Exam 10: Managing a Wireless LAN
Exam 1: Its a Wireless World42 Questions
Exam 2: Wireless LAN Devices and Standards42 Questions
Exam 3: How Wireless Works42 Questions
Exam 4: IEEE 80211 Physical Layer Standards42 Questions
Exam 5: IEEE 80211 Media Access Control and Network Layer Standards42 Questions
Exam 6: Planning and Deploying a Wireless LAN42 Questions
Exam 7: Conducting a Site Survey42 Questions
Exam 8: Wireless LAN Security and Vulnerabilities42 Questions
Exam 9: Implementing Wireless Lan Security42 Questions
Exam 10: Managing a Wireless LAN42 Questions
Exam 11: Network Settings and Wireless LAN Troubleshooting42 Questions
Exam 12: Personal, Metropolitan, and Wide Area Wireless Networks42 Questions
Select questions type
When conducting a security audit, ____ should determine vulnerabilities.
(Multiple Choice)
4.8/5
(33)
What technique(s) is/are most effective for defeating social engineering attacks?
(Multiple Choice)
5.0/5
(35)
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
(True/False)
4.8/5
(40)
In order to use SNMP, a software ____________________ is loaded onto each network device that will be managed using SNMP.
(Short Answer)
4.7/5
(43)
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.
(Multiple Choice)
4.8/5
(39)
Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
(Essay)
4.8/5
(31)
Information security weaknesses can never be entirely eliminated.
(True/False)
4.8/5
(36)
A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.
(Multiple Choice)
4.8/5
(37)
What tool(s) are used most often as "standard" network monitoring tools?
(Multiple Choice)
4.8/5
(36)
Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.
(Multiple Choice)
4.9/5
(45)
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.
(Multiple Choice)
4.9/5
(33)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
____ attenuators are the only type permitted by the FCC for WLAN systems.
(Multiple Choice)
4.8/5
(29)
Which type of RF loss is caused by the equipment itself, not external objects?
(Multiple Choice)
4.9/5
(43)
A radio frequency link between the sender and receiver consists of three basic elements. What are they?
(Essay)
4.9/5
(45)
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.
(Multiple Choice)
4.9/5
(35)
In the Windows operating system, what window provides basic tools for monitoring a WLAN?
(Multiple Choice)
4.7/5
(32)
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.
(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)