Which two delivery methods are available for scheduled reports?
A customer would like to receive automated reports from RingMaster on client activity over the last
24 hours. Which two delivery methods are available for scheduled reports? (Choose two.)
Which Juniper Networks WLA model supports spectrum analysis?
Which Juniper Networks WLA model supports spectrum analysis?
Which WLC supports up to 4096 configured access points?
Which WLC supports up to 4096 configured access points?
What are the two configurable channel widths on the WLC for the 802.11n 5 GHz band?
What are the two configurable channel widths on the WLC for the 802.11n 5 GHz band? (Choose
two.)
Which user glob do you configure?
You are implementing user globs to allow access to your network. You want to allow access to users
with the username @company.com. Which user glob do you configure?
how many previous copies of the plan are available to be restored?
A network administrator has deleted the current network plan without saving it first. They are using
the RingMaster Web-based management interface to restore a previous plan that was saved
automatically. By default, how many previous copies of the plan are available to be restored?
Which attribute would identify the correct interferer from the list?
A customer is experiencing intermittent client connectivity problems. Using the spectral analysis
capabilities of the wireless LAN system, the customer has identified a number of interference
sources. One of the interference sources is causing problems for the client. Which attribute would
identify the correct interferer from the list?
how will the AP be identified?
In a default configuration, when the system observes a neighboring access point (AP) on both the
wireless network and the wired network, how will the AP be identified?
What are two reasons for this problem?
A company has installed new voice-over-wireless phones but complains that the voice quality is very
poor. What are two reasons for this problem? (Choose two.)
Which feature would be used to address this?
A customer is concerned about the integrity of user data tunneled between the WLA and the WLC.
Which feature would be used to address this?