Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.

What will be an ideal response?


Both SNMP and WLAN management systems allow for configuration of the wireless APs through the network without the necessity of "touching" each device. However, SNMP is only capable of a small number of configuration settings.WLAN management systems, on the other hand, offer a very wide range of configuration settings that can be performed remotely through the network.

Remotely accessing APs for configuration is an important labor-saving technique. An equally important technique is to "bulk" configure a group of access points with the same configurations (such as Allow Broadcast SSID) and then adjust a small number of settings for specific access points (such as AP Name).

Another aspect of configuration is upgrading the firmware of access points. Firmware upgrade images can be imported and then applied to one AP, all APs, or groups of access points.Grouping APs allow firmware images to be separately distributed based on vendor or model. This allows for upgrades to be performed at night when there is less traffic.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a) By default, the Toolbox contains only the Rectangle and Ellipse shapes, which you can drag onto the GUI designer. b) To edit a shape’s properties in the Properties window you must first select the shape in the designer. c) A Canvas allows you to specify the exact position of a shape. d) The Document Outline window shows the nested structure of a page’s layouts and controls and makes it easier to select specific controls to customize them with the Properties window.

Computer Science & Information Technology

Sans serif fonts do not have lines or extensions on the ends of the letters

Indicate whether the statement is true or false

Computer Science & Information Technology

List the items that must be included within the method declaration's parentheses.

What will be an ideal response?

Computer Science & Information Technology

A technician has installed new vulnerability scanner software on a server that is joined to the company domain. The vulnerability scanner is able to provide visibility over the patch posture of all company's clients.Which of the following is being used?

A. Gray box vulnerability testing B. Passive scan C. Credentialed scan D. Bypassing security controls

Computer Science & Information Technology