CIS 175 help Making Decisions/uophelp.com CIS 175 help Making Decisions/uophelp.com | Page 2
When a wireless channel uses more than one frequency the transmission
method called ________ spectrum.
• Question 9
To protect WLAN traffic from eavesdroppers, a variety of security
standards and practices have been developed, including all of the
following except:
• Question 10
WLAN security based on a PSK technology is called ________ mode.
• Question 11
The wireless device that is marked X in the image below is a ________.
• Question 12
WLANs can be categorized based on their use of wireless APs. The
three main categories are ________, ________, and ________.
• Question 13
Which is NOT a security threat for WLAN’s?
• Question 14
Which of the following is one of the broad categories of wireless
antennae that are based on coverage? (Choose 2)
• Question 15
The Wide Area Network (WAN) design below represents what type of
fault-tolerant network design?
• Question 16
Which QoS design consideration is incorrect?
• Question 17
Which term is best described by the following definition: “Both NICs
are active at the same time, and they each have their own MAC address”?
• Question 18
Which of the following is one of the two modes of Network Interface
Card (NIC) redundancy? (Choose 2)
• Question 19
The ________ command can be used to display information about
current sessions, including source and destination IP addresses and port
numbers.
• Question 20
Which command is a UNIX command?