A. Station
B. End node
C. Client Device
D. Supplicant
E. Authenticated Client
A. gif
B. dwg
C. bmp
D. jpg
E. tiff
A. HTML
B. CSV database format
C. Microsoft Excel
D. MySQL
E. Microsoft Word
A. When an AP needs to transmit data to a user, it checks the validuser ACL to make sure the user has a valid IP address
B. Before a client is added to the controller's user table, the validuser ACL is checked to make sure the client has a valid IP address
C. When a user transmits data through the controller, the validuser ACL is used to check if the user is in the layer 3 user-table
D. A list of configured MAC addresses that define the valid users
E. The validuser ACL is used during 802.1X authentication to check that the client is in the layer 3 user-table
A. A reboot is not required until you have completed the configuration wizard
B. Before any other configuration can take place
C. Only if the Policy Enforcement Firewall license is installed
D. After each license is installed
E. Once the last License is added
A. Controller country code
B. Time zone
C. WLANs
D. VLANs and IP addressing
E. Licenses
A. Stop the client from associating with any SSID on the controller
B. Block the client from the SSID he was connected to
C. Only block the client if it hasn't yet associated with an AP
D. De-authenticate the client from the network but allow it to keep transmitting data
E. Send a message telling the client it has been blacklisted
A. Backup controller
B. Primary
C. Master
D. Local
E. Standalone
A. Purge, save, boot
B. Write erase all
C. Purge, save, reload
D. Purge restart
E. Purge, write mem, reload