1) Using multiple access points can accomplish which of the following? 1) ______
ID: 3761803 • Letter: 1
Question
1) Using multiple access points can accomplish which of the following? 1) _______
A) Decrease broadcast domains
B) Minimize IP conflicts
C) Extend the range for wireless connectivity
D) Decrease collision domains
2) Which of the following is another name for an RFID tag? 2) _______
A) Radial displacement tool B) RF transponder
C) Coaxial alignment pad D) None of these answers are correct.
3) In RFID, what does the term "backscatter" mean? 3) _______
A) It refers to the radio waves striking the RFID tag and transmitting a signal back to the receiver source.
B) It refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source.
C) It only occurs when both the transmitter and RFID tag share common data patterns.
D) It refers to the reflection of the infrared waves striking the RFID tag and reflecting back to the transmitter source.
4) Which of the following services are provided by the wireless LAN adapter? (Select all that apply.) 4) _______
A) Authentication
B) Segmenting
C) Delivery of the data
D) Routing
E) Privacy
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
5) Switches can be used with 802.11g but not with 802.11b. True or False? 5) _______
6) The hopping sequence in FHSS must be known by both the transmitting and receiving units. True or False? 6) _______
7) In wireless LAN configuration, the network administrator must ensure that WEP is turned off. True or False? 7) _______
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
8) What is EAP? 8) _______
A) Electronic Authentication Protocol B) Electronic Authorization Protocol
C) Extended Authentication Protocol D) Extensible Authentication Protocol
9) What is the maximum transmit power for 802.11b? 9) _______
A) 10 mW B) 10 W C) 100 mW D) 1000 mW
10) What is a RADIUS Server? 10) ______
A) This is used in high-security applications to limit access to administrative accounts.
B) This is used for remote users to prevent unauthorized users from connecting to the network.
C) This used with WEP for remote users to prevent authorized network access.
D) None of these answers are correct.
Explanation / Answer
1) Using multiple access points can accomplish which of the following? 1) ______
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.