What may occur when an RF wave encounters an object large in relation to the wavelength during propagation?

What may occur when an RF wave encounters an object large in relation to the wavelength during propagation?A . ReflectionB . Raising of frequencyC . Lowering of frequencyD . Increase in amplitudeView AnswerAnswer: A

August 28, 2024 No Comments READ MORE +

Horizontal beamwidth is to the earth's surface.

Horizontal beamwidth is to the earth's surface.A . ParallelB . PerpendicularC . PositiveD . NegativeView AnswerAnswer: A

August 26, 2024 No Comments READ MORE +

Which protocol is responsible for addressing and routing?

Which protocol is responsible for addressing and routing?A . IPB . TCPC . UDPD . ARPView AnswerAnswer: A

August 26, 2024 No Comments READ MORE +

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Which layer of the OSI model allows physical addresses to be converted to logical addresses?A . ApplicationB . SessionC . TransportD . NetworkE . Data LinkView AnswerAnswer: D

August 26, 2024 No Comments READ MORE +

Which technology in use would not have an impact on the 802.11g wireless network you are surveying for?

You are performing a protocol analysis in order to determine potential interference from other wireless LANs in the immediate area of the site survey. You discover several wireless LANs that can potentially cause interference with the proposed installation. Which technology in use would not have an impact on the 802.11g...

August 26, 2024 No Comments READ MORE +

A weakness with MAC address filtering is that it allows an intruder to _____.

A weakness with MAC address filtering is that it allows an intruder to _____.A . Crack the encryption.B . Spoof an address.C . Cause an RF DoS attack.D . Steal user authentication.View AnswerAnswer: B

August 25, 2024 No Comments READ MORE +

What method defines the process of connecting a device to a wireless network for the first time and allowing a user to register their device in order to gain access to the company and other network resources?

What method defines the process of connecting a device to a wireless network for the first time and allowing a user to register their device in order to gain access to the company and other network resources?A . OnboardingB . ActivationC . TetheringD . Security policyView AnswerAnswer: A

August 25, 2024 No Comments READ MORE +

Which one of the following is a non-deprecated security solution in the 802.11 standard?

Which one of the following is a non-deprecated security solution in the 802.11 standard?A . AES (Advanced Encryption Standard)B . WEP (Wired Equivalent Privacy)C . RC4 (Rivest Cipher 4)D . TKIP (Temporal Key Integrity Protocol)View AnswerAnswer: A

August 25, 2024 No Comments READ MORE +

When using a predictive modeling site survey approach, which of the following is true about manual verification?

When using a predictive modeling site survey approach, which of the following is true about manual verification?A . Manual verification never has to be performed.B . Manual verification is always required.C . Manual verification should be performed only at the customer's request.D . Manual verification should be performed, but it...

August 25, 2024 No Comments READ MORE +

Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?

Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?A . WEPB . PINC . WPAD . PBCE . TKIPView AnswerAnswer: B

August 24, 2024 No Comments READ MORE +