Which one of the following is a non-deprecated security solution in the 802.11 standard?A . AES (Advanced Encryption Standard)B . WEP (Wired Equivalent Privacy)C . RC4 (Rivest Cipher 4)D . TKIP (Temporal Key Integrity Protocol) View Answer Answer: A...
What is implemented in 802.11 networks to increase the probability that higher priority communications will occur before lower priority communications?
What is implemented in 802.11 networks to increase the probability that higher priority communications will occur before lower priority communications?A . Load balancingB . Dynamic Frequency Selection (DFS)C . Dynamic Rate Switching (DRS)D . Quality of Service (QoS) View Answer Answer: D...
What should be used to manage an AP that requires direct web-based configuration?
What should be used to manage an AP that requires direct web-based configuration?A . FTPB . TelnetC . HTTPSD . HTTP View Answer Answer: C...
Which one of the following is an example of a real-time communications application?
Which one of the following is an example of a real-time communications application?A . E-MailB . VoIP (Voice over IP)C . Database accessD . FTP file transfer View Answer Answer: B...
What is the maximum data rate specified in the 802.11 standard for the HT (802.11n) PHY (Physical Layer)?
What is the maximum data rate specified in the 802.11 standard for the HT (802.11n) PHY (Physical Layer)?A . 65 MbpsB . 600 MbpsC . 150 MbpsD . 400 Mbps View Answer Answer: B...
What common vendor feature should be implemented to allow for this?
An organization wishes to ensure that a fairly even distribution of clients is spread across the installed APs. What common vendor feature should be implemented to allow for this?A . Per-User Preshared Key (PPSK)B . Adaptive Radio Management (ARM)C . Load balancingD . Band steering View Answer Answer: B...
What is unique about port 1 when compared to port 2?
An AP has two Ethernet wired networking ports. One (port 1) is labeled with a Power over Ethernet (PoE) indicator and the other (port 2) is not. What is unique about port 1 when compared to port 2?A . It can be used to transfer voice dataB . It can be used to transfer...
network?
If created correctly, what document would define the available infrastructure services on an existing wired network?A . Security PolicyB . Request for Proposal (RFP)C . Bill of Materials (BoM)D . Network Diagram View Answer Answer: D...
What user behavior is most likely to require Wi-Fi coverage between buildings on the same campus?
What user behavior is most likely to require Wi-Fi coverage between buildings on the same campus?A . Walking between buildings while on a Voice over IP (VoIP) callB . Walking between buildings with a suspended laptop in a backpackC . Using laptops at their assigned office work areasD . Using tables within the buildings...
connected through the AP to which it is connected?
What 802.11 fast roaming solution allows a client to authenticate to a different AP than that to which it is connected through the AP to which it is connected?A . Role-Based Access Control (RBAC)B . PreauthenticationC . Captive PortalD . Virtual Private Network (VPN) View Answer Answer: B...