What may occur when an RF wave encounters an object large in relation to the wavelength during propagation?
What may occur when an RF wave encounters an object large in relation to the wavelength during propagation?A . ReflectionB . Raising of frequencyC . Lowering of frequencyD . Increase in amplitudeView AnswerAnswer: A
Horizontal beamwidth is to the earth's surface.
Horizontal beamwidth is to the earth's surface.A . ParallelB . PerpendicularC . PositiveD . NegativeView AnswerAnswer: A
Which protocol is responsible for addressing and routing?
Which protocol is responsible for addressing and routing?A . IPB . TCPC . UDPD . ARPView AnswerAnswer: A
Which layer of the OSI model allows physical addresses to be converted to logical addresses?
Which layer of the OSI model allows physical addresses to be converted to logical addresses?A . ApplicationB . SessionC . TransportD . NetworkE . Data LinkView AnswerAnswer: D
Which technology in use would not have an impact on the 802.11g wireless network you are surveying for?
You are performing a protocol analysis in order to determine potential interference from other wireless LANs in the immediate area of the site survey. You discover several wireless LANs that can potentially cause interference with the proposed installation. Which technology in use would not have an impact on the 802.11g...
A weakness with MAC address filtering is that it allows an intruder to _____.
A weakness with MAC address filtering is that it allows an intruder to _____.A . Crack the encryption.B . Spoof an address.C . Cause an RF DoS attack.D . Steal user authentication.View AnswerAnswer: B
What method defines the process of connecting a device to a wireless network for the first time and allowing a user to register their device in order to gain access to the company and other network resources?
What method defines the process of connecting a device to a wireless network for the first time and allowing a user to register their device in order to gain access to the company and other network resources?A . OnboardingB . ActivationC . TetheringD . Security policyView AnswerAnswer: A
Which one of the following is a non-deprecated security solution in the 802.11 standard?
Which one of the following is a non-deprecated security solution in the 802.11 standard?A . AES (Advanced Encryption Standard)B . WEP (Wired Equivalent Privacy)C . RC4 (Rivest Cipher 4)D . TKIP (Temporal Key Integrity Protocol)View AnswerAnswer: A
When using a predictive modeling site survey approach, which of the following is true about manual verification?
When using a predictive modeling site survey approach, which of the following is true about manual verification?A . Manual verification never has to be performed.B . Manual verification is always required.C . Manual verification should be performed only at the customer's request.D . Manual verification should be performed, but it...
Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?
Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?A . WEPB . PINC . WPAD . PBCE . TKIPView AnswerAnswer: B