1.
In controller-based architecture, a control message sent between the access point and the controller is secured using which protocol?
2.
Before a Cisco Unified Wireless IP Phone 7920 can place a call, it will compare the QBSS in the beacon from the access point with the QBSS threshold on the phone. What action will the Unified Wireless IP Phone 7920 take if the QBSS threshold in the beacon is exceeded?
3.
How is a bridge group name used in a wireless mesh deployment?
4.
How many signatures does the Cisco IPS 4200 Series Sensor platform support?
5.
What is the maximum number of WLAN controllers that can be supported on one instance of Cisco WCS running on a high-end server?
6.
The Newton Manufacturing Company has three facilities that are located in Columbia, South Carolina. The corporate office is located in an 11-story building downtown. The R&D facility is located on the north side of the
city approximately 4 miles (6.4 km) from the corporate office in a five-story building. The manufacturing facility is located approximately 6 miles (9.6 km) to the northwest of the corporate office. Line of sight exists from the
downtown office to all facilities. Users at the manufacturing plant require network connectivity for file-sharing and e-mail, while the users at the R&D facility require high-speed Internet access with the ability to send large
CAD drawings to the corporate office and large machine control files to the manufacturing facility. Presently, the manufacturing facility is connected to the corporate office by a 64-kbps leased line, and the R&D facility is
connected to both the corporate office and the manufacturing facility by a dedicated T1 line. The company plans to add a second line of development at the R&D facility within the next 60 days. The current T1 lines are
at a constant 70 percent utilization rate. The current projected lead time for installation of additional lines is 90 days if the cable plant will support it.
Which deployment option would provide the most benefit to the customer?
7.
When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products?
8.
A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The customer wishes to use IEEE 802.1X authentication using certificate services. Which EAP-type combinations are appropriate?
9.
OFDM provides which improvement over DSSS in the 2.4-GHz range?
10.
The recommended channel utilization QoS Basic Service Set load for a VoIP network should be less than which value?