CIS 175 RANK It's Your Life/cis175rank.com CIS 175 RANK It's Your Life/cis175rank.com | Page 2

• Question 6
A common Layer 2 protocol used on dedicated leased lines is ________.
• Question 7
If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link?
• Question 8
When a wireless channel uses more than one frequency the transmission method called ________ spectrum.
• Question 9
To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except:
• Question 10
WLAN security based on a PSK technology is called ________ mode.
• Question 11
The wireless device that is marked X in the image below is a ________.
• Question 12

• Question 6

A common Layer 2 protocol used on dedicated leased lines is ________.

• Question 7

If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link?

• Question 8

When a wireless channel uses more than one frequency the transmission method called ________ spectrum.

• Question 9

To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except:

• Question 10

WLAN security based on a PSK technology is called ________ mode.

• Question 11

The wireless device that is marked X in the image below is a ________.

• Question 12