Exam 22: Wireless Networking
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
What method enables you to limit access to your wireless network based on the physical, hard-wired address of the units' wireless NIC?
(Multiple Choice)
4.8/5
(35)
The IEEE organization has made first-generation Bluetooth the basis for its 802.15 standard for wireless ______________.
(Short Answer)
4.9/5
(34)
List five devices or objects that can block or interfere with wireless radio signals.
(Essay)
4.8/5
(28)
What are the throughput, range, and frequency of the 802.11n wireless standard?
(Essay)
4.8/5
(50)
WPS has a security flaw that allows a hacker to repeatedly guess the ______________ -digit numeric code.
(Short Answer)
4.7/5
(38)
Two or more wireless nodes communicating in ad hoc mode form what's called a(n) ______________.
(Short Answer)
4.7/5
(31)
What centrally connects wireless network nodes in the same way that a hub connects wired Ethernet PCs?
(Multiple Choice)
4.8/5
(39)
WPA uses the ______________, which provides a new encryption key for every sent packet.
(Short Answer)
4.8/5
(37)
Where is the location for an omni-directional antenna in your home or office?
(Multiple Choice)
4.8/5
(42)
What WAP settings should be adjusted in an environment with overlapping Wi-Fi signals?
(Multiple Choice)
4.8/5
(32)
What WPA/WPA2 encryption version uses a RADIUS server for secure authentication?
(Multiple Choice)
4.7/5
(43)
What is the maximum distance of a Class 3 Bluetooth device?
(Multiple Choice)
4.9/5
(45)
What are the three methods that wireless networks use to secure access to the network itself and secure the data being transferred?
(Essay)
4.8/5
(38)
Infrared is designed to make a point-to-point connection between two devices only in ______________ mode.
(Short Answer)
4.9/5
(41)
Products that adhere to the 802.11b standard provide a maximum of ______________ channels in the 2.4 GHz band.
(Short Answer)
4.8/5
(31)
Showing 61 - 80 of 105
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)