Part 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

-MIC, encryption Data integrity always involves a MIC, while data privacy always involved an encryption algorithm. PSK (Pre-shared Key) is not directly involved in either data integrity or privacy. Instead, PSK is a method of device authentication, which is used in some wireless security suites to derive encryption keys. The 802.1X standard descries port-based access control, so it is not involved with data integrity or privacy.

Wireless data integrity and data privacy are based around which of the following respective functions? -MIC, encryption -PSK, encryption -encryption, 802.1X -encryption, MIC

SSID

________ is a name of a Wi-Fi network that is advertised. Wireless devices can then join that Wi-Fi network.

-BSS An AP offers a basic service set (BSS).

An AP is set up to offer wireless coverage in an office. Which one of the following is the correct 802.11 term for the resulting standalone network? -IBSS -BSD -BSA -BSS

-Trunk mode link An autonomous AP must connect to each of the VLANs it will extend to wireless LANs.

An autonomous AP will be configured to support three WLANs that correspond to three VLANs. The AP will connect to the network over which link type? -EtherChannel link -Access mode link -Trunk mode link -LAG mode link

-management

By default, a wireless controller will not allow ________ traffic initiated from a WLAN -IP -encrypted -VLAN -management

Control and Provisioning of Wireless Access Points

CAPWAP stands for what

-Half duplex WLANs require half-duplex operation because all stations must content for use of a channel to transmit frames

Devices using a wireless LAN must operate in what mode? -Half duplex -Round-robin access -None of these -Full duplex

-WPA3-Enterprise -WPA2-Enterprise The enterprise mode of ANY WPA version will utilize external authentication through the EAP framework. Personal mode does not use EAP.

EAP-TLS, PEAP, and EAP-FAST are methods that can be used with which of the following configurations? (CHOOSE 2) -WPA3-Enterprise -WPA3-Personal -WPA2-Personal -WPA2-Enterprise

-Centralized architecture An autonomous architecture is not correct because it would not require a WLC at all. An embedded architecture has a WLC that is embedded within a network switch, usually in the access layer. Mobility express positions the WLC function within the actual APs.

If a WLC is positioned so that it connects into or near the core layer of a network, which type of wireless architecture is implied? -Embedded architecture -Autonomous architecture -Mobility express architecture -Centralized architecture

-Lightweight AP Split-MAC architecture splits up traditional AP functions such that a WLC handles non-real-time management functions, while a lightweight AP handles real-time functions like encryption. Network switches are not involved in the split-MAC architecture unless they contain an embedded WLC module or functionality.

In a split-MAC architecture, real-time functions such as encryption are handled in which of the following network entities? -Lightweight AP -Access layer switch -Wireless LAN controller -Distribution layer switch

1, 6, 11

List non-overlapping channels in 2.4 GHz band

40, 44, 48

List non-overlapping channels in 5 GHz band

-WIPS Wireless Intrusion Prevention System

Provides intrusion protection functions -MIC -WIPS -WEP -EAP

-Magnetic -Electrical Radio frequency signals are made up of waves of magnetic and electrical fields, each travelling orthogonal to the other. Light waves are not involved in RF signals. The term GHz refers to the frequency of a wave, but not the fields composing the waves.

RF signals are made up of which types of fields and waves? (CHOOSE 2) -Magnetic -Gigahertz -Electrical -Light

-The SE-Connect mode is used for spectrum analysis The SE-Connect mode is used for spectrum analysis. "SE" denotes the Cisco Spectrum Expert software. Otherwise, an AP can operate in only one mode at a time. The local mode is the default mode.

Regarding lightweight AP modes, which one is true? -An AP can operate in multiple modes at the same time -The SE-Connect mode is used for spectrum analysis -An AP only has one possible mode of operation -The Run mode is the default mode

-AES The most robust wireless security methods use CCMP and GCMP, which are both based on the AES algorithm. WEP does encrypt but is not robust and has been deprecated. DES is also a legacy encryption method usually used in IPsec VPNs, but has been deprecated. IPsec can involved encryption algorithms but is not one itself - instead, IPsec is a framework for VPNs.

Robust wireless encryption is based on which algorithm? -AES -DES -WEP -IPsec

-FlexConnect FlexConnect mode is often used at remote sites to enable local switching at the AP in case the link between the main and remote sites is lost. If the remote site AP is running in Local mode, providing normal AP functions, its CAPWAP tunnels back to the main site; WLC would get dropped when the remote link was lost. SE-Connect mode is used to turn the AP into a dedicated spectrum analyzer, rather than a normally functioning AP. Finally, Remote mode is not real.

