What technology may use a form of multilateration known as time difference of arrival (TDoA) to measure the difference in distance between two stations from known locations?
What technology may use a form of multilateration known as time difference of arrival (TDoA) to measure the difference in distance between two stations from known locations?A . On-boardingB . Geo-locationC . Off-boardingD . Geo-fencingView AnswerAnswer: D
When RF passes or bends around an obstacle such as a building or column, the behavior is:
When RF passes or bends around an obstacle such as a building or column, the behavior is:A . ReflectionB . RefractionC . ScatteringD . DiffractionView AnswerAnswer: D
The IEEE 802.1X standard identifies the authenticator as another term for the _____ in wireless networking.
The IEEE 802.1X standard identifies the authenticator as another term for the _____ in wireless networking.A . Client deviceB . Access pointC . RADIUS serverD . EAP serverView AnswerAnswer: B
When a wireless LAN device listens for beacon frames, it is participating in which phase?
When a wireless LAN device listens for beacon frames, it is participating in which phase?A . Power saveB . Passive scanningC . Active scanningD . AuthenticationView AnswerAnswer: B
Which guidelines are recommended when performing a manual site survey? (Choose two.)
Which guidelines are recommended when performing a manual site survey? (Choose two.)A . Walkthrough of locationB . Predictive analysisC . Equipment purchaseD . Client device configurationE . Spectrum analysisView AnswerAnswer: AE
What process is used in 802.11 networks to provide confidentiality?
What process is used in 802.11 networks to provide confidentiality?A . RedundancyB . EncryptionC . AuthenticationD . AccountingView AnswerAnswer: B
Which of the following MDM features allows for corporate and other applications to be distributed to mobile devices that connect to the corporate network?
Which of the following MDM features allows for corporate and other applications to be distributed to mobile devices that connect to the corporate network?A . Content updateB . Pushing contentC . Update serverD . Distributed edgeView AnswerAnswer: B
Highly directional antennas are typically used for connectivity.
Highly directional antennas are typically used for connectivity.A . Short-rangeB . OmnidirectionalC . Long-rangeD . DipoleView AnswerAnswer: C
Layer 2 Tunneling Protocol commonly uses which encryption method?
Layer 2 Tunneling Protocol commonly uses which encryption method?A . IPSecB . PPTPC . AESD . WEPE . MPPEView AnswerAnswer: A
Which item has an effect on RF line of sight?
Which item has an effect on RF line of sight?A . PhaseB . ObstaclesC . InterferenceD . AmplitudeView AnswerAnswer: B