What statements define characteristics of WLAN controllers?
Given: ABC Company is opening a new branch office that needs an 802.11 WLAN to support a mission-critical application. The IT manager has considered implementing a remote office WLAN controller with lightweight access points instead of several autonomous access points. He has asked you about the primary differences between the two solutions. What statements define characteristics of WLAN controllers? Choose 2
Which of the following channel access methods is used in IEEE 802.11 networks?
Which of the following channel access methods is used in IEEE 802.11 networks?
What features are supported by 802.11 WLAN controllers?
What features are supported by 802.11 WLAN controllers? Choose 4
Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (W
Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (WIDS)?
Which of the following is a case sensitive text string used in wireless network and having a maximum length of
Which of the following is a case sensitive text string used in wireless network and having a maximum length of 32 characters?
What mechanisms are specified by the IEEE 802.11-2007 standard to assure that only one radio istransmitting on
What mechanisms are specified by the IEEE 802.11-2007 standard to assure that only one radio is
transmitting on the RF medium at a given point in time? Choose 3
What security risk does this present?
A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?
Which of the following attacks are considered as authentication attacks?
Which of the following attacks are considered as authentication attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of cyber crimes involves this form of network attack?
Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?
which channel access methods as a part of the Hybrid Coordination function?
The IEEE 802.11-2007 standard specifies which channel access methods as a part of the Hybrid Coordination function? Choose 2