CIT 472 Quizzes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Fixed mobile convergence provides roaming across which of the following wireless technologies?

Wi-Fi Cellular

What organization ensures interoperability of WLAN products?

Wi-Fi Alliance

What is the minimum size of a resource unit if 1024-QAM modulation is used by an 802.11ax radio?

242-tone

Assuming all channels are supported by a 5 GHz access point, how many possible 20 MHz channels can be configured on the access point?

25

An IEEE 802.11ac radio card can transmit on the _____________________ frequency and uses __________________ spread-spectrum technology.

5GHz, VHT

Which of these encryption technologies have been cracked?

64-bit WEP 128-bit WEP

What is the maximum data rate defined by the IEEE 802.11ac amendment?

6933.3 Mbps

A PD must be capable of accepting power with either polarity from the power supply. In mode A, on which conductors/wires does the PD accept power?

1,2,3,6

How many modulation and coding schemes are defined in 802.11ac?

10

When a PoE network is installed, what is the maximum distance from the PSE to the PD, as defined in the standard?

100 meters 328 feet

To reduce airtime consumption and provide for better capacity in the 5 GHz band, which data rates are recommended to be selected as basic rates?

12 Mbps 24 Mbps

What is the maximum power used by a PD Class 0 device?

12.95 watts

A VoIP telephone is connected to a 24-port PoE midspan PSE. If the telephone does not provide a classification signature, how much power will the PSE provide to the telephone?

15.4 watts

If an 802.3at-compliant AP is equipped with two radios and requires 7.5 watts of power, how much power will the PSE provide to it?

15.4 watts

23 dBm is equal to how many mW?

200mW

A WLAN transmitter that emits a 100 mW signal is connected to a cable with a 3 dB loss. If the cable were connected to an antenna with 7 dBi of gain, what would be the EIRP at the antenna element?

250 mW

You are designing an 802.3at-compliant network and are installing a 24-port Ethernet switch to support 10 Class 1 VoIP phones and 10 Class 0 APs. The switch requires 500 watts to perform its basic switching functions. How much total power will be needed?

694 watts

To double the effective distance of a signal at a specific power level, the EIRP must be increased by how many dBs?

6dB

When a long-distance point-to-point link is installed, earth bulge should be considered beyond what distance?

7 miles

At maximum power requirements, a 24-port 802.3at-compliant PoE Ethernet switch must be bale to provide about how many total watts of power to PoE devices on all ports?

720 watts

What could an 802.11n (HT) radio use to increase throughput at the MAC sublayer of the Data-Link layer?

A-MSDU A-MPDU Block ACKs

Which keying method is most susceptible to interference from noise?

ASK

What does 802.1X/EAP provide when implemented for WLAN security?

Access to network resources Verification of user credentials Dynamic encryption-key generation

Name a unique consideration when deploying a wireless network in a hotel or other hospitality business.

Aesthetics

How are IPsec VPNs used to provide security in combination with 802.11 WLANs?

All of these (Client-based security on public access WLANs Point-to-Point wireless bridge links Connectivity across WAN links)

Which of these WLAN architectures may require the use of an NMS server to manage and monitor the WLAN?

All of these (Distributed WLAN architecture Autonomous WLAN architecture Centralized WLAN architecture)

Which radio form factors can be used by 802.11 technologies?

All of these (Mini PCI PCMCIA Proprietary Secure Digital Express Card USB 3.0)

During the interview process, which topics will be discussed so that the WLAN will integrate properly into the existing wired architecture?

All of these (PoE, AP management, Segmentation, User management)

Which of these protocols can be used to manage WLAN infrastructure devices?

All of these (SSH HTTP Telnet HTTPS SNMP)

Within a WLAN infrastructure, where can the guest captive web portal operate?

All of these (Third-party server, AP, WLAN controller, Cloud-based service)

What are some examples of how an 802.11 action frame can be used?

An action frame can function as a neighbor report request An action frame can function as a channel switch announcement

Which WLAN architectural models typically require support for 802.1Q tagging at the edge on the network when multiple user VLANs are required?

Autonomous WLAN architecture Distributed WLAN architecture

Which 802.11ax technology has the potential to decrease co-channel interference (CCI)?

BSS color

What type of information can be seen on a mobile device that is monitored by an MDM server?

Battery life Device capacity Installed applications

Which documents might be needed prior to performing an indoor site survey for a new wireless LAN?

