Which one of the following is a non-deprecated security solution in the 802.11 standard?

Which one of the following is a non-deprecated security solution in the 802.11 standard?A . AES (Advanced Encryption Standard)B . WEP (Wired Equivalent Privacy)C . RC4 (Rivest Cipher 4)D . TKIP (Temporal Key Integrity Protocol)View AnswerAnswer: A

April 11, 2019 No Comments READ MORE +

What is implemented in 802.11 networks to increase the probability that higher priority communications will occur before lower priority communications?

What is implemented in 802.11 networks to increase the probability that higher priority communications will occur before lower priority communications?A . Load balancingB . Dynamic Frequency Selection (DFS)C . Dynamic Rate Switching (DRS)D . Quality of Service (QoS)View AnswerAnswer: D

April 11, 2019 No Comments READ MORE +

What should be used to manage an AP that requires direct web-based configuration?

What should be used to manage an AP that requires direct web-based configuration?A . FTPB . TelnetC . HTTPSD . HTTPView AnswerAnswer: C

April 9, 2019 No Comments READ MORE +

Which one of the following is an example of a real-time communications application?

Which one of the following is an example of a real-time communications application?A . E-MailB . VoIP (Voice over IP)C . Database accessD . FTP file transferView AnswerAnswer: B

April 9, 2019 No Comments READ MORE +

What is the maximum data rate specified in the 802.11 standard for the HT (802.11n) PHY (Physical Layer)?

What is the maximum data rate specified in the 802.11 standard for the HT (802.11n) PHY (Physical Layer)?A . 65 MbpsB . 600 MbpsC . 150 MbpsD . 400 MbpsView AnswerAnswer: B

April 9, 2019 No Comments READ MORE +

What common vendor feature should be implemented to allow for this?

An organization wishes to ensure that a fairly even distribution of clients is spread across the installed APs. What common vendor feature should be implemented to allow for this?A . Per-User Preshared Key (PPSK)B . Adaptive Radio Management (ARM)C . Load balancingD . Band steeringView AnswerAnswer: B

April 8, 2019 No Comments READ MORE +

What is unique about port 1 when compared to port 2?

An AP has two Ethernet wired networking ports. One (port 1) is labeled with a Power over Ethernet (PoE) indicator and the other (port 2) is not. What is unique about port 1 when compared to port 2?A . It can be used to transfer voice dataB . It can...

April 8, 2019 No Comments READ MORE +

network?

If created correctly, what document would define the available infrastructure services on an existing wired network?A . Security PolicyB . Request for Proposal (RFP)C . Bill of Materials (BoM)D . Network DiagramView AnswerAnswer: D

April 6, 2019 No Comments READ MORE +

What user behavior is most likely to require Wi-Fi coverage between buildings on the same campus?

What user behavior is most likely to require Wi-Fi coverage between buildings on the same campus?A . Walking between buildings while on a Voice over IP (VoIP) callB . Walking between buildings with a suspended laptop in a backpackC . Using laptops at their assigned office work areasD . Using...

April 5, 2019 No Comments READ MORE +

connected through the AP to which it is connected?

What 802.11 fast roaming solution allows a client to authenticate to a different AP than that to which it is connected through the AP to which it is connected?A . Role-Based Access Control (RBAC)B . PreauthenticationC . Captive PortalD . Virtual Private Network (VPN)View AnswerAnswer: B

April 5, 2019 No Comments READ MORE +