which type of building construction material?
During a site survey, it is important to collect and record data about radio frequency related interference and blockage sources that result in reduced signal coverage. The least amount of RF signal loss is introduced by which type of building construction material?
How many characters is the maximum limit of a service set identifier (SSID)?
How many characters is the maximum limit of a service set identifier (SSID)?
How many non-overlapping channels does the IEEE 802.11a have?
How many non-overlapping channels does the IEEE 802.11a have?
Which of the following is the most secure protocol used for encryption in a wireless network?
Which of the following is the most secure protocol used for encryption in a wireless network?
Which of the following are three items that are specified by or derived from the IEEE 802.11i wireless LAN sec
Which of the following are three items that are specified by or derived from the IEEE 802.11i wireless LAN security amendment? Choose 3
Which are two security measures that you should apply to meet Your company’s requirements?
Your companyhas many client devices, some that support WEP, some that support WPA, and some that support WPA2. The client devices that support only WEP can be firmware upgraded to support the TKIP wireless security protocol. As the wireless administrator at Your company, it is your responsibility to provide the strongest industry standard layer-2 security possible while applying a reliable solution for all devices. Which are two security measures that you should apply to meet Your company’s requirements? Choose 2
Which of the following protocols is used by Point-to-Point (PPP) servers to validate the identity of remote cl
Which of the following protocols is used by Point-to-Point (PPP) servers to validate the identity of remote clients?
How many access points does an independent basic service set (IBSS) consist of?
How many access points does an independent basic service set (IBSS) consist of?
Which statement in relation to the solution you chose to deploy is accurate?
You are a network engineer for your company. Your company wants you to establish an outdoor WLAN connection between two buildings that are 2 kilometers (1.24 miles) apart. Your first required goal is to create a point-to-point link between the two buildings within FCC regulations. Secondly, you need to provide an industry-standard security solution capable of supporting mutual authentication. Protecting your wireless bridges from environmental elements such as windblown dust, rain, and splashing water could be done as an optional goal.
You proceed by installing an 802.11b wireless bridge at each building, configuring one in root mode and the other in non-root mode. You then configure each radio for 1 watt (+30 dBm) and connect 9 dBi omni-directional antennas to both. You position each wireless bridge in a NEMA- compliant enclosure intended for outdoor use and configure them for 802.11i-compliant security features. Which statement in relation to the solution you chose to deploy is accurate?
Which of the following protocols is used for authentication in an 802.1X framework?
Which of the following protocols is used for authentication in an 802.1X framework?