Testout 6.2.12- 6.3.16
5 GHz
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?
disable SSID broadcast -change the SSID to something other than the default
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. -they use an 802.11n wireless network -the wireless network is broadcasting an SSID of Linksys. -The wireless network uses WPA2 with AES security -directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security?
improved performance
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?
Access point
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?
802.11n
Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?
modem
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
network
Multiple computers configured to be able to communicate and share information with each other form a ______
-802.11g -802.11a
Which IEEE wireless standards specify transmission speeds up to 54 Mbps?
-Ad hoc connections -2.4 GHz radio wireless
Which of the following are characteristics of Bluetooth? (select two)
Wireless Adapter
Which of the following components is NOT required to create a network?
-encryption -authentication
Which of the following features is supplied by WPA2 on a wireless network?
Ethernet
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
A network in a small geographic area, like in an office
Which of the following is the best definition for a LAN?
firewall
Which of the following is the best device to deploy to protect our private network from an untrusted public network?
WPA2
Which of the following provides security for wireless networks?
Server
Which of the following services to hosts on its network?
MAC address filtering
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?
NFC chips
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?
WPA2
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
SSID
which of the following is used on a wireless network to identify the network name?