Blueprints Network topology map

Which medium contention and access method is used as the foundation of 802.11 Distributed Coordination Function (DCF)?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

What is the traditional data-forwarding model for 802.11 user traffic when WLAN controllers are deployed?

Centralized data forwarding

Which of the following information is included in a probe response frame?

Channel information Basic data rates SSID Supported data rates

When deploying a modern 802.11n/ac wireless network with only two access points, which of the 2.4 GHz channel groupings would be considered nonoverlapping?

Channels 3 and 8 Channels 5 and 11

The carrier sense portion of CSMA/CA is performed by using which of the following methods?

Clear channel assessment NAV timer

What are some extra restrictions that can be placed on a quest user other than those defined by the guest firewall policy?

Client isolation Rate Limiting Web content filtering

What is the main cause of co-channel interference?

Clients on the same channel within hearing range

The IEEE 802.11h amendment (now part of the IEEE 802.11-2016 standard) introduced which two major changes for 5 GHz radios?

DFS, TPC

At which layer of the ISI model is a BSSID address used?

Data-Link

Which layers of the OSI model are referenced in the IEEE 802.11 standard?

Data-link, physical

IEEE 802.11 wireless bridge links are typically associated with which network architecture layer?

Distribution

Which two technologies are used to prevent IEEE 802.11 radios from interfering with radar and satellite transmissions at 5 GHz?

Dynamic frequency selection Transmit power control

Which methods of EAP can e used for authentication for a Passpoint client to conect to a secure Passpoint SSID?

EAP-AKA EAP-TLS

Which type of guest management solution needs to integrate with LDAP?

Employee sponsorship

What is another name for a wireless hijacking attack?

Evil twin

What are some of the negative effects of layer 2 retransmissions?

Excessive MAC sublayer overhead Jitter Increase latency

A network consisting of clients and two or more APs with the same SSID connected by an 802.3 Ethernet backbone is one example of which 802.11 topology?

Extended service set

Which of the following are valid calculations when using the rule of 10s and 3s?

For every 3 dB of gain(relative), double the absolute power(mW) For every 10 dB of loss(relative), divide the absolute power (mW) by a factor of 10

The 802.11 amendment defines a maximum of how many spatial streams for a client?

Four

What are some of the methods that can be used to provision a root certificate onto Wi-Fi clients that function as 802.1X/EAP supplicants?

GPO MDM

Which technologies are used by 802.11 radios in the 2.4 GHz ISM band?

HT ERP DSSS HR-DSSS

What type of communication do IEEE 802.11 radios use to transmit and receive?

Half-duplex

What additional documentation is usually provided along with the final site survey deliverable?

Implementation diagrams project schedule and costs bill of materials

What type of 802.11 radio form factor is normally used in mobile devices such as smart phones and tablets?

Integrated Single Chip

How many client devices can successfully connect and communicate to an AP?

It depends

Which of these attacks are considered denial-of-service attacks?

Jamming Deauthentication spoofing

What are some potential problems when enabling 40 MHz channels in the 5 GHz band?

Lower SNR Co-channel interference

Which 802.11 service set defines mechanisms for mesh networking?

MBSS

During the MDM enrollment process, what resources can a mobile client reach while quarantined inside a walled garden?

MDM server DHCP server DNS server

Which of the following tools can be used in an indoor site survey?

Measuring wheel Battery pack Ladder

Which of the following tools might be used in an outdoor site survey of an area designed to provide outdoor coverage?

Mesh routers Outdoor blueprints or topography map Spectrum analyzer GPS

Which of these can cause unintentional RF jamming attacks against an 802.11 wireless network?

Microwave oven 2.4GHz cordless phones

Name potential sources of interference that might be found during a 2.4 GHz site survey.

Nearby 802.11 FHSS access points Plasma cutters Bluetooth headsets 2.4GHz video cameras

During a site survey of a point-to-point link between buildings at a manufacturing plant, the WLAN engineer determines that the noise floor is extremely high because of all the machinery that is operating in the buildings. The engineer is worried about a low SNR and poor performance due to the high noise floor. What is a suggested best practice to deal with this scenario?

Plan for coverage cells with a 5 dB fade margin.

Which RF behavior best describes a signal striking a medium and bending in a different direction?

Refraction

Which of these propagation behaviors can result in multipath?

Refraction Diffraction Reflection Scattering

What can be done to fix the hidden node problem?

