Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
A . Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).
B . Read-write access is not available; only read-only access is supported.
C . Uploads and downloads from the controller are not allowed.
D . Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated.
Answer: C
Latest 200-355 Dumps Valid Version with 539 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments