多項(xiàng)選擇題

A new lightweight access point (LAP) has been installed in the Company WLAN.
 Which two  statements correctly describe the association process between this LAP and a WLAN controller? ()

A. An access point will search for a controller using a broadcast address if using LWAPP Layer 2  and a unicast address if using LWAPP Layer 3 mode.
B. If multiple wireless controllers are detected by an access point, the controller with the fewest  associated access points is chosen to associate with.
C. In order to associate in Layer 3 mode, the access point must have been preconfigured with an  IP address.
D. Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP  address from the controller.
E. An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not  successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.
F. If multiple wireless controllers are detected by an access point, all of them will be used and  traffic will be load balanced.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit.  
What type of message will be used by the lightweight access point (LAP) in an attempt to locate  the wireless LAN controller (WLC)? ()

A. The LAP will send out a DNS request. In return, the DNS server will provide the WLC domain  name.
B. The LAP will send out a Layer 3 LWAPP discovery request to the WLC on the wireless network. 
C. The LAP will send out a DHCP request. In return, the DHCP server will provide the IP  addresses for the LAP and the WLC.
D. The LAP will send out a Layer 2 LWAPP discovery request to the WLC on the wireless network.

2.多項(xiàng)選擇題

You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines. 
What should you tell her? ()

A. Layer 3 addressing and distribution
B. SNMP monitoring services
C. Access point certification and software control
D. Packet encapsulation, fragmentation, and formatting
E. Compression and Layer 3 address mapping
F. User behaviors