Live Virtual Machine Lab 11.2: Module 11 Implementing Wireless Security Configurations
In the 2.4 GHz band, which of the following channels do not overlap with the other channels? [Choose all that apply]
1 6 11
Which of the following encryption key size is used by Wi-Fi Protected Access 2 (WPA2)?
128-bit
Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?
802.11ac
In which of the following wireless mode's can anyone connect to the wireless network without authentication?
Open
Which of the following security protocol is used by Protected Extensible Application Protocol (PEAP)?
TLS