Correct Answer: A
QUESTION 81
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
A. Cloud-Based Access Point
-> managed from a Web-based dashboard
-> supports automatic deployment
Lightweight Access Point
-> configured and managed by a WLC
-> supports different operational modes
Correct Answer: A
QUESTION 82
SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two)
-
Set the QoS level to silver or greater for voice traffic
-
Enable Media Session Snooping on the WLAN
-
Configure two different QoS roles for data and voice traffic
-
Set the QoS level to platinum for voice traffic
-
Enable traffic shaping for the LAN interface of the WLC
Correct Answer: BD
Exam D
QUESTION 1
Refer to the exhibit.
Routers R1, R2, and R3 use a protocol to identify their neighbors’ IP addresses, hardware platforms, and software versions. A network engineer must configure R2 to avoid sharing any neighbor information with R3, and maintain its relationship with R1. What action meets this requirement?
-
Configure the no lldp run command globally
-
Configure the no lldp receive command on g0/1
-
Configure the no cdp run command globally
-
Configure the no cdp enable command on g0/2
Correct Answer: D
QUESTION 2
What is a function of an endpoint?
-
It passes unicast communication between hosts in a network
-
It is used directly by an individual user to access network services
-
It provides security between trusted and untrusted sections of the network
-
It transmits broadcast traffic between devices in the same VLAN
Dostları ilə paylaş: |