What is the term that describes this behavior?

An RF signal sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?A . ReflectionB . RefractionC . ScatteringD . WarpingView AnswerAnswer: B

March 6, 2024 No Comments READ MORE +

A robust security network (RSN) requires the use of which security mechanisms? (Choose all that apply.)

A robust security network (RSN) requires the use of which security mechanisms? (Choose all that apply.)A . 802.11xB . WEPC . IPsecD . CCMP/AESE . CKIPF . 802.1XView AnswerAnswer: DF

March 5, 2024 No Comments READ MORE +

Which of the following information is included in a probe response frame? (Choose all that apply.)

Which of the following information is included in a probe response frame? (Choose all that apply.)A . Time stampB . Supported data ratesC . Service set capabilitiesD . SSIDE . Traffic indication mapView AnswerAnswer: ABCD

March 5, 2024 No Comments READ MORE +

What terms accurately complete the following sentence?

What terms accurately complete the following sentence? The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware.A . CCMP, TKIPB . 802.1X/EAP, WEPC . TLS, SSLD ....

March 5, 2024 No Comments READ MORE +

Which type of wired access switch technology is the most important consideration when deploying 4×4:4 or 8×8:8 Wi-Fi 6 access points?

Which type of wired access switch technology is the most important consideration when deploying 4×4:4 or 8×8:8 Wi-Fi 6 access points?A . STPB . SPBC . AVBD . PoEE . IGMPView AnswerAnswer: D

March 5, 2024 No Comments READ MORE +

Which of the following are valid ISM bands? (Choose all that apply.)

Which of the following are valid ISM bands? (Choose all that apply.)A . 902 MHz − 928 MHzB . 2.4 GHz − 2.5 GHzC . 5.725 GHz − 5.85 GHzD . 5.725 GHz − 5.875 GHzView AnswerAnswer: ABD

March 5, 2024 No Comments READ MORE +

If the telephone does not provide a classification signature, how much power will the PSE provide to the telephone?

A VoIP telephone is connected to a 24-port PoE midspan PSE. If the telephone does not provide a classification signature, how much power will the PSE provide to the telephone?A . 12.95 wattsB . 4.0 wattsC . 7.0 wattsD . 15.4 wattsView AnswerAnswer: D

March 4, 2024 No Comments READ MORE +

When performing a validation survey for a Multiple Channel Architecture (MCA) system in a multi-tenant building with five floors, what aspect should you, as the surveyor, keep in mind?

When performing a validation survey for a Multiple Channel Architecture (MCA) system in a multi-tenant building with five floors, what aspect should you, as the surveyor, keep in mind?A . The RF interference caused by passing airplanes supporting on-board Wi-Fi should be a prime considerationB . The channel reuse pattern...

March 4, 2024 No Comments READ MORE +

What feature of 802.1 lax provides this functionality?

802. 11ax (HE) introduces Resource Units that can be used to allow communications with multiple devices at the same time, on the same channel, in the same BSS. What feature of 802.1 lax provides this functionality?A . 6 GHz supportB . TWTC . Wi-Fi-LTED . OFDMAView AnswerAnswer: D

March 4, 2024 No Comments READ MORE +

Which of these attacks are considered denial-of-service attacks? (Choose all that apply.)

Which of these attacks are considered denial-of-service attacks? (Choose all that apply.)A . Man-in-the-middleB . JammingC . Deauthentication spoofingD . MAC spoofingE . Peer-to-peerView AnswerAnswer: BC

March 4, 2024 No Comments READ MORE +