and carry multiple EXP values
  • E、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching

正确答案:D

第5题:

Which statement is true about voice VLANs? ()

  • A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
  • B、The voice VLAN feature is enabled by default.
  • C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
  • D、The default CoS value is 1 for incoming voice and data traffic.

正确答案:C

第6题:

Which statement is true about the internal link between the Routing Engine and the Packet-Forwarding Engine?()

  • A、It is only used for exception traffic.
  • B、It is an FE link called fxp2.
  • C、It is rate-limited to avoid DDOS attacks.
  • D、It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.

正确答案:C

第7题:

The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()

  • A、 Real-time frame exchange is accomplished within the access point.
  • B、 The control traffic between the client and the access point is encapsulated with the LWAPP. 
  • C、 Authentication, security, and mobility are handled by the access point.
  • D、 Data traffic between the client and the access point is encapsulated with LWAPP.
  • E、 None of the other alternatives apply

正确答案:A

第8题:

Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()

  • A、 LWAPP encrypts control traffic between the AP and the controller.
  • B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP
  • C、 LWAPP encrypts both control traffic and user data.
  • D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

正确答案:A

第9题:

Which statement about an IPS is true?()

  • A、The IPS is in the traffic path.
  • B、Only one active interface is required.
  • C、Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
  • D、When malicious traffic is detected,the IPS will only send an alert to a management station.

正确答案:A

第10题:

Which statement about HTTPS decryption on the WSA is true?() 

  • A、if enabled, all HTTPS traffic must be decrypted
  • B、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
  • C、decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
  • D、object size can be used to determine whether the HTTPS traffic is to be decrypted

正确答案:B

更多相关问题