Remove the obstacle Move the hidden node station Decrease power on the hidden node station

To qualify as compliant with the 802.3at amendment (now part of the 802.3 standard), a power device must do which of the following?

Reply to the PSE with a detection signature Accept power with either polarity from the PSE Be able to accept power over the unused data pairs

The logical name of an 802.11 wireless network is known as which type of address?

SSID and ESSID

Which of the following can cause refreaction of an RF signal traveling through it?

Shift in the air temperature Change in the air pressure Humidity Smog

Physical carrier sense uses which two thresholds during the clear channel assessment to determine if the medium is busy?

Signal detect Energy detect

Which of these security methods is a replacement for PSK authentication as defined by WPA3?

Simultaneous Authentication of Equals (SAE)

How can a MIMO system increase throughput at the Physical Layer?

Spatial multiplexing Transmit beamforming 40 MHz channels

Hybrid Coordination Function (HCF) defines what allotted period fo time in which a station can transmit multiple frames?

TXOP

Which 802.11ax technology defines new power-saving capabilities that could be beneficial for IoT devices?

Target wake time

The WLAN help desk gets a call that suddenly all the legacy 802.11b wireless barcode scanners cannot connect to any of the 802.11n APs. However, all the 802.11g/n clients can still connect. What are the possible causes of this problem?

The WLAN administrator disabled the 1,2,5.5, and 11 Mbps data rates the WLAN administrator enabled the 6 and 9 Mbps rates as basic rates

A network administrator replaced some coaxial cabling used in an outdoor bridge deployment after water damaged the cabling. After replacing the cabling, the network administrator noticed that the EIRP increased drastically and is possibly violating the maximum EIRP power regulation mandate. What are the possible causes of the increased amplitude?

The administrator installed a shorter cable. The administrator installed a higher-grade cable.

What best describes hop time?

The period of time that the transmitter takes to hop to the next frequency

A WLAN administrator is troubleshooting an IPsec VPN problem between a remote WLAN branch router and a VPN gateway server at corporate headquarters. The administrator cannot get the VPN tunnel to establish an notices that there is a certificate error during the IKE Phase 1 exchange. Wat are the possible causes of this problem?

The root CA certificate installed on the VPN remote WLAN branch router was not used to sign the server certificate on the corporate VPN server

Which of the following statements are true about beacon management frames?

Time-stamp information is used by the clients to synchronize their clocks Beacons can contain vendor-proprietary information

A 3x3:2 MIMO radio can transmit and receive how many unique streams of data?

Two

When using a WLAN hotspot, company employees should do which of the following to ensure security back to your corporate network?

Use an IPsec VPN

The signal between the transceiver and the antenna will be reduced by which of the following methods?

Using cheaper-quality cable Increasing the length of the cable Adding an attenuator

Which type of WLAN site survey is the most important survey that should always be performed regardless of the vertical deployment?

Validation survey

Which term best describes two access points communicating with each other wirelessly while also allowing clients to communicate through the access points?

WDS

What are the communication differences between Wi-Fi Direct and Wi-Fi CERTIFIED TDLS devices?

Wi-Fi Direct devices can communicate with each other without associating to an AP. Wi-Fi CERTIFIED TDLS devices remain associated to an AP while communicating directly with each other

The height or power of a wave is known as what?

amplitude

Which of the following is typically the most important design goal when designing a warehouse WLAN?

coverage

Which of these measurements are taken during a passive manual site survey?

dBm signal strength SNR

What term is used to describe the time differential between a primary signal and a reflected signal arriving at a receiver?

delay spread

What are some objects or materials that are common causes of reflection?

metal asphalt road lake

The 802.11 standard defines which medium to be used in a distributed system?

none of these

In a guest firewall policy, which IP networks should be restricted?

172.16.0.0/12 10.0.0.0/8

When the multiple RF signals arrive at the receiver at the same time and are ______________________ with the primary wave, the result can be _____________________ of the primary signal.

180 degrees out of phase cancellation

802.11n (HT radios) can transmit in which frequency bands?

2.4 GHz - 2.4835 GHz 5.15 GHz - 5.25 GHz 5.47 GHz - 5.725 GHz

How many channels should be used in a channel reuse plan for he 2.4 GHz frequency band?

3

A WLAN transmitter that emits a 400 mW signal is connected to a cable with a 9 dB loss. If the cable is connected to an antenna with 19 dBi of gain, what is the EIRP?

