Select this action from the available options.
Prior to implementing a wireless solution, there is a specific action which you should perform.
Select this action from the available options.
Which two of the following tasks must be carried out to maintain consistent network security?
You are a network administrator at Certkiller .com. The size of Certkiller .com’s
WLAN is growing rapidly. Which two of the following tasks must be carried out to maintain
consistent network security? (Select TWO.)
which is the most costeffective system that you can apply to meet Certkiller .com’s troubleshooting requ
You are an administrator at Certkiller .com. Certkiller .com wants you to install an 802.11g WLAN
that supports fast roaming for 802.11b IP phones. The ability to troubleshoot reassociations that
are delayed or dropped during roaming is a requirement. Of the following, which is the most costeffective system that you can apply to meet Certkiller .com’s troubleshooting requirement?
Which of the following are two wireless security policy items that you should implement to safeguard your data
You are a network administrator at Certkiller .com. You frequently work from home and wireless
hotspots, rather than commuting to the office. Your laptop hooks up to the office network via
WLANs. Which of the following are two wireless security policy items that you should implement to
safeguard your data? (Select TWO.)
which two of the following elements?
A WLAN security policy should address which two of the following elements? (Select TWO.)
What is a Wireless Encryption Protocol (WEP) a standard for?
What is a Wireless Encryption Protocol (WEP) a standard for?
Select all that apply.
Name a common method of wireless encryption. Select all that apply.
Which of the suggested actions would prevent unauthorized users from connecting their computer to a Certkiller
Which of the suggested actions would prevent unauthorized users from connecting their computer
to a Certkiller .com’s WLAN?
What is WEP (Wireless Encryption Protocol) a standard for?
The computer world is full of different standards. What is WEP (Wireless Encryption Protocol) a
standard for?
What will your answer be?
You are working as a senior network technician at Certkiller .com. A trainee has been asked to
setup a Wireless LAN in the HR department. He wants to know which of the following he would
use to encrypt the wireless network. What will your answer be?