Which of the following would most likely cause this issue?
The help desk for company XYZ received a call from a user who could not locate their company-issued smart phone device. The network administrator that was assigned to the trouble ticket is unable to remotely lock the device through the MDM software that is in use at the organization. Which...
When planning for a bridge link between locations, in addition to the link distance, what requirement should be known in order to determine the antennas, settings and bridges to use?
When planning for a bridge link between locations, in addition to the link distance, what requirement should be known in order to determine the antennas, settings and bridges to use?A . Required colorB . Required power sourcing methodC . Required throughputD . Required cable lengthView AnswerAnswer: B
Weak or no signal at a wireless client device can be the result of _____.
Weak or no signal at a wireless client device can be the result of _____.A . Distance from an access pointB . Distance from other client devicesC . Distance from the wiring closetD . Distance from Ethernet switchView AnswerAnswer: A
Wireless bridges must be configured with __________and __________. (Choose 2.)
Wireless bridges must be configured with __________and __________. (Choose 2.)A . A null SSIDB . The same SSIDC . The same RF channelD . Channel scanningE . Wired Equivalent PrivacyView AnswerAnswer: BC
What infrastructure software solution is often used to manage enterprise mobile devices?
What infrastructure software solution is often used to manage enterprise mobile devices?A . VPNB . MDMC . BYODD . ESSView AnswerAnswer: C
What could cause this notebook computer to be performing poorly?
You recently installed an IEEE 802.11g wireless network in a small office. One of the employees has been complaining of poor performance and mentioned her notebook computer runs very slowly because of the access point it connects to. What could cause this notebook computer to be performing poorly?A . The...
Which two of the following should be considered with regard to content distribution?
A well-planned and executed mobile device security strategy will help to ensure that company policy is implemented and enforced as designed and intended with every technology deployment, regardless of the device platform that is used. Which two of the following should be considered with regard to content distribution? (Choose two.)A...
At which two layers of the OSI model does wireless LAN technology operate? (Choose two.)
At which two layers of the OSI model does wireless LAN technology operate? (Choose two.)A . SessionB . NetworkC . PhysicalD . ApplicationE . Data LinkView AnswerAnswer: CE
Which network access method attempts to avoid collisions?
Which network access method attempts to avoid collisions?A . CSMA/CAB . CSMA/CDC . CSMA/CRD . CSMA/DSSSView AnswerAnswer: A
What technology is used to send WLAN data over a wireless medium using many subcarrier frequencies?
What technology is used to send WLAN data over a wireless medium using many subcarrier frequencies?A . Wireless broadbandB . NarrowbandC . Spread-spectrumD . Spectral maskingE . WidebandView AnswerAnswer: C