Suppose a Cisco lightweight AP is deployed at a remote site so that it can provide local network connectivity in case the site loses its link back to the main site. Which AP mode should be used? -Local -SE-Connect -Remote -FlexConnect

-Configure the distribution ports as a trunk link LAG. Because the WLC has four distribution system ports, they should be configured as a single logical LAG (Link Aggregation Group). Distribution system ports should also always be configured as trunk links so that multiple VLANs can be mapped to WLANs on the WLC.

Suppose a WLC has one service port, one redundancy port, four distribution ports, and one console port. To gain the most advantage out of the four distribution system ports with load balancing and redundancy, which would be the best strategy? -Configure the distribution ports as a trunk link LAG. -Configure the distribution ports as an access link LAG. -Configure the distribution ports individually as trunk links. -Configure the distribution ports individually as access links.

-Distribution system port The distribution system ports on a WLC are used to connect to the switched network infrastructure and carry data to/from APs. The console port is not used because it is a serial connection dedicated to WLC management. The service port is a network connection but is used only for out-of-band management. AP data port doesn't exist.

To connect a WLAN controller to a wired network, which would you use? Assume that this connection will carry traffic to/from APs. -AP data port -Service port -Distribution system port -Console port

-Encryption Encryption is the only way to protect message privacy so that it can be unencrypted and understood by only the intended recipient. Authentication protects network access but does not protect privacy. The MIC function protects data integrity so that it cannot be altered without detection, but it does not affect data privacy. DPP does not affect data privacy because it is not real.

To protect the privacy of sensitive data sent over a wireless network, which mechanism should be leveraged? -MIC (Message Integrity Check) -Encryption -Authentication -DPP (Data Privacy Protection)

-MIC A MIC (Message Integrity Check) is an effective way to protect against data tampering.

Used to protect integrity of data in a wireless frame? -MIC -WIPS -WEP -EAP

Console port

WLC port Besides the Service port, can also be used for out-of-band management

Service port

WLC port For out-of-band management

Redundancy port

WLC port To communicate between two WLCs that cooperate to create a high-availability WLC cluster.

Distribution port

WLC port To forward user data to/from the WLC and the switched network

-physical -logical

WLC ports are _______ connections to an external wired network, while WLC interfaces are ________ connections that exist internally.

-external wired network -internally

WLC ports are physical connections to a/an __________, while WLC interfaces are logical connections that exist ___________.

-All are correct

What are some of the wireless LAN (WLC) capabilities? -Dynamic RF management to assign channels to APs -Ease of deployment by programming all RF policies and wireless LAN policies on all APs -RF monitoring to gather information about the channel -Security management -All are correct

-IEEE

What defines and maintains many networking standards, including 802.11 and 802.1x, which are used in wireless networking? -IEEE -FCC -Cisco -Wi-Fi Alliance

LAG Link Aggregation Group to bundle ports together.

What describes the single logical link formed by bundling all of a controller's distribution system ports together?

-FCC

What is the governing body in the U.S. that regulates RF frequencies, channels, and transmission power? -IEEE -FCC -Cisco -Wi-Fi Alliance

512 However, a max of only 16 of them can be configured on an AP.

What is the max number of WLANs you can configure on a Cisco wireless controller?

-The BSSID The BSSID is used at the destination MAC address because the frame is destined for the AP. It would not make sense to use the sender's own MAC address as the destination. The sending device's IP address cannot be used either because the Layer 2 destination address in the frame must be in the format of a MAC address. The AP's Ethernet MAC address should not be used because it represents the address of the wired port and not the wireless radio.

When a wireless frame is sent to an AP, which address is used as the Layer 2 destination address? -The sending device's MAC address -The AP's Ethernet MAC address -The BSSID -The sending device's IP address

**READ** For effective security in a secure wireless connection; you should leverage authentication, MIC and encryption.

**READ** For effective security in a secure wireless connection; you should leverage authentication, MIC and encryption.

-EAP authentication is used -802.1X is used to control access to the wireless network WPA2-Enterprise mode uses 802.1X to control access until an EAP method successfully authenticates wireless users and devices. AES is used in WPA2-Enterprise, along with CCMP, but that is not unique to the WPA2 version. WPA and WPA3 also use AES, though with differing encryption protocols of CCMP and GCMP.

