CIS 175 Experience Tradition/uophelp.com CIS 175 Experience Tradition/uophelp.com | Page 2

To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except: • Question 10 WLAN security based on a PSK technology is called ________ mode. • Question 11 The wireless device that is marked X in the image below is a ________. • Question 12 WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________. • Question 13 Which is NOT a security threat for WLAN’s? • Question 14 Which of the following is one of the broad categories of wireless antennae that are based on coverage? (Choose 2) • Question 15 The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? • Question 16 Which QoS design consideration is incorrect? • Question 17 Which term is best described by the following definition: ―Both NICs are active at the same time, and they each have their own MAC address‖? • Question 18 Which of the following is one of the two modes of Network Interface Card (NIC) redundancy? (Choose 2) • Question 19 The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers. • Question 20 Which command is a UNIX command? • Question 21 A route can be added by using the route ________ command. • Question 22