A. Initial role
B. Server derived role
C. 802.1X default role
D. User derived Role
E. MAC authentication default role
A. less than
B. equals
C. contains
D. greater than
E. inverse of
A. The guest-provisioning account can see the controller's configuration but cannot change it
B. The root account can be used to monitor access points connected to the controller
C. The network-operations account cannot access configuration
D. The guest-provisioning account can make changes to the internal AP database
E. The read-only account cannot delete internal database entries
A. Purge, save, boot
B. Write erase all
C. Purge, save, reload
D. Purge restart
E. Purge, write mem, reload
A. APs of a specific type
B. All APs
C. APs in particular AP Group
D. APs designated as Air Monitors
E. APs meeting specified search criteria
A. MAC
B. VLAN
C. Role
D. SSID
E. AP
A. Base AOS
B. RFprotect
C. Application Security
D. PEF NG
E. Content Security
A. Use restrictive firewall policies to limit the guest user's access to internal resources
B. Providing guests their own APs and controllers
C. Authenticate users with the internal captive portal against the internal database or other server
D. Dedicated APs
E. DoS guest users off of the system and make them use wired ports
A. Certificate based tunnel
B. L2TP over IPSec is used to carry user traffic and control traffic
C. The AP does not encrypt user traffic. The user's link layer encryption is used.
D. Remote AP traffic is unencrypted
E. PPTP is used to tunnel user traffic