????? Identify two unique characteristics of WPA2-Enterprise mode. -EAP authentication is used -APs use pre-shared keys to authenticate wireless devices -802.1X is used to control access to the wireless network -AES is used for data encryption

-A MAC address A BSSID is identical to the AP's wireless radio MAC address, along with an index to the wireless LAN that is being carried over the BSS. A BSSID cannot be a text string, whereas an SSID can. a BSSID is neither an IP address nor a frequency.

A BSSID looks identifical to which other network parameter? -An IP address -A text string -A MAC address -A frequency in GHz

-All three APs can use the same SSID on a WLAN. All three APs can use the same SSID on a WLAN because the SSID is not unique among APs. In fact, the SSID should be identifical on all APs so that wireless clients can roam from one AP to another while staying connected to the same SSID and wireless LAN. In contrast, the BSSID is unique to each AP and to each WLAN, so all three APs cannot use the same BSSID value. An AP cannot use the same BSSID on all four WLANs because the BSSID is unique across WLANs too. Finally, wireless clients cannot send frames to a specific AP by using only the SSID; the AP's BSSID, essentially a MAC address, must be placed in the destination field of transmitted frames.

A wireless network consists of three APs, with four possible wireless LANs offered by each of the APs. Which of the following statements is true about this scenario? -Wireless clients can send frames to an AP by placing the AP's SSID in the destination address field. -All three APs can use the same SSID on a WLAN. -All three APs use the same BSSID on a WLAN. -One AP can use the same BSSID for all four WLANs.

-A trunk link to each AP Each autonomous AP will require a trunk link to connect it to the wired network infrastructure. The trunk link is necessary to extend multiple VLANs to the AP, where VLANs will be mapped to WLANs. This is not possible with access links, where all traffic is carried over a single VLAN. Access links would be required for lightweight APs that partner with WLCs, but that is not the design presented here. A CAPWAP tunnel would be necessary from a WLC to each lightweight AP, but not to autonomous APs.

A wireless network is to be built from Cisco APs, all in autonomous mode. Which is necessary for the wireless network to support three SSIDs that are mapped to three corresponding VLANs? -A trunk link to each AP -An access link to each AP -A CAPWAP tunnel to each AP -This network design cannot carry multiple VLANs over wireless

-The data plane extends from the wireless users to the cloud-based AP. -The control plane extends from the APs to the Internet cloud, where the APs are managed. In a cloud-based architecture, such as one built with Cisco Meraki APs, the control plane extends from the APs to the cloud. In addition, the data plane extends from the wireless users to the APs.

Suppose several APs are deployed in a cloud-based architecture. Which of the following are correct statements about the control and data planes involved in the wireless network? (CHOOSE 2) -The control plane extends from the wireless users to the cloud-based AP. -The data plane extends from the wireless users to the cloud-based AP. -The control plane extends from the APs to the Internet cloud, where the APs are managed. -The data plane extends from the wireless users to the Internet cloud, where the APs are managed.

-The switch ports should be configured to operate as an EtherChannel unconditionally, with no negotiation. The WLC does not support any form of EtherChannel negotiation, so the switch ports should be configured for unconditional EtherChannel operation. The root cause of the problem is that the switch has been configured to expect LACP negotiation from the WLC before the EtherChannel will come up, but the WLC does not support it. For the best link redundancy and load balancing, all of the WLC distribution system ports should be configured in LAG mode, as the question text described.

Suppose the distribution system ports on a WLC are configured as LAG. The switch ports where the WLC connects are also configured as trunk links that are bundled as a single logical EtherChannel using LACP. You notice that data is not passing across the links as expected. Which is likely the cause of the problem? -The switch ports should be configured to operate as an EtherChannel unconditionally, with no negotiation. -The switch ports should be configured for access mode only. -The switch ports should be configured to use PAgP to negotiate the EtherChannel. -Nothing is wrong with the switch; the WLC ports should not be configured in LAG mode.

-Access mode link

Suppose you need to connect a lightweight AP to a network. Which one of the following link types would be necessary? -EtherChannel link -Access mode link -Trunk mode link -LAG mode link

-All of these are correct You can use HTTP and HTTPS to access the GUI of a wireless LAN controller, as well as SSH to access CLI. While HTTP is a valid management protocol on a WLC, it is usually disabled to make the WLC more secure.

