which of these existing wireless devices?
One of your customers has decided to deploy location-based services in addition to existing wireless services. The customer requires that the additional access points to be deployed in monitor-only mode. The most likely reason for this requirement is that the customer has which of these existing wireless devices?
Which three of these items are key components of a site survey?
Which three of these items are key components of a site survey? (Choose three.)
which device would you verify that RFIDs have been enabled?
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However, employees there have been experiencing problems when tracking objects using active RFID tags. The RFID tag data is not being collected. On which device would you verify that RFIDs have been enabled?
What is the maximum round-trip delay that an H-REAP will tolerate from a centralized controller?
What is the maximum round-trip delay that an H-REAP will tolerate from a centralized controller?
What is the maximum number of wireless controllers that the highest-end Cisco WCS server can manage?
What is the maximum number of wireless controllers that the highest-end Cisco WCS server can manage?
Which EAP authentication method is used by the Cisco WLAN controller to perform web authentication?
Which EAP authentication method is used by the Cisco WLAN controller to perform web authentication?
which device must be configured as a AAA client?
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?
what is recommended to enhance the security of the wireless VoIP network?
As a result of a security site survey, the following is discovered:
An RF signal is available in the parking lot.
Six access points are found belonging to employees.
Static WEP keys are in use in the receiving department.
No security is being used on the access points in human resources.
Wireless VoIP clients in use do not support EAP-FAST.
There is no strong password policy in place.
EAP-Cisco Wireless (Cisco LEAP) is being used for wireless VoIP security.
All clients can support WPA.
VLANs are in use.
Based on these findings, what is recommended to enhance the security of the wireless VoIP network?
what is the percentage of RF bandwidth that can be dedicated to the phones?
By default, on the WLAN controller for a voice application using Cisco 7921 wireless IP phones, what is the percentage of RF bandwidth that can be dedicated to the phones?
Which two individual user parameters can be restricted by administrators of controller-based wireless networki
Which two individual user parameters can be restricted by administrators of controller-based wireless networking using Identity Based Networking Services? (Choose two.)