Exam 10: Managing a Wireless LAN

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is another name for propagation loss?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.

Free
(Short Answer)
4.8/5
(38)
Correct Answer:
Verified

panel

Many enterprise-level access points provide utilities that offer three types of information. What are they?

(Essay)
4.9/5
(35)

Describe a sectorized antenna.

(Essay)
4.9/5
(34)

____________________ is software that is embedded into hardware to control the device.

(Short Answer)
4.8/5
(36)

There are several factors that may result in RF loss. What are they?

(Essay)
4.7/5
(30)

The current version of SNMP (____) addresses security and remote configuration.

(Multiple Choice)
4.8/5
(32)

What is an RF amplifier?

(Essay)
4.7/5
(34)

The first step in creating a security policy is ____.

(Multiple Choice)
4.8/5
(34)

____ is a nonvolatile storage chip used in computers and other devices.

(Multiple Choice)
4.8/5
(44)

What is the last step in RF site tuning?

(Multiple Choice)
4.8/5
(42)

A ____ antenna is most typically used on a WLAN.

(Multiple Choice)
4.8/5
(42)

____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.

(Short Answer)
4.7/5
(40)

What is Remote Monitoring?

(Essay)
4.9/5
(32)

What are the factors that should be considered in determining the relative value of assets?

(Essay)
4.8/5
(32)

Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.

(True/False)
4.9/5
(41)

For a proper WLAN performance, the link budget must be ____ dB.

(Multiple Choice)
4.9/5
(35)

The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.

(Short Answer)
4.8/5
(36)

When creating a functional (working) security policy, there are several elements that should be considered. Describe them.

(Essay)
4.9/5
(29)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)