4 W

A WLAN consultant has recommend that a new 802.11n/ac network use only 40 MHz channels in the 5 GHz U-NII bands. Why would he recommend 40 MHz channels be used only in 5 GHz and not in 2.4 GHz?

40 MHz channels do not scale in the 2.4 GHz ISM band

Which PHY layer mechanism might be used to increase the throughput for an HT/VHT radio in a clean RF environment with minimal reflections and low multipath?

400-nanosecond guard interval

A 20 MHz OFDM channel uses how many 312.5 KHz data subcarriers when transmitted by an 802.11a/g radio?

48

What frequencies are defined for 802.11n (HT) radio transmissions?

5.15-5.25 GHz 2.4 - 2.4835 GHz

In the United States, 802.11 radios were not allowed to transmit on which range of frequencies in order to avoid interference with Terminal Doppler Weather Radar (TDWR) systems?

5.60 GHz - 5.65 GHz

What is the average about of aggregate throughput at any data rate when legacy 802.11a/b/g/n/ac radios are transmitting?

50 percent

A powered device (PD) must be capable of accepting up to how many volts from either the data lines or the unused pairs of the Ethernet cable?

57 volts

Which new technologies debuted in the IEEE 802.11ac-2013 amendment?

80 MHz channels MU-MIMO 256-QAM

Which WLAN security mechanism requires that each WLAN user have unique authentication credentials?

802.1 X/EAP

Identify the security solutions that are defined by WPA2

802.1 X/EAP PSK authentication

Which of the following methods of authentication must occur along with the 4-Way handshake in order to generate dynamic TKIP/ARC4 or CCMP/AES encryption keys?

802.1 X/EAP authentication and 4-Way Handshake PSK authentication and 4-Way Handshake

Which IEEE 802.11 radio technologies are most impacted by the destructive effects of multipath?

802.11 a, b, & g

STAs operating in the default infrastructure mode may communicate in which of the following scenarios?

802.11 frame exchanges with other STAs via an AP Frame exchanges with network devices on the DSM

Which amendment defines performance enhancements using the much higher unlicensed frequency band of 60 GHz, and a transmission method known as directional multi-gigabit (DMG)?

802.11ad

802.11n (HT) radios are backward compatible with which of the following types of 802.11 radios?

802.11g radios (ERP) 802.11a radios (OFDM) 802.11b radios (HR-DSSS)

What information that comes from the wired network is used to assign traffic into access categories on a WLAN controller?

802.1D priority tags

What is the maximum number of resource units that can be used for a 20 MHz OFDMA channel?

9

What type of interference is caused by overlapping coverage cells with overlapping frequencies?

Adjacent channel interference

Which encryption methods do the IEEE 802.11-2016 standard mandate for robust security network associations, and which method is optional?

CCMP, TKIP

Public hotspots typically provide clients with which of the following security features?

No client security is available

What type of security can be used to stop attackers from seeing the MAC addresses used by your legitimate 802.1 WLAN devices?

None of these

Which technology has a greater tolerance of delay spread?

OFDM HT

Which 802.11 service set is defined specifically for directional multi-gigabit (DMG) radios?

PBSS

Which of these attacks are wireless users susceptible to at a public-access hotspot?

Peer-to-peer attack Wireless hijacking Wi-Fi phishing Malicious eavesdropping Man-in-the-middle attack

A standard measurement of frequency is called what?

Hertz

Which IEEE 802.11 amendment defines wirelss mesh networking mechanisms?

IEEE 802.11s

Which protocols can be used to tunnel 802.11 user traffic from access points to WLAN controllers or other centralized network servers?

IPsec GRE CAPWAP

The sum of all the components from the transmitter to the antenna, not including the antenna, is known as what?

IR Intentional Radiator

When data is corrupted by previous data from a reflected signal, this is known as what?

ISI

802.11 collision detection is achieved using which technology?

Positive collision detection cannot be determined

Which of the following statement are true about amplification?

RF amplifiers require an outside power source Antennas are passive gain amplifiers that focus the energy of a signal

What are some of the key concerns of health-care providers when installing a wireless network?

RF interference Faster access to patient data Secure and accurate access

When a client station is first powered on, what is the order of frames generated by the client station and AP?

Probe request/response, authentication request/response, association request/response

To establish a four-mile point-to-point bridge link in the 5 GHz U-NII-3 band, what factors should be taken under consideration?

