A user repeatedly calls in to the Help desk complaining about their wireless connection.
Which actions would test the user's wireless connectivity from RingMaster?
A. Locate the client in the client tools screen using the Find Clients tab. Once the client is located, run the RF ping test to determine RSSI and retry counts to verify the RF environment being reported by the AP to which the client is connected.
B. Locate the client in the client tools screen using the Find Clients tab. Once the client is located, choose to terminate the client from the wireless network so they can reestablish a new session.
C. Locate the client in the client tools screen using the Find Clients tab. Once the client is located, add the client to the Watched Client list to gather additional data on the clients signal strength and data throughput.
D. Locate the client in the client tools screen using the Find Clients tab. Once the client is located, run the Location History option to find out if the client is near a functioning access point.
正解:A
質問 2:
A network administrator wants to look at data throughput per radio.
Which panel in RingMaster would you use?
A. Alarms
B. Verification
C. Monitor
D. Devices
正解:C
質問 3:
A customer wants to establish bidirectional trust between the WLC and the RingMaster management system.
Which default self-signed certificate on the WLC must be replaced to ensure bidirectional trust?
A. 802.1x certificate
B. Web-portal certificate
C. admin certificate
D. SSH certificate
正解:C
質問 4:
You are implementing user globs to allow access to your network. You want to allow access to users with the username @company.com.
Which user glob do you configure?
A. *[email protected]
B. [email protected]
C. *@company.com
D. [email protected]
正解:C
質問 5:
Which protocol is used for access point (AP) control and management traffic?
A. SSL
B. HTTP
C. FTP
D. TAPA
正解:B
質問 6:
You detect wireless clients who are connected to an unauthorized AP on your network.
Which setting would you configure to block their access to the network?
A. Encryption
B. Radio Frequency (RF)
C. Countermeasures
D. Auto-tuning
正解:C
質問 7:
Your manager asks you to create a service profile using WPA2 with a preshared key.
Using the RingMaster tool, which two wizards are available to automate this process? (Choose two.)
A. Location Service Profile
B. Open Access Service Profile
C. 802.1x Service Profile
D. Web-Portal Service Profile
正解:B,D
質問 8:
You have a Juniper Networks WLC880 deployed on your network with 12 WLAs configured on it. Your manager just approved a budget to buy more WLAs, but there is not enough budget to purchase an upgrade license.
How many WLAs can you add without purchasing an additional license?
A. 8
B. 4
C. 16
D. 20
正解:B
質問 9:
In a default configuration, when the system observes a neighboring access point (AP) on both the wireless network and the wired network, how will the AP be identified?
A. as a rogue
B. as a suspect
C. as a member
D. as a neighbor
正解:A
戸内** -
問題も解説も良質なので、たくさん問題を解いておきたい方にはおすすめできますね。
しかも試験の問題にも入ていて、高得点で受かりました。