_________ is classified as an 802.11i RSN with _________ as the mandatory encryption protocol.
_________ is classified as an 802.11i RSN with _________ as the mandatory encryption protocol.
Which two UNII bands and channels should you restrict the APs to use on the 5 GHz radios?
You are designing an autonomous wireless network for an office building that is located near a
local airport. The customer requires the use of 802.11a/n clients only, and the APs must never
change their channel after they are configured. Which two UNII bands and channels should you
restrict the APs to use on the 5 GHz radios? (Choose two.)
How do you design this solution?
You have been hired to install an outdoor wireless network for a small city. The design must
provide 360 degrees of coverage from a central location and at least 33 Mb/s of aggregate
bandwidth for clause 18 radio clients. How do you design this solution?
Which three security threats require the Cisco Adaptive wIPS service for mitigation?
Which three security threats require the Cisco Adaptive wIPS service for mitigation? (Choose
three.)
Which of the following are required components for Client MFP?
Which of the following are required components for Client MFP? (Choose two.)
Which of the following statements are true regarding RLDP?
Which of the following statements are true regarding RLDP? (Choose two)
Which of the following statements are not correct about Client Management Frame Protection (MFP)?
Which of the following statements are not correct about Client Management Frame Protection
(MFP)? (Choose 2.)
What is the best EAP method for XYZ to implement?
Corporation XYZ just underwent a third-party security audit. The auditors have required that the
corporation implements 802.1x on its wireless network and disable all pre-shared key WLANs as
soon as possible. XYZ does not have an internal CA installed to provide server certificates today.
However, it wishes to implement an EAP method that requires clients to use server authentication
in the future. XYZ also needs an EAP method that will allow both Active Directory user
authentication and time-based tokens.
What is the best EAP method for XYZ to implement?
Which of the below parameters are used in calculating the range – maximum distance – of an outdoor
Which of the below parameters are used in calculating the range – maximum distance – of an
outdoor link between two bridges? Choose two.
which two of the below statements describe the radiation pattern of a patch and a Yagi antenna?
When viewed from the side (in the H-plane), which two of the below statements describe the
radiation pattern of a patch and a Yagi antenna? (Choose two.)