Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.
What is the most cost effective upgrade solution that will yield:
Given: ABC Company has a 2-story building and one WLAN controller with six lightweight APs.
The
WLAN controller currently provides coverage to 75% of both floors and an adequate amount of capacity for all client devices. The network manager has decided that ABC Company needs 100% coverage, and the existing WLAN controller will not support any additional APs. The Engineering team is moving upstairs and the Sales team is moving downstairs to keep everyone organized and efficient. There will be an occasional need for members of the Engineering team to work downstairs and for the Sales team to work upstairs, and each team is increasing in size by 10% over the next month.
What is the most cost effective upgrade solution that will yield:
1) Continued support of fast/secure roaming between APs
2) Added network capacity to accommodate the 10% growth
3) 100% coverage on both floors of the facility
Which of the following protocols is designed to provide more secure encryption than the weak wired encryption
Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?
Which of the following devices use RF to communicate?
Which of the following devices use RF to communicate? Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols periodically verifies the identity of the client by using a three-way handsha
Which of the following protocols periodically verifies the identity of the client by using a three-way handshake?
What is the most efficient step that Joe can take to prevent hackers from attacking his customers’ wirel
Given: Joe runs a coffee shop, and as a value added service for his customers he has implemented a
Wi-Fi hotspot. Joe has read news articles about how hackers lurk at hotspots trying to take advantage of unsuspecting users. Joe wants to avoid this problem at his coffee shop. What is the most efficient step that Joe can take to prevent hackers from attacking his customers’ wireless computers at his coffee shop?
Which of the following IEEE standards is defined to enhance security of Wireless LANs (WLANs) that follow the
Which of the following IEEE standards is defined to enhance security of Wireless LANs (WLANs) that follow the IEEE 802.11 standard?
Which of the following hardware support hot plugging?
Which of the following hardware support hot plugging? Each correct answer represents a complete solution. Choose all that apply.
Which of the following keys are used by the symmetric key algorithm?
Which of the following keys are used by the symmetric key algorithm?
Each correct answer represents a complete solution. Choose all that apply.
which of the following situations will you use an omnidirectional antenna?
In which of the following situations will you use an omnidirectional antenna? Each correct answer represents a complete solution. Choose all that apply.