Mod 6 Mind Tap

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which wireless standard provides a range of 150 feet and is the oldest standard still in use and supported by wireless routers? 802.11a 802.11g 802.11b 802.11n

802.11b

In Basic Service Set (BSS), what is the maximum number of access points? 2 Multiple 1 0

1

When is a site survey done for a wireless network? Before deployment At each step of deployment During deployment Post deployment

Before deployment

In roaming, what is the first step that a wireless client performs? Scanning Disassociation Authentication Association

Scanning

Which is the orientation of the antenna concerning the surface of the earth? Channel Capacity Antenna Polarization Received signal strength indication (RSSI) signal strength Channel Throughput

Antenna Polarization

Which type of portal is used for wireless client authentication? RADIUS Captive Acceptable Usage Authentication

Captive

You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use? Restrict the visitors from connecting to the wireless network Segment the wireless network Install antivirus on each wireless client Create a guest wireless network

Create a guest wireless network

When using CDMA, where is the cellular-related information stored? In the handset Both in the SIM and handset At the service provider's end In SIM

In the handset

Which protocol is used for generating preshared keys? Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Temporal Key Integrity Protocol (TKIP) Advanced Encryption Standard (AES) Wi-Fi Protected Access 2 (WPA2)

Temporal Key Integrity Protocol (TKIP)

Which protocol was initially introduced with Wi-Fi Protected Access (WPA)? Wi-Fi Protected Access 2 (WPA2) Advanced Encryption Standard (AES) Temporal Key Integrity Protocol (TKIP) Wired Equivalent Privacy (WEP)

Temporal Key Integrity Protocol (TKIP)


Conjuntos de estudio relacionados

BUS151 People Skills Midterm (Ch 1-5)

View Set

ch 70 Emergency, Trauma, and Environmental Injuries

View Set

CSC 410 Fall 2019 Final/Quiz Guide

View Set

Y= 1/ 1-c1 * (c0 + I + G - c1T) - EQ NEL MKT DEI BENI -

View Set

Chapter 13 Recognizing Employee Contributions with Pay

View Set