Suppose you would like to connect to a WLC to configure a new WLAN on it. Which one is a valid method to use? -HTTP -SSH -All of these are correct -HTTPS

-Autonomous APs centrally managed

The Cisco Meraki cloud-based APs are most accurately described by which? -Lightweight APs centrally managed -Lightweight APs joined to a WLC -Autonomous APs joined to a WLC -Autonomous APs centrally managed

-Wi-Fi Alliance

The WPA wireless security suites are defined by which of the following entities? -IEEE -FCC -Cisco -Wi-Fi Alliance

Wi-Fi Alliance

The _________ offers WPA, WPA2, and WPA3 CERTIFICATIONS for wireless security. WEP, AES, and 802.11 are not certifications designed and awarded by the ******

512 max, 16 active

The max number of WLANs that can be configured and the max number that can be active on an AP?

-pre-shared key -802.1X

The personal mode for WPA, WPA2, and WPA3 is used to require a ___________ authentication. Enterprise mode uses _________ instead.

-The port should be connected to a switch port in trunking mode. -The WLC must use an unconditional 802.1Q trunk link with the connected switch. The link between the WLC and a switch must be configured as an 802.1Q trunk link, but the WLC does not negotiate the 802.1Q trunk with the switch. Instead, the link must be configured for unconditional 802.1Q trunk mode.

When configuring a distribution system port on a WLC, which are correct? (CHOOSE 2) -The port should be connected to a switch port in access mode. -The WLC will negotiate with the connected switch to bring up an 802.1Q trunk link. -The port should be connected to a switch port in trunking mode. -The WLC must use an unconditional 802.1Q trunk link with the connected switch.

-FlexConnect -Autonomous By definition, autonomous mode allows an AP to function without access to a WLC. FlexConnect mode also maintains AP functionality, although only local traffic can be forwarded in a remote site environment. SE-Connect mode still requires a functioning WLC to work with the AP. An AP in Local mode cannot function without a functioning WLC.

Which AP modes allow an AP to continue operating and forwarding traffic if a WLC or the path to a WLC is unavailable? (CHOOSE 2) -FlexConnect -Local -Autonomous -SE-Connect

-Unified A unified WLC deployment model is based around locating the WLC in a central location, to support a very large number of APs. (Cloud-based is sorta the same BUT it's sorta virtual [look at mindmap])

Which WLC deployment model would be best for a large enterprise with around 4000 lightweight APs? -Cloud-based -Unified -Cisco Mobility Express -Embedded

-Dynamic interface WLC dynamic interfaces are used to make a logical connection between a wired VLAN and a WLAN. Distribution system ports connect the WLC to the physical network where VLANs exist, while the WLC touches wireless users through its APs and WLANs. The management interface is used for only WLC management traffic. The service port is used for out-of-band management, and the virtual interface is used to relay client mobility functions like DHCP and web authentication.

Which WLC interfaces or ports should be used to make a connection between a VLAN and a WLAN? -Service port -Virtual interface -Dynamic interface -Management interface -Distribution system ports

-GCMP -CCMP They both integrate a MIC (Message Integrity Check) to protect the data integrity too. TKIP does leverage encryption but is based around the deprecated WEP function. The CGMP protocol is not related to encryption because it is used for IP multicast management.

Which are designed to provide wireless encryption using the AES algorithm? (CHOOSE 2) -GCMP -CGMP -CCMP -TKIP

-Workgroup bridge

Which can be used to provide wireless connectivity to a nonwireless device -Transparent bridge -Workgroup bridge -Wireless repeater -Adaptive bridge

-Local Cisco LAPs normally operate in the Local mode, supporting regular WLANs, BSSs, split-MAC, and CAPWAP tunnels, plus providing network connectivity to wireless devices. Monitor mode is used to monitor channels, detect intrusion events and rogue devices, and help measure the location of devices. Regular and Normal are not legitimate.

Which is the normal operating mode of a Cisco lightweight AP? -Local -Monitor -Regular -Normal

-EAP EAP works with 802.1X to authenticate a client and enable access for it.

Which is used as the authentication framework when 802.1x is used on a WLAN? -WPA -EAP -Open authentication -WEP

-BSSID The AP at the heart of a BSS or cell identifies itself (and the BSS) with a BSSID (Basic Service Set Identifier). It also uses an SSID to identify the wireless network, but that is not unique to the AP or BSS. FInally, the radio MAC address is used as the basis for the BSSID value, but the value can be altered to form the BSSID for each SSID that the AP supports.

