Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()
A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator?()
A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()
Your company has deployed Network Access Protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP.What should you do?()
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a networkwhen you select which of the following modes from the AP Mode drop-down menu on the controller?()
Your company has recently deployed a server that runs Windows Server 2008. The server has the IP information shown below. IP address 192.168.46.186 Subnet mask: 255.255.255.192 Default gateway: 192.168.46.1 Users on remote subnets report that they are unable to connect to the server. You need to ensure all users are able to connect to the server. What should you do? ()
Your client has deployed a Cisco Wireless Location Appliance within their warehouse environment.They have been experiencing problems with tracking objects using active RFID tags. The RFID tagdata is not being collected. On which device would you verify that RFID status has been enabled?()
You develop a service application that needs to be deployed. Your network administrator creates a specific user account for your service application.You need to configure your service application to run in the context of this specific user account. What should you do?()
A banking customer deployed an IBM BladeCenter chassis with one Brocade 8Gb SAN switch module. The customer requires an 8Gb uplink or higher. Which configuration will meet this request of the following?()