Which layer of the OSI model uses physical addresses to deliver data to the destination?

Which layer of the OSI model uses physical addresses to deliver data to the destination?A . PhysicalB . Data LinkC . NetworkD . TransportView AnswerAnswer: A

August 24, 2024 No Comments READ MORE +

Which one of the following is an example of a multi-band device?

Which one of the following is an example of a multi-band device?A . A laptop supporting only 802.11n in 2.4 GHzB . A laptop supporting 802.11n, 802.11ac, and 802.11adC . A laptop supporting only 802.11n in 5GHzD . A laptop supporting only 802.11aView AnswerAnswer: B

August 24, 2024 No Comments READ MORE +

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?A . 2B . 4C . 6D . 11View AnswerAnswer: B

August 24, 2024 No Comments READ MORE +

What 802.11 PHY (Physical Layer) operates in 60 GHz?

What 802.11 PHY (Physical Layer) operates in 60 GHz?A . HR/DSSS (802.11b)B . HT (802.11n)C . OFDM (802.11a)D . DMG (802.11ad)View AnswerAnswer: D

August 23, 2024 No Comments READ MORE +

IEEE 802.11g WLANs operate in what frequency range?

IEEE 802.11g WLANs operate in what frequency range?A . 900 MHzB . 5.15-5.25 GHzC . 5.25-5.35 GHzD . 2.4-2.5 GHzView AnswerAnswer: D

August 23, 2024 No Comments READ MORE +

Stations (STA) operating in which two IEEE 802.11 amendments are interoperable?

Stations (STA) operating in which two IEEE 802.11 amendments are interoperable?A . 802.11 and 802.11aB . 802.11a and 802.11bC . 802.11a and 802.11gD . 802.11b and 802.11gView AnswerAnswer: D

August 23, 2024 No Comments READ MORE +

After the successful installation of an MDM solution, the administrator should ensure that all users of mobile devices agree to rules stated in which of the following documents?

After the successful installation of an MDM solution, the administrator should ensure that all users of mobile devices agree to rules stated in which of the following documents?A . EULA policyB . Acceptable use policyC . Content-filtering policyD . Pilot test policyView AnswerAnswer: B

August 22, 2024 No Comments READ MORE +

What type of wireless network device is PIN-based security most commonly used with?

What type of wireless network device is PIN-based security most commonly used with?A . SOHO brands that support WPA 2.0B . Enterprise brands that support WPA 2.0C . SOHO brands that support WPSD . Enterprise brands that support WPSView AnswerAnswer: C

August 22, 2024 No Comments READ MORE +

Which one of the following is an example of a real-time communications application?

Which one of the following is an example of a real-time communications application?A . E-MailB . VoIP (Voice over IP)C . Database accessD . FTP file transferView AnswerAnswer: B

August 22, 2024 No Comments READ MORE +

Which items describe a service set identifier (SSID)? (Choose two.)

Which items describe a service set identifier (SSID)? (Choose two.)A . 32 characters maximumB . 64 characters maximumC . Is case sensitiveD . Is not case sensitiveView AnswerAnswer: AC

August 22, 2024 No Comments READ MORE +