CIS 175 RANK Extraordinary Success /cis175rank.com CIS 175 RANK Extraordinary Success /cis175rank.com | Page 3

Which is NOT a security threat for WLAN’s? • Question 14 Which of the following is one of the broad categories of wireless antennae that are based on coverage? (Choose 2) • Question 15 The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? • Question 16 Which QoS design consideration is incorrect? • Question 17 Which term is best described by the following definition: ―Both NICs are active at the same time, and they each have their own MAC address‖? • Question 18 Which of the following is one of the two modes of Network Interface Card (NIC) redundancy? (Choose 2) • Question 19 The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers. • Question 20 Which command is a UNIX command? • Question 21