You work as a Network Administrator for Tech Perfect Inc. The company has an 802.11b wireless network. You have configured an internal antenna with the wireless access point (WAP). You want to increase the range of the WAP. Which of the following steps will you take to accomplish the task?
A. Install a wireless bridge on the network.
B. Install an external antenna.
C. Install a router on the network.
D. Install one more internal antenna.
You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?
A. TKIP
B. WPA
C. WPA 2
D. WEP
Which of the following is a spreading code that is used by DSSS at 1 Mbps?
A. CCK
B. Barker
C. DBPSK
D. DQPSK
Which of the following units represents the forward gain of an antenna compared with the hypothetical isotropic antenna?
A. dB
B. dBi
C. dBm
D. dBd
Which of the following serial bus specifications is also known as Firewire?
A. RS-232
B. IEEE 1284
C. IEEE 1394
D. DIN
On which of the following factors does the capacity of an access point depend? Each correct answer represents a complete solution. Choose all that apply.
A. Channel reuse
B. Software applications
C. Number of users
D. Co-location
Which of the following AP modes can be used for site surveys?
A. Sniffer mode
B. Bridge mode
C. Rogue-detection mode
D. Local mode
Wi-Fi Protected Access 2 (WPA 2) standard is also known as .
A. IEEE 802.11a
B. IEEE 802.1a
C. IEEE 802.3
D. IEEE 802.11i
Which of the following channels are considered non-overlapping in the 2.4 GHz band?
A. 2 and 6
B. 10 and 13
C. 1 and 6
D. 6 and 10
Wi-Fi Protected Access (WPA) uses .
A. Password Authentication Protocol (PAP)
B. Wired Equivalent Privacy (WEP)
C. Temporal Key Integrity Protocol (TKIP)
D. Challenge Handshake Authentication Protocol (CHAP)