Which is used to uniquely identify an AP and the basic service set it maintains with its associate wireless clients? -Radio MAC address -BSSID -Ethernet MAC address -SSID

-All

Which of following is/are necessary components of a secure wireless connection? -Authentication -Encryption -MIC -All

-Malicious users can capture the 4-way handshake and use a dictionary attack to guess the PSK. -PSKs must be configured on every wireless device and update periodically. WPA2-Personal mode uses a PSK to authenticate wireless devices. Therefore, the PSK must be configured on every wireless device. If the key ever needs to be changed, network administrators must touch every device to enter a new key. As well, the 4-way handshake can be captured, allowing malicious users to launch an offline dictionary attack to recover the actual PSK. WPA2-Personal does not involve the use of authentication servers or digital certificates.

Which of the following are considered to be weaknesses/shortcomings of WPA2-Personal mode? (CHOOSE 2) -Malicious users can capture the 4-way handshake and use a dictionary attack to guess the PSK. -Initial deployment of the authentication servers is a complex task. -PSKs must be configured on every wireless device and update periodically. -Each wireless user must periodically install a new digital certificate for authentication.

-CAPWAP tunnels extend from all APs to a centrally located WLC. A unified or centralized deployment model places a WLC in a central location. That enables the WLC to control and manage all APs, as well as handle CAPWAP tunnels from all APs. CAPWAP tunnels do not extend from access layer switches unless embedded WLCs are co-located there. WLCs are not positioned at access layer switches in a unified or centralized deployment. Centralized WLCs are designed to handle all or a majority of the APs in the campus, not only a small portion.

Which of the following is correct concerning a unified WLC deployment model? -CAPWAP tunnels extend from access layer switches to all APs. -CAPWAP tunnels extend from all APs to a centrally located WLC. -A small portion of the total number of APs is managed by a centrally located WLC. -WLCs are positioned at each access layer switch.

-A trunk link carrying three VLANs A trunk link carrying three VLANs is not needed at all. A lightweight AP in local mode needs only an access link with a single VLAN; everything else is carried over the CAPWAP tunnel to a WLC. The WLC will need to be connected to three VLANs so that it can work with the LAP to bind them to the three SSIDs.

Which of the following is not needed for a lightweight AP in default local mode to be able to support three SSIDs that are bound to three VLANs? -An access link bound to a single VLAN -A trunk link carrying three VLANs -CAPWAP tunnel to a WLC -A WLC connected to three VLANs

-All of these An autonomous AP has a serial console port and a wired Ethernet port. Once the AP has been configured with an IP address and has network connectivity, you can connect to it via Telnet, SSH, or HTTP/HTTPS.

Which of the following method can you use to connect to an autonomous AP for management purposes? -All of these -Console serial connection -SSH -Telnet -HTTP/HTTPS

-SSID of the WLAN -Dynamic interface -WPA version A new WLAN must be configured with an SSID string, the appropriate dynamic interface, and the WPA version. Remember that the dynamic interface is used to logically map a VLAN to a WLAN. The WLAN configuration does not define the BSSID; that is determined by each AP and the WLAN it offers. In addition, you cannot specify specific channel numbers to use on the WLAN. Channels can be configured for a band or an RF profile as part of more advanced wireless functions on the WLC GUI.

Which of the following must be identified when configuring a new secure WLAN on a WLC? (CHOOSE 3) -SSID of the WLAN -Dynamic interface -BSSID of the WLAN -WPA version -Channels to use

-SSID The SSID string should be consistent across all APs so that wireless clients can roam from one AP to another, all while staying connected to the SSID and its WLAN. The clients will try to discover other nearby APs that offer the same SSID. The BSSID cannot be consistent across APs because it is unique to each AP and each WLAN on the AP. ESSID is a fictitious term.

Which of the following parameters should be consistent on neighboring APs as a wireless client moves and attempts to roam from one AP to another? -BSSID -SSID -ESSID

-RADIUS exchanges for wireless user authentication -HTTPS sessions to the WLC GUI -CAPWAP tunnel traffic to/from APs -SNMP traps from the WLC All MANAGEMENT TRAFFIC to/from the WLC passes through the management interface. This can include SSH and HTTP/HTTPS sessions to the WLC GUI... also SNMP, NTP, syslog, and RADIUS authentication, as well as CAPWAP data to/from all APs that are joined to the WLC. The management interface is not used for actual wireless user data passing to/from wired VLANs; that traffic passes over the dynamic interfaces instead.

