Which three authentication methods are supported on the WLSE Express local authentication server?
Which three authentication methods are supported on the WLSE Express local authentication
server? (Choose three.)
Why has the customer only had limited success with the current deployment to meet the data needs?
A customer brings you a previously completed site survey for the initial wireless implementation
from 12 months ago. The customer currently has six access points deployed in the warehouse.
The survey shows that the installed coverage provides for a 15-percent overlap between cells at
5.5 Mbps, and a 5-percent overlap at 11 Mbps. This solution has proven to provide adequate
coverage and roaming capabilities for the data applications. However, the customer has recently
moved to a VoIP telephony solution and has attempted to add seven Cisco 7920 wireless IP
phones with limited success. Why has the customer only had limited success with the current
deployment to meet the data needs?
Which security feature was introduced in Cisco Compatible Extensions program version 3?
Which security feature was introduced in Cisco Compatible Extensions program version 3?
Which product will support the customer requirements?
A customer is adding a new branch office with 60 access points and 120 users that requires WDS
to support a wireless VoIP application on a single subnet. Additionally, the customer requires local
authentication services to provide authentication capability in the event of a WAN failure. Which
product will support the customer requirements?
Which advanced feature set device is provided with a Kensington lock slot?
Which advanced feature set device is provided with a Kensington lock slot?
Which EAP types are appropriate?
A wireless security assessment has been performed for a network that is composed of Windows
2000 and Windows XP wireless clients. The client wishes to use 802.1x authentication using
certificate services. Which EAP types are appropriate?
Which two activities are included in a Wireless Security Posture Assessment?
Which two activities are included in a Wireless Security Posture Assessment? (Choose two.)
Which three faults are generated by radio management?
Which three faults are generated by radio management? (Choose three.)
which security benefit to the WLAN?
Centralized authentication with Cisco Secure ACS provides which security benefit to the WLAN?
how many feet?
Typical mesh access-point placements in a suburban environment should be separated by how
many feet?