CIS 175 RANK Career Begins/cis175rank.com CIS 175 RANK Career Begins/cis175rank.com | Page 3

• Question 13 Which is NOT a security threat for WLAN ’ s ?
• Question 14
Which of the following is one of the broad categories of wireless antennae that are based on coverage ? ( Choose 2 )
• Question 15
The Wide Area Network ( WAN ) design below represents what type of fault-tolerant network design ?
• Question 16 Which QoS design consideration is incorrect ?
• Question 17
Which term is best described by the following definition : ― Both NICs are active at the same time , and they each have their own MAC address ‖?
• Question 18
Which of the following is one of the two modes of Network Interface Card ( NIC ) redundancy ? ( Choose 2 )
• Question 19
The ________ command can be used to display information about current sessions , including source and destination IP addresses and port numbers .

• Question 13 Which is NOT a security threat for WLAN ’ s ?

• Question 14

Which of the following is one of the broad categories of wireless antennae that are based on coverage ? ( Choose 2 )

• Question 15

The Wide Area Network ( WAN ) design below represents what type of fault-tolerant network design ?

• Question 16 Which QoS design consideration is incorrect ?

• Question 17

Which term is best described by the following definition : ― Both NICs are active at the same time , and they each have their own MAC address ‖?

• Question 18

Which of the following is one of the two modes of Network Interface Card ( NIC ) redundancy ? ( Choose 2 )

• Question 19

The ________ command can be used to display information about current sessions , including source and destination IP addresses and port numbers .