The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless
network. Which two statements correctly describe features of this protocol? (Choose two)
A.
Control traffic between an access point and a controller is encrypted within LWAPP.
B.
Data traffic between an access point and a controller is encrypted within LWAPP.
C.
Layer 3 mode packets are transmitted in TCP frames.
D.
Data traffic between an access point and a controller is encapsulated within LWAPP.
E.
VLAN tagging and QoS markings are applied at the access point.
Explanation:
The LAP and WLC pair use the lightweight access point protocol (LWAPP) as the tunneling
mechanism.
LWAPP control messages—Exchanges that are used to configure the LAP and manage its
operation. The control messages are authenticated and encrypted so that the LAP is
securely controlled by only the WLC.
LWAPP data—Packets to and from wireless clients associated with the LAP. The data is
encapsulated within LWAPP, but is not encrypted or otherwise secured between the LAP
and WLC.
Data traffic between Access Point(AP) and Controller is encapsulated with LWAPP.