What are the two types of microwave transmissions used in commercial wireless networking?
You are evaluating the security of different wireless media, and are considering the use of microwave technology. What are the two types of microwave transmissions used in commercial wireless networking?
If an attacker is trying to gain access to an infrared transmission, what will the attacker need?
You are evaluating the security of different wireless media, and are considering an infrared solution. If an attacker is trying to gain access to an infrared transmission, what will the attacker need?
1x, what allows for the multiple methods of user authentication?
In 802.1x, what allows for the multiple methods of user authentication?
What are the two types of infrared wireless transmissions?
You are training some of your team on the concepts of wireless technologies. What are the two types of infrared wireless transmissions?
When using IPTables, the ability to specify all possible IP addresses in a rule is included; which of the foll
When using IPTables, the ability to specify all possible IP addresses in a rule is included; which of the following are correct syntax for specifying all possible IP addresses?
What tool used in wireless network analysis has the ability to output its findings to MapPoint?
What tool used in wireless network analysis has the ability to output its findings to MapPoint?
If you are physically examining the office where your WLAN is configured, what are you performing?
If you are physically examining the office where your WLAN is configured, what are you performing?
what can you add to the clients to have them participate in the WLAN?
If you are configuring your WLAN for security, and you configure the access points with a security feature that the clients do not support, what can you add to the clients to have them participate in the WLAN?
What wireless protection system is defined as: MIC + TKIP + EAP + 802.1x?
It has been decided that you must implement new security on your wireless networks. What wireless protection system is defined as: MIC + TKIP + EAP + 802.1x?