If the AP’s time is not automatically configured to match the rest of the network, what infrastructure service may be unreachable by the AP?

If the AP’s time is not automatically configured to match the rest of the network, what infrastructure service may be unreachable by the AP?A . DNSB . DHCPC . NTPD . FTPView AnswerAnswer: C

September 3, 2024 No Comments READ MORE +

Which security measure is often mistakenly believed to provide network invisibility, but offers no actual security benefit?

Which security measure is often mistakenly believed to provide network invisibility, but offers no actual security benefit?A . WEPB . Shared Key AuthenticationC . Hidden SSIDsD . MAC filteringView AnswerAnswer: C

September 3, 2024 No Comments READ MORE +

What is the term used to describe the interference caused when multiple devices compete for the same channel in RF communication?

What is the term used to describe the interference caused when multiple devices compete for the same channel in RF communication?A . Antenna cables and connectorsB . Co-Channel Interference (CCI)C . Co-Channel Contention (CCC)D . Antenna pattern chartsView AnswerAnswer: C

September 2, 2024 No Comments READ MORE +

What are some common causes of performance problems in wireless networks?

What are some common causes of performance problems in wireless networks?A . Configuration errorsB . InterferenceC . Low data ratesD . Co-channel interference (CCI)View AnswerAnswer: A

September 1, 2024 No Comments READ MORE +

What is the term used to describe the decrease in signal strength as an RF signal propagates through space?

What is the term used to describe the decrease in signal strength as an RF signal propagates through space?A . Gain and lossB . ReflectionC . RefractionD . Free space path lossView AnswerAnswer: D

August 31, 2024 No Comments READ MORE +

What is one possible cause of security problems in a wireless network if the EAP method used by the client is not supported by the access point?

What is one possible cause of security problems in a wireless network if the EAP method used by the client is not supported by the access point?A . Configuration errorsB . Incorrect passphrasesC . Incompatible EAP methodsD . Incorrect network keysView AnswerAnswer: C

August 31, 2024 No Comments READ MORE +

What is most likely problem in that area?

You are receiving reports from several users that their clients connect with very low data rates. All reports are confined to a particular area in the facility and the users report that the problem does not occur with the same devices in other areas. What is most likely problem in...

August 30, 2024 No Comments READ MORE +

What are you using?

You have implemented an 802.11 security solution that requires certificates. What are you using?A . WEPB . WPA2-EnterpriseC . WPA-PersonalD . WPA2-PersonalView AnswerAnswer: B

August 30, 2024 No Comments READ MORE +

Which location process in 802.11 wireless networks involves actively sending probe requests to discover available networks?

Which location process in 802.11 wireless networks involves actively sending probe requests to discover available networks?A . Passive scanningB . Active scanningC . AuthenticationD . AssociationView AnswerAnswer: B

August 26, 2024 No Comments READ MORE +

What protocol is sometimes used to access a network or user directory by a RADIUS server instead of using an internal user database?

What protocol is sometimes used to access a network or user directory by a RADIUS server instead of using an internal user database?A . DHCPB . NTPC . EAPD . LDAPView AnswerAnswer: D

August 26, 2024 No Comments READ MORE +