To protect WLAN traffic from eavesdroppers, a variety of security
standards and practices have been developed, including all of the
following except:
• Question 10
WLAN security based on a PSK technology is called ________ mode.
• Question 11
The wireless device that is marked X in the image below is a
________.
• Question 12
WLANs can be categorized based on their use of wireless APs. The
three main categories are ________, ________, and ________.
• Question 13
Which is NOT a security threat for WLAN’s?
• Question 14
Which of the following is one of the broad categories of wireless
antennae that are based on coverage? (Choose 2)
• Question 15
The Wide Area Network (WAN) design below represents what type
of fault-tolerant network design?
• Question 16
Which QoS design consideration is incorrect?
• Question 17
Which term is best described by the following definition: ―Both NICs
are active at the same time, and they each have their own MAC
address‖?
• Question 18
Which of the following is one of the two modes of Network Interface
Card (NIC) redundancy? (Choose 2)
• Question 19
The ________ command can be used to display information about
current sessions, including source and destination IP addresses and
port numbers.
• Question 20
Which command is a UNIX command?
• Question 21
A route can be added by using the route ________ command.
• Question 22