You configure a wireless LAN controller for a WLAN network. Which of the following commands would you apply to save your configuration?
A. copy running-config
B. copy startup-config
C. save config
D. copy running-config startup-config
Identify whether the given statement is true or false."A vertical antenna is an example of omnidirectional antenna."
A. True
B. False
Your client has a brand new laptop. He is trying to connect to his home network, which is using an older (802.11b) wireless router. The router is set for encryption but not MAC filtering. What is the most likely problem?
A. His physical address for the laptop is not in the router.
B. His laptop is using the WPA encryption protocol.
C. The laptop does not have a wireless NIC.
D. His laptop has a newer operating system that cannot communicate with the router.
Which of the following steps should be taken to maximize RF receiver strength?
A. Maximize the effect of the out of phase RF signals.
B. Minimize the effect of the RF signals that are in the same phase.
C. Minimize the effect of the out of phase RF signals.
D. Maximize the effect of the RF signals that are in the same phase.
What is the maximum data transmission speed of IEEE 802.11b wireless networks?
A. 600 Mbps
B. 600 Gbps
C. 54 Mbps
D. 11 Mbps
You are designing a network for Red Carpet Inc. You decide to use IEEE 802.11b standard for networking. What will be the maximum data transmission speed that this network will support?
A. 2 Mbps
B. 54 Mbps
C. 11 Mbps
D. 100 Mbps
Which of the following organizations is responsible for the regulation of unlicensed frequency band in Europe?
A. Wi-Fi Alliance
B. ETSI
C. IEEE
D. FCC
You work as a technician for Blue Well Inc. Rick, a Sales Manager, wants to configure a new printer on his computer. He asks you to set up the printer so that he can get the fastest data transfer rate. Which of the following will you suggest that he use to connect his computer to the printer?
A. USB 2.0
B. USB 1.1
C. IEEE 1394
D. IEEE 1394b
John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication. Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?
A. Land attack
B. Vulnerability attack
C. Man-in-the-middle attack
D. DoS attack
What is the nominal voltage specified by the 802.3-2005 Clause 33 standard?
A. 12 VDC
B. 31 VDC
C. 24 VDC
D. 48 VDC