A.using adapters and access points manufactured by the same company
B.overlapping the wireless cell coverage by at least 10%
C.configuring all access points to use the same channel
D.utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs
您可能感興趣的試卷
你可能感興趣的試題
A.AES-CCMP
B.PPK via IV
C.PSK
D.TKIP/MIC
A.transparent
B.auto
C.on
D.desirable
E.blocking
F.forwarding
A.Full-duplex Ethernet consists of a shared cable segment. Half-duplex Ethernet provides a point-to-point link.
B.Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex Ethernet uses a jam signal.
C.Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth.
D.Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive.
A.copier
B.microwave oven
C.toaster
D.cordless phone
E.IP phone
F.AM radio
A.VTP
B.STP
C.ISL
D.802.1Q
E.VLSM
最新試題
Which IPsec security protocol should be used when confidentiality is required?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
What is the purpose of the cisco Vlan Trunking protocol?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()
Which command encrypts all plaintext passwords?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()