Which two statements best describe LWAPP?
Which two statements best describe LWAPP? (Choose two.)
What three roles are defined by 802.1X?
What three roles are defined by 802.1X? (Choose three.)
What are four features of WPA?
What are four features of WPA? (Choose four.)
Which five statements are results of that exchange using controller based network?
When using the enterprise-based authentication method for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator. Which five statements are results of
that exchange using controller based network? (Choose five.)
where are the wireless encryption keys located during the active user session?
A client is attached to the Cisco Unified Wireless network using controllers. When the client is
using WPA2 and EAP authentication, where are the wireless encryption keys located during the
active user session? (Choose two.)
Which two attacks does Management Frame Protection help to mitigate?
Which two attacks does Management Frame Protection help to mitigate? (Choose two.)
What are the four types of wireless networks?
What are the four types of wireless networks? (Choose four)
What is the typical maximum range of a wireless PAN?
What is the typical maximum range of a wireless PAN?
True or false: A wireless PAN consumes little power from small handheld computer devices.
True or false: A wireless PAN consumes little power from small handheld computer devices.
What relatively new standard applies to wireless MANs?
What relatively new standard applies to wireless MANs?