Proper choice of semidirectional antennas Fresnel zone with 40 percent of less blockage

Which of the following are good uses for portable networks?

Military maneuvers Construction sites Disaster relief

Warehousing and manufacturing environments typically have which of the following requirements?

Mobility High coverage

When 802.1X/EAP security is deployed, RADIUS attributes can also be leveraged for role-based assignment of which type of user access permissions?

Stateful firewall rules VLANS Bandwidth ACLs Time

Which is the preferred channel and power configuration method for enterprise WLAN APs?

Static channel and power settings in complex RF environments using directional antennas Adaptive RF in standard WLAN environments

For an 802.1X/EAP solution to work properly, which two components must both support they same type of EAP?

Supplicant Authentication server

Which of the following statements about scanning are true?

There are two types of scanning: passive and active It is common for stations to continue to send probe requests after being associated to an AP

What are the advantages of using unlicensed frequency bands for RF transmissions?

There is no additional financial cost Anyone can use the frequency band

Which type of 802.11 frame is needed for either uplink MU-MIMO or uplink MU-OFDMA connunication?

Trigger

In a guest firewall policy, what are some of the ports that are recommended to be permitted?

UDP 4500 TCP 443 UDP 53

ACKs are required for which of the following frames?

Unicast

The network administrator of the ACME Workplace Administration calls the support hotline for his WLAN vendor and informs the support personnel that the WLAN is no longer working. The support personnel asks the customer a series of questions so that they can isolate and identify the cause of a potential problem. What are some common Troubleshooting 101 questions?

When is the problem happening?

What are some questions that should be considered during WLAN client capacity planning?

What type of applications will be used for the WLAN?

When is an 802.11ac AP transmitting on 5 GHz required by the IEEE 802.11-2016 standard to respond to probe request frames from nearby client stations?

When the probe request frames contain a null SSID value When the probe request frames contain the correct SSID value

When you are troubleshooting client connectivity problems with a client using 802.1X/EAP security, what is the first action you should take to investigate a potential layer 1 problem?

disable and re-enable the client radio network interface

The size of the Fresnel zone is controlled by which factors?

distance frequency

What are some problems that can occur when an indoor access point is transmitting at full power?

hidden node co-channel interference sticky clients

The guard interval is used as a buffer to compensate for which type of interference?

intersymbol interference

A point source that radiates RF signal equally in all directions is known as what?

isotropic radiator

Where is redundancy needed if user traffic is being tunneled in a centralized WLAN architecture?

redundant controllers

After the station has performed the carrier sense and determined that no other devices are transmitting for a period of DIFS interval, what is the next step for the station?

select a random backoff value

The OSI model consists of how many layers?

seven

While aligning a directional antenna, you notice that the signal drops as you turn the antenna away from the other antenna, but then it increases a little. This increase in signal is caused by what?

side lobe

Which carrier sense method is used to detect and decode 802.11 transmissions?

signal detect

Received signal strength indicator (RSSI) metrics are used by IEEE 802.11 radios to define which RF characteristics?

signal strength

What is the definition of the horizontal beamwidth of an antenna?

the distance between the two -3 dB power points on the horizontal axis, measured in degrees

What factors might affect the size of a basic service area (BSA) of an AP?

transmission power antenna gain Indoor/outdoor surroundings

What are some results of multipath interference?

upfade excessive retransmissions

When an MDM solution is deployed, after a mobile device connects to an access point, where does the mobile device remain until the MDM enrollment process is complete?

walled garden

What RF technology do IoT client devices use for communications?

All of these (Zigbee Wi-Fi Bluetooth)

Which wave properties can be modulated to encode data?

Amplitude, Frequency, and Phase

What type of interference is a result of APs on the same channel or clients on the same channel hearing each other despite being members of different basic service sets?

Co-channel interference

Which of the following are examples of mobile office networking?

Construction-site offices Temporary classrooms Temporary disaster-assistance offices

Name potential sources of interference in the 5 GHz U-NII bands.

Cordless phones Radar

When calculating the link budget and system operating margin of a point-to-point outdoor WLAN bridge link, which factors should be taken into account?

Distance Cable loss Receive sensitivity Frequency Transmit amplitude

Based on RSSI metrics, concentric zones of variable data rate coverage exist around an access point due to the upshifting and downshifting of client stations between data rates. What is the correct name of this process, according to the IEEE 802.11-2016 standard?

