Category : Wireless Technology
Wireless Technology
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Welcome to All Test Answers
Wireless Technology
• Question 1 2 out of 2 points 64-QAM modulation alters which two of the following aspects of an RF signal? Selected Answers: Phase Amplitude • Question 2 1 out of 1 points In the 2.4-GHz band, the FCC limits the EIRP of a point-to-multipoint link to ...
Continue reading• Question 1 1 out of 1 points Suppose that an AP has detected an interference source and reported it with RSSI –58, duty cycle 1 percent, and severity 4. Which one of the following statements is most correct? Selected Answer: The interfering ...
Continue reading• Question 1 1 out of 1 points To see a list of specific alarms and their time stamps in Cisco Prime Infrastructure, you should look in which one of the following areas? Selected Answer: Alarm Browser • Question 2 1 out of 1 points In ...
Continue reading• Question 1 1 out of 1 points WPA2 with 802.1x and AES was introduced in which one of the following CCX versions? Selected Answer: CCXv3 • Question 2 1 out of 1 points Which one of the following does a Windows 7 machine use to ...
Continue reading• Question 1 1 out of 1 points Suppose a data WLAN and a guest WLAN are configured on a controller and mapped to two VLANs. Which one of the following is a true statement? Selected Answer: The controller cannot route packets between ...
Continue reading• Question 1 1 out of 1 points Which of the following are necessary components of a secure wireless connection? (Choose all that apply.) All of these answers are correct. • Question 2 2 out of 2 points A pre-shared key is used in which of ...
Continue reading• Question 1 1 out of 1 points An AP sends 802.11 broadcast management frames at which one of the following data rates? Selected Answer: The lowest mandatory data rate • Question 2 1 out of 1 points An RF group is automatically formed by which ...
Continue reading• Question 1 1 out of 1 points A client roams from controller A to controller B. If it undergoes a Layer 3 roam, which one of the following best describes the role of controller A? Selected Answer: Anchor controller • Question 2 1 out ...
Continue reading• Question 1 1 out of 1 points Which of the following is the most deterministic strategy you can use to push a specific AP to join a specific controller? Selected Answer: Configure the primary controller • Question 2 1 out of 1 points By default, ...
Continue reading• Question 1 1 out of 1 points A centralized wireless LAN controller maintains how many code image files? Selected Answer: 2 • Question 2 1 out of 1 points To save a copy of a controller’s configuration, which of the following methods could you use? Selected ...
Continue reading• Question 1 1 out of 1 points Which one of the following statements is true about roaming? Selected Answer: Wireless clients can scan available channels to look for a new AP when roaming. • Question 2 1 out of 1 points Which one of the ...
Continue reading• Question 1 2 out of 2 points In a Cisco wireless network, which of the following statements full of acronyms are correct? (Choose two.) Selected Answers: The BSSID is unique for each SSID in a BSS. The DS connects two BSSs to form ...
Continue reading• Question 1 1 out of 1 points Which one of the following best describes the effect that a building material has as an RF signal passes through a wall? Selected Answer: Absorption • Question 2 1 out of 1 points Suppose that you place a ...
Continue reading• Question 1 0 out of 1 points PI maps are organized into which one of the following hierarchies? Selected Answer: [None Given] Answers: Domain > building > floor Enterprise > department > building Building > floor > room Campus > building > floor • Question 2 0 out ...
Continue reading• Question 1 1 out of 1 points Which one of the following options should you select to configure WPA2 personal on a WLAN?
Continue readingReview Test Submission: Test#1_REVIEW • Question 1 After looking at a sticker on the back of an autonomous AP, you see MAC C4:7D:4F:12:34:56 listed. Which one of the following is a safe assumption? Selected Answer: [None Given] Answers: The string of numbers is the ...
Continue reading