CIS 175 RANK Extraordinary Life/cis175rank.com CIS 175 RANK Extraordinary Life/cis175rank.com | 页面 2

• Question 6
A common Layer 2 protocol used on dedicated leased lines is ________.
• Question 7
If the bandwidth of an OC-1 link is 51.84 Mbps , what is the bandwidth of an OC-3 link ?
• Question 8
When a wireless channel uses more than one frequency the transmission method called ________ spectrum .
• Question 9
To protect WLAN traffic from eavesdroppers , a variety of security standards and practices have been developed , including all of the following except :
• Question 10
WLAN security based on a PSK technology is called ________ mode .
• Question 11
The wireless device that is marked X in the image below is a ________.
• Question 12

• Question 6

A common Layer 2 protocol used on dedicated leased lines is ________.

• Question 7

If the bandwidth of an OC-1 link is 51.84 Mbps , what is the bandwidth of an OC-3 link ?

• Question 8

When a wireless channel uses more than one frequency the transmission method called ________ spectrum .

• Question 9

To protect WLAN traffic from eavesdroppers , a variety of security standards and practices have been developed , including all of the following except :

• Question 10

WLAN security based on a PSK technology is called ________ mode .

• Question 11

The wireless device that is marked X in the image below is a ________.

• Question 12