What phrase defines Equivalent Isotropically Radiated Power (EIRP)?
What phrase defines Equivalent Isotropically Radiated Power (EIRP)?A . The power output from the radio into the RF cableB . The power output from the radio after cable lossesC . The highest RF signal strength that is transmitted from a given antennaD . Reflected power due to an impedance mismatch...
Physical carrier sense uses which two thresholds during the clear channel assessment to determine if the medium is busy?
Physical carrier sense uses which two thresholds during the clear channel assessment to determine if the medium is busy?A . RF detectB . Signal detectC . Transmission detectD . Energy detectE . Random detectView AnswerAnswer: BD
What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)
What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)A . CCMP/AESB . Open System authenticationC . Preshared keysD . Shared Key authenticationE . WEPF . TKIPView AnswerAnswer: BDE
What are some of the causes of layer 2 retries?
Layer 2 retransmissions occur when frames become corrupted. What are some of the causes of layer 2 retries? (Choose all that apply.)A . High SNRB . Low SNRC . Co-channel interferenceD . RF interferenceE . Adjacent channel interferenceView AnswerAnswer: BDE
CCMP encryption uses which AES key size?
CCMP encryption uses which AES key size?A . 192 bitsB . 64 bitsC . 256 bitsD . 128 bitsView AnswerAnswer: D
If the access points transmit on the same frequency channel in an MCA architecture, what type of interference is caused by overlapping coverage cells?
If the access points transmit on the same frequency channel in an MCA architecture, what type of interference is caused by overlapping coverage cells?A . Intersymbol interferenceB . Adjacent channel interferenceC . All-band interferenceD . Narrowband interferenceE . Co-channel interferenceView AnswerAnswer: E
A WIPS uses which four labels to classify an 802.11 device? (Choose the best four answers.)
A WIPS uses which four labels to classify an 802.11 device? (Choose the best four answers.)A . AuthorizedB . NeighborC . EnabledD . DisabledE . RogueF . Unauthorized/unknownView AnswerAnswer: ABEF
What documents might be needed prior to performing an indoor site survey for a new wireless LAN? (Choose all that apply.)
What documents might be needed prior to performing an indoor site survey for a new wireless LAN? (Choose all that apply.)A . BlueprintsB . Network topography mapC . Network topology mapD . Coverage mapE . Frequency mapView AnswerAnswer: AC
Which of these WLAN architectures may require the use of an NMS server to manage and monitor the WLAN?
Which of these WLAN architectures may require the use of an NMS server to manage and monitor the WLAN?A . Autonomous WLAN architectureB . Centralized WLAN architectureC . Distributed WLAN architectureD . All of the aboveView AnswerAnswer: D
What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.)
What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.)A . Access to network resourcesB . Verification of access point credentialsC . Dynamic authenticationD . Dynamic encryption-key generationE . Verification of user credentialsView AnswerAnswer: ADE