单项选择题
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()
A.probe request/response, authentication request/response, association request/response
B.association request/response, authentication request/response, probe request/response
C.probe request/response, association request/response, authentication request/response
D.association request/response, probe request/response, authentication request/response
相关考题
-
单项选择题
Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()
A.It indicates that the radio of the client adapter is disabled
B.It indicates that the client adapter is not associated to an access point or another client
C.It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated
D.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good
E.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair
F.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor -
单项选择题
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
A.Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1
B.No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0
C.No. Traffic will loop back and forth between switch S5 and S2
D.Yes. Traffic will pass from switch S6 to S3 to S2 to S1
E.No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end -
单项选择题
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
A.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual route
B.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, it will regain the master virtual router role
C.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.
D.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, it will regain the master virtual router role
