3 Months Free Update
3 Months Free Update
3 Months Free Update
How many non-overlapping channels are available in regulatory domains in the 2.4 GHz frequency band?
Select one:
What metric is most commonly used at the receiver to report the signal strength?
Select one:
What protocol is sometimes used to access a network or user directory by a RADIUS server instead of using
an internal user database?
What is the maximum power that an 802.3at Power over Ethernet (PoE) injector can output in the Ethernet
interface?
You are configuring WPA2 for use on an AP. What encryption method should be used to ensure the highest
security?
What EAP method is supported on most operating systems without additional installation requirements?
Which one of the following is a non-deprecated security solution in the 802.11 standard?
Some APs come with a captive portal available within the AP, controller or cloud interface. For what would this
captive portal most likely be used?
EAP-TLS is used for 802.1X/EAP authentication on your WLAN. What must be installed on all client devices
that connect using this method?
In addition to modulation, coding and spatial streams, what has the most impact on available data rates in a WLAN link?
What Windows Command Prompt command may be used to configure wireless settings on Windows
computers?
What kind of authentication is used by WPA2-Enterprise implementations?
Select one: