What questions should you ask the IT manager?
Given: You are an independent contractor, hired to perform an indoor site survey for ABC Hotel.
The network will support both hotel staff and guest users. You are interviewing the network manager to gather business, performance, and security requirements for the future 802.11 WLAN.
What questions should you ask the IT manager? Choose 2
what immediate concerns do you note?
Given: XYZ Company is planning to install a new 802.11 WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible.
XYZ has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3-2005, Clause 33 compliant PoE. After hearing this information, what immediate concerns do you note?
Which of the following AP modes can be used for site surveys?
Which of the following AP modes can be used for site surveys?
What actions should be recommended as part of the site survey project?
Given: ABC Company has hired you to perform an indoor site survey of their 7-story facility. ABC Company rents out unused space in their building to other companies, and the other companies use 802.11 WLANs already.
ABC Company wants all of the offices they occupy to be surveyed as part of the project.
What actions should be recommended as part of the site survey project? Choose 2
Which of the following security methods can be used to detect the DoS attack in order to enhance the security
Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?
What will you configure on the laptop to accomplish the task?
You work as a Network Administrator for Infonet Inc. The company’s office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
Which of the following provides the best protection against a man-in-the-middle attack?
Which of the following provides the best protection against a man-in-the-middle attack?
What can put the application at risk of time-outs?
Given: Before performing a site survey for a hospital, the network manager notifies you that there is a connection-oriented, real-time medical application used across the hospital’s wired network.
This application will also be used on the WLAN once it is installed. Because the application is real-time, it is sensitive to service disruptions and latency. For this reason, it is particularly important to locate sources of RF interference, blockage, and dead spots.
What can put the application at risk of time-outs? Choose 2
Which of the following will you tell Mark to do to improve the weak signal strength and stability?
You work as a Help Desk Technician for uCertify Inc. Your work is to provide technical assistance to users on the phone. Mark, a user, reports that he is facing some difficulties in staying connected to his office wireless network with his laptop. His computer reports that the wireless signal is very low. Which of the following will you tell Mark to do to improve the weak signal strength and stability?
Each correct answer represents a complete solution. Choose two
Which of the following standards is used in wireless local area networks (WLANs)?
Which of the following standards is used in wireless local area networks (WLANs)?