What statements accurately describe the RF cables and connectors that are used in an 802.11 WLAN system?
What statements accurately describe the RF cables and connectors that are used in an 802.11
WLAN system? (Choose three)
What frequency band is NOT specified for use by IEEE 802.11 radios?
What frequency band is NOT specified for use by IEEE 802.11 radios?
How does an AP perform band steering to encourage clients to use 5 GHz?
The client devices that connect to your network include a mix of dual-band 802.11n, single-band
802.11b/g, and some 802.11a/g. Your access points are configured with the same SSID on both
the 2.4 and 5 GHz bands. The APs are also configured to prioritize client connectivity to 5 GHz.
How does an AP perform band steering to encourage clients to use 5 GHz?
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) in IEEE 802.11
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM)
in IEEE 802.11 WLANs?
What distinguishes an independent basic service set (IBSS) from an infrastructure basic service set (BSS)?
What distinguishes an independent basic service set (IBSS) from an infrastructure basic service
set (BSS)?
What term describes the effect of increasing the intensity of an RF wave with an antenna by focusing the energ
What term describes the effect of increasing the intensity of an RF wave with an antenna by
focusing the energy in a specific direction?
What features are most often configurable within 802.11 WLAN client utilities?
What features are most often configurable within 802.11 WLAN client utilities? (Choose two)
What can cause an excessively high VSWR (Voltage Standing Wave Ratio) in a WLAN RF transmission line?
What can cause an excessively high VSWR (Voltage Standing Wave Ratio) in a WLAN RF
transmission line?
What statement about 802.11 WLAN performance is true?
What statement about 802.11 WLAN performance is true?
which authentication methods always create Layer 2 dynamic encryption keys?
In WLAN security, which authentication methods always create Layer 2 dynamic encryption keys?
(Choose two)