Which of the following is a computer network that is layered on top of an underlying computer network?
You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?
Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?
Which of the following are the layers of physical security?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following security protocols is supported by Wi-Fi Protected Access (WPA)?
What limitations are present with PMK caching (or PMKSA caching) when 802.1X/EAP authentication is in use?
The IEEE 802.11 pairwise transient key (PTK) is derived from what cryptographic element?
Given: ABC company is developing an IEEE 802.11 complaint wireless security solution using 802.1X/EAP authentication. According to company policy the security should prevent an eavesdropper from decrypting data frames traversing a wireless connection.What security solution features play a role in adhering to this policy requirement? (Choose 2)
You are testing a VoWLAN deployment, and your communication measurements show a certain amount of lost packets. What would be an acceptable packet error rate value to still provide acceptable call quality?
Assuming an identical RF environment,
What antenna connector type is displayed in the exhibit?
C. N Connector
D. MC Connector
Given: Use the exhibit as a reference. ABC Company has a WLAN controller with 10 controller-based APs; the Voice SSID is configured for centralized data forwarding. Each AP is connected to an access port on a layer-2 Ethernet switch. Each layer-2 switch is uplinked to a single layer-3 core Ethernet switch. The WLAN controller is connected directly to the layer-3 core Ethernet switch. Layer-3 tunnels are created between all controller-based APs and the WLAN controller. A voice server is connected to the layer-3 Ethernet switch. When a voice-enabled QoS STA sends an IP data packet to a voice server in this scenario, the DSCP value carried in the STA’s IP data packet gets mapped to what and by which device?
Multicast video applications typically require special treatment on the Wi-Fi network due to the nature of multicast traffic. Many vendors implement proprietary multicast-to-unicast conversion for this reason. Which of the following is NOT a valid reason for special unicast conversion of downlink multicast traffic?
A. In QoS WLANs, multicast traffic is always assigned to the best effort (AC_BE) transmit queue.
B. Group addressed downlink frames are not acknowledged on the wireless medium.
C. Multicast traffic must always be transmitted via omnidirectional antennas.
D. Frames with a