Live Virtual Machine Lab 11.2: Module 11 Implementing Wireless Security Configurations

Ace your homework & exams now with Quizwiz!

In the 2.4 GHz band, which of the following channels do not overlap with the other channels? [Choose all that apply]

1 6 11

Which of the following encryption key size is used by Wi-Fi Protected Access 2 (WPA2)?

128-bit

Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?

802.11ac

In which of the following wireless mode's can anyone connect to the wireless network without authentication?

Open

Which of the following security protocol is used by Protected Extensible Application Protocol (PEAP)?

TLS


Related study sets

Einer schreibt der Berliner Republik etwas ins Stammbuch

View Set

Chapter 43 (combined): Nursing Care of the Child With a Genitourinary Disorder

View Set

Educ 2301 Chapter 7 & 8 Study guide

View Set

All Of ICEV Veterinary Assisting

View Set

Chapter 8 - Statistical Inference: Confidence Intervals

View Set

APUSH CFU: Differences + Similarities Between English, French, and Spanish Colonies

View Set