Matching
Match each item with an statement below:
Premises:
specifies information that access points need to exchange to support WLAN roaming.
verifies that the person requesting access to the network is who they claim to be.
subset of a larger network.
adds mobility components to the Fixed WiMAX standard.
original IEEE 802.11 encryption mechanism.
used circuit-switched digital networks and started in the early 1990s.
standard network management protocol for both wired and wireless networks.
restricts the traffic on a network based on specific criteria.
uses discovery tools to continuously monitor the RF for attacks
Responses:
Network segment
2G cellular telephony
Wireless authentication
Traffic filtering
IEEE 802.11F
WLAN management system
SNMP
Wired equivalent privacy (WEP)
Mobile WiMAX
Correct Answer:
Premises:
Responses:
specifies information that access points need to exchange to support WLAN roaming.
verifies that the person requesting access to the network is who they claim to be.
subset of a larger network.
adds mobility components to the Fixed WiMAX standard.
original IEEE 802.11 encryption mechanism.
used circuit-switched digital networks and started in the early 1990s.
standard network management protocol for both wired and wireless networks.
restricts the traffic on a network based on specific criteria.
uses discovery tools to continuously monitor the RF for attacks
Premises:
specifies information that access points need to exchange to support WLAN roaming.
verifies that the person requesting access to the network is who they claim to be.
subset of a larger network.
adds mobility components to the Fixed WiMAX standard.
original IEEE 802.11 encryption mechanism.
used circuit-switched digital networks and started in the early 1990s.
standard network management protocol for both wired and wireless networks.
restricts the traffic on a network based on specific criteria.
uses discovery tools to continuously monitor the RF for attacks
Responses:
Related Questions
Q29: A baseline will typically include a(n) _,
Q30: A secure WLAN should use WEP for
Q31: What are the characteristics of 3G technology
Q32: The first generation of wireless cellular telephony
Q33: A WLAN that has been designed from
Q35: The _ refers to the connection that
Q36: With throughput rates for _ averaging between
Q37: In order for a change request form
Q38: A(n) _ outlines the requested alteration in
Q39: _ allows users to freely roam both