Information Technology Reference
In-Depth Information
35. Which two of the following statements represent a preferred Wireless LWAPP imple-
mentation? (Select two.)
a.
Use of Layer 2 LWAPP is preferred over Layer 3 LWAPP.
b.
Use of Layer 3 LWAPP is preferred over Layer 2 LWAPP.
c.
Open ports for Layer 2 LWAPP on EtherType 0xABAB and Layer 3 on TCP
12222 and TCP 12223.
d.
Open ports on Layer 2 LWAPP on EtherType 0xBBBB and Layer 3 on UDP
12222 and UDP 12223.
e.
Open ports on Layer 2 LWAPP on EtherType 0xBABA and Layer 3 on UDP
12222 and TCP 12223.
36. Which two of the following statements represent a preferred split-MAC LWAPP im-
plementation? (Select two.)
a.
IEEE 802.1Q trunking extends from the wired infrastructure to a WLAN con-
troller. Then the 802.1Q packet is encapsulated in CAPWAP or LWAPP and sent
to the access point for transmission over the SSID.
b.
Each wireless client authentication type maps to a unique SSID, which in turn
maps to a common shared VLAN.
c.
802.1Q trunking extends from the wired infrastructure to the access point for
translation into SSIDs.
d.
Each wireless client authentication type maps to a unique SSID, which in turn
maps to a unique VLAN.
e.
802.1Q trunking extends from the wired infrastructure to a WLAN controller
for t ran slat ion into S SIDs.
37. Which two of these are required for Cisco wireless client mobility deployment?
a.
Matching security
b.
Matching mobility group name
c.
Matching RF channel
d.
Matching RF group name
e.
Matching RF power
f.
Assigned master controller
Search WWH ::




Custom Search