Mod 6 Mind Tap
Which wireless standard provides a range of 150 feet and is the oldest standard still in use and supported by wireless routers? 802.11a 802.11g 802.11b 802.11n
802.11b
In Basic Service Set (BSS), what is the maximum number of access points? 2 Multiple 1 0
1
When is a site survey done for a wireless network? Before deployment At each step of deployment During deployment Post deployment
Before deployment
In roaming, what is the first step that a wireless client performs? Scanning Disassociation Authentication Association
Scanning
Which is the orientation of the antenna concerning the surface of the earth? Channel Capacity Antenna Polarization Received signal strength indication (RSSI) signal strength Channel Throughput
Antenna Polarization
Which type of portal is used for wireless client authentication? RADIUS Captive Acceptable Usage Authentication
Captive
You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use? Restrict the visitors from connecting to the wireless network Segment the wireless network Install antivirus on each wireless client Create a guest wireless network
Create a guest wireless network
When using CDMA, where is the cellular-related information stored? In the handset Both in the SIM and handset At the service provider's end In SIM
In the handset
Which protocol is used for generating preshared keys? Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Temporal Key Integrity Protocol (TKIP) Advanced Encryption Standard (AES) Wi-Fi Protected Access 2 (WPA2)
Temporal Key Integrity Protocol (TKIP)
Which protocol was initially introduced with Wi-Fi Protected Access (WPA)? Wi-Fi Protected Access 2 (WPA2) Advanced Encryption Standard (AES) Temporal Key Integrity Protocol (TKIP) Wired Equivalent Privacy (WEP)
Temporal Key Integrity Protocol (TKIP)