Dynamic rate switching

The presence of what type of transmissions can trigger the protection mechanism within an ERP basic service set?

ERP beacon frame with the nonERP_Present bit set to 1 Association of an HR-DSSS client HR-DSSS beacon frame

An ERP (IEEE 802.11g) network mandates support for which two spread-spectrum technologies?

ERP- DSSS/CCK ERP-OFDM

Which of these attacks will not be detected by a wireless intrusion prevention system (WIPS)?

Eavesdropping with a protocol analyzer

A network administrator's WIPS has detected a rogue access point. What actions should be taken after the WIPS detects the rogue AP?

Enable the layer 2 rogue containment feature that the WIPS provides Unplug the rogue AP from the data port upon discovery

Which two components should be mandatory in every remote access wireless security policy?

Encrypted VPN Personal firewall

When determining the mounting height of a long-distance point-to-point antenna, which of the following needs to be considered?

Frequency Distance Earth Bulge RF Line of sight

Which of the following wireless communications parameters and usage are typically governed by a local regulatory authority?

Frequency Maximu EIRP Indoor/Outdoor usage Bandwidth Maximum transmit power

Which IEEE 802.11 amendments provide for throughput of 1 Gbps or higher?

IEEE 802.11 ac IEEE 802.11 ad

An employee has installed an Ethernet switch that is compliant with 802.3at and is having problems with APs randomly rebooting. Which of the following could be causing the problem?

Most of the Ethernet cables running from the switch to the APs are 90 meters long The switch is capable of 1000Base T, which is not compatible with VoIP telephones.

Which two solutions help mitigate peer-to-peer attacks from other clients associated to the same 802.11 access point?

Personal firewall Client isolation

What is the default configuration mode that allows an AP radio to operate in a BSS?

Root

When a station sends an RTS, the Duration/ID field notifies the other stations that they must set their NAV timers to which of the following values?

The time necessary to transmit the CTS, Data, and ACK frames

What would cause an 802.11 station to retransmit a unicast frame?

The transmitted unicast from was corrupted The ACK frame from the receiver was corrupted

Multiple point-to-point bridges between the same locations are often installed for which of the following reasons?

To prevent single point of failure To provide higher throughput

Semidirectional antennas are often used for which of the following purposes?

To provide unidirectional coverage from an access point to clients in an indoor environment To provide short-distance point-to-point communications To reduce reflections and the negative effects of multipath

What are the two reasons that 802.11 radios use physical carrier sense?

To synchronize incoming transmissions To assess the RF medium

Which of the following is true for 802.11n and 802.11ac radios?

Transceivers can transmit from multiple antennas as the the same time

The corporate IT administrators are huddled together to try to solve an issue with the newly deployed VoWiFi phones. The chosen security solution is PEAPv0 (EAP-MSCHAPv2) for the voice SSID that also has Voice-Enterprise enabled on the access points. The VoWiFi phones are authenticating flawlessly and voice calls are stable when the employees use the devices from their desk. However, there seem to be gaps in the audio and sometimes disconnects when the employees are talking on the VoWiFi phones and move to other areas of the building. What are the possible causes of the interruption of service for the voice calls while the employees are mobile?

VoWiFi phones do not support fast BSS transition VoWiFi phones are reauthenticating every time they roam to a new AP

The IEEE 802.11-2016 standard states which of the following regarding 802.11ac data rates and ecryption?

WEP and TKIP must not be used CCMP and GCMP can be used

When the Wi-Fi networks is the actual source of a connectivity, security, or performance problem, which WLAN device is usually where the problem resides?

WLAN client

Which terms best describe components of a centralized WLAN architecture where the management, control, and data planes all reside in a centralized device?

WLAN controller Controller-based AP

Which Windows CLI command can display a WLAN client's authentication method, encryption method, channel, signal strength, and data rate?

netsh wlan show interfaces

At which laye of the OSI model do most networking problems occur?

physical


Set pelajaran terkait

High School Health Quiz 3 unit 1 - Body Essentials QUIZ'S

View Set

Week 4: Chapter 10 - Beginning and Ending the Speech

View Set

Post Test: Electric and Magnetic Forces

View Set

Chapter 8 Social Processes , Attitudes, and Behavior

View Set

Entreculturas 3 Unidad 4 ASD 6- 10 y expresiones útiles

View Set