Which of the following protocols normally pass through the management interface on a WLC? (CHOOSE ALL THAT APPLY) -RADIUS exchanges for wireless user authentication -HTTPS sessions to the WLC GUI -CAPWAP tunnel traffic to/from APs -Wireless user data to/from a VLAN -SNMP traps from the WLC

-Two or more devices can receive data at the same time. -Only one device should transmit data at a given time. Due to the nature of RF signals, only one device should transmit at any given time. If two or more devices transmit at the same time, they can interface with each other enough that their signals cannot be successfully received. However, once one device transmits, any number of devices can receive its signal because it is freely available over the air.

Which of the following statements are true about 802.11 wireless communication on a single frequency? Assume all devices are within range of each other. (CHOOSE 2) -Two or more devices can receive data at the same time. -Only one device should transmit data at a given time. -Only an access point can transmit data on the frequency. -Two or more devices can transmit data to each other at the same time.

-Ethernet cabling to each AP In a mesh network, each mesh AP builds a standalone BSS. The APs relay client traffic to each other over wireless backhaul links, rather than wired Ethernet. Therefore, Ethernet cabling to each AP is not required.

Which one is not needed in a Cisco outdoor mesh network? -A workgroup bridge -A backhaul network -A BSS function -Ethernet cabling to each AP

-Dynamic interface Makes a logical connection between a WLAN and a VLAN, all internal to the controller.

Which one of the following controller interfaces maps a WLAN to a VLAN? -Dynamic interface -Virtual interface -WLAN interface -Bridge interface

-SSID -Interface The VLAN number is not because it is supplied when a controller interface is configured.

Which parameters are necessary when creating a new WLAN with the controller GUI? (CHOOSE 2) -BSSID -IP subnet -VLAN number -SSID -Interface

-Data privacy involves hiding the contents of wireless frames so eavesdroppers cannot successfully read the original data. Data integrity is based on protecting the integrity of wireless frame contents so that they cannot be altered without detection. Data privacy is based on obscuring/hiding wireless frame contents so that they cannot be received and read by unintended eavesdroppers.

Which statement correctly describes the functions of data integrity and data privacy? -Data privacy involves hiding the contents of wireless frames so eavesdroppers cannot successfully read the original data. -Data privacy involves protecting the contents of wireless frames so that the original data cannot be altered. -Data integrity involves making the right decisions about protecting wireless data. -Data integrity involves hiding the contents of wireless frames so eavesdroppers cannot successfully read the original data.

-Cloud -Unified Two of the WLC deployment models, unified (centralized) and cloud, provide the most scalability, with the unified model using a stand-alone WLC and the cloud model running the WLC in a private cloud data center. The embedded model runs the WLC inside an access LAN switch, while Mobility Express takes a similar approach by running the WLC software on one of the APs. Both the embedded and mobility express models support smaller environments with a few hundred APs.

Which two WLC deployment models provide the best scalability to large deployments? -Mobility Express -Embedded -Cloud -Unified

-Controller interface -SSID A WLAN binds an SSID to a controller interface so that the controller can link the wired and wireless networks. Although the WLAN ultimately reaches a wired VLAN, ti does so only through a controller interface. It is the interface that is configured with a VLAN number.

Which two of the following things are bound together when a new WLAN is created? -Controller interface -VLAN -SSID -AP

-Mobility Express The Mobility Express model supports the least number of APs (100) because the WLC function runs on a normal lightweight AP, sharing the AP's resources between AP and WLC operations. Embedded is the next most capable (200 APs), followed by Cloud (3000 APs, and Unified (6000 APs).

Which wireless controller deployment model supports the least number of APs? -Embedded -Cloud -Unified -Mobility Express

802.11

Wi-Fi is 802.__

802.3

Wired Ethernet is 802.__


Ensembles d'études connexes

Chapter 3 + 19: Establishing Goals Consistent with Your Values and Ethics & Project Management

View Set

SEC - 160 Security Administration I Chapter 8 Cryptography

View Set

Bio 270 Lecture Exam #2 (ch.8-13)

View Set

Descubre 2: Lección 1 La Salud (Fill in the blank)

View Set

Air Pollution-Chapters 18 and 19

View Set

CHP 6 PHYSICAL ACTIVITY AND FITNESS

View Set