A. Rogue AP detection
B. Multi-band scan
C. Coordinated Access to a Single Channel
D. Band steering
E. Spectrum load balancing
A. Basic controller configuration
B. VPN configuration
C. Firewall Roles
D. WLAN configuration
E. License installation
A. To let hackers know which ports are open on your firewall
B. To aid in troubleshooting firewall policy configuration
C. To tell down stream routers to use a more appropriate router
D. To let the system count the violations
E. To let your users know they they are in violation of corporate policies
A. Purge, save, boot
B. Write erase all
C. Purge, save, reload
D. Purge restart
E. Purge, write mem, reload
A. DHCP server inside the Remote AP
B. Address must be statically assigned
C. DHCP server connected to the Remote AP's controller
D. DHCP server at a branch office
E. DHCP from global content server for Remote APs
A. Least specific to most specific
B. Most specific to least specific
C. Order is not important
D. Policies with the most rules 1st
E. Most important resources first
A. Are applied as an action in a rule
B. Make firewall rules act like traditional ACLs
C. Are a part of roles, not the firewall
D. Ease readability and maintainability for source and destination addresses
E. Apply firewall polices to ports in a stateful manner