802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of thefollowing?()
第1题:
下面属于5GNR下行链路reference-signal的是()
第2题:
A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem (Choose three.)()。
第3题:
Wireless components must work together for interoperability and performance. Which standard has specifications that are 2.4 GHz, 54 Mb/s, and a range of 150 feet?()
第4题:
WLAN(Wireless LAN)是计算机网络与无线通信技术相结合的产物。下列哪些属于WLAN 技术标准?()
第5题:
A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.) ()
第6题:
A company has installed a new 802.11g point-to-point connection between two buildings and isexperiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna. Which of the following would BEST improve the link performance?()
第7题:
Which of the following is an advantage of a 100Base-T network card versus an 802.11g wireless network card?()
第8题:
reports financial losses from attacks
providessecutiy command and control
provides VPN connectivity to clients
expedites reporting of incidents
manage rogue wireless signals
第9题:
460 feet (140 meters)
540 feet (165 meters)
560 feet (171 meters)
840 feet (256 meters)
第10题:
第11题:
Add a new 802.11a WLAN
Increase the Layer 2 and Layer 3 security of the WLAN
Increase the throughput for the wireless clients
Add new services (such as voice) over the WLAN
第12题:
Locating signals are transmitted by survival craft VHF transceivers
Locating signals are transmitted by SARTs
Locating signals are intended to facilitate the finding of a distressed vessel or its survivors
Locating signals are not transmitted by autoalarm generators
第13题:
What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()
第14题:
Which wireless technology would A customer choose to position them for bandwidth-intensive applications?()
第15题:
Which of the following wireless standards has the highest maximum data rate?()
第16题:
The Company wireless network is using 802.11G access points. Which two statements are true about these access points? ()
第17题:
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
第18题:
An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()
第19题:
802.11n
802.11b
802.11a
802.11g
第20题:
It supports eight different data rates.
It is fully backward compatible with 802.11b
It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed environment where both clients are present.
It is only compatibly with the 11 Mbps 802.11b transfer rate.
It has three non-overlapping channels in its channel options.
第21题:
mismatched TKIP encryption
null SSID
cordless phones
mismatched SSID
metal file cabinets
antenna type or direction
第22题:
mismatched TKIP encryption
null SSID
cordless phones
mismatched SSID
metal file cabinets
antenna type or direction
第23题:
Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server