Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating th
Which of the following would Pete, a security administrator, do to limit a wireless signal from
penetrating the exterior walls?
Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating th
Which of the following would Pete, a security administrator, do to limit a wireless signal from
penetrating the exterior walls?
Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality
Ann, a security administrator, has concerns regarding her company’s wireless network. The
network is open and available for visiting prospective clients in the conference room, but she
notices that many more devices are connecting to the network than should be.
Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current
functionality for clients?
Which of the following would be the BEST option to begin addressing the issue?
After reviewing the firewall logs of her organization’s wireless APs, Ann discovers an unusually
high amount of failed authentication attempts in a particular segment of the building. She
remembers that a new business moved into the office space across the street. Which of the
following would be the BEST option to begin addressing the issue?
Which of the following antennas would be BEST for this situation?
An administrator wants to establish a WiFi network using a high gain directional antenna with a
narrow radiation pattern to connect two buildings separated by a very long distance. Which of the
following antennas would be BEST for this situation?
Which of the following antennas would be BEST for this situation?
An administrator wants to establish a WiFi network using a high gain directional antenna with a
narrow radiation pattern to connect two buildings separated by a very long distance. Which of the
following antennas would be BEST for this situation?
Which of the following is the MOST likely cause?
A company has recently implemented a high density wireless system by having a junior technician
install two new access points for every access point already deployed. Users are now reporting
random wireless disconnections and slow network connectivity. Which of the following is the
MOST likely cause?
Three of the primary security control types that can be implemented are.
Three of the primary security control types that can be implemented are.
Three of the primary security control types that can be implemented are.
Three of the primary security control types that can be implemented are.
which applications a user can install and run on a company issued mobile device?
Which of the following technical controls is BEST used to define which applications a user can
install and run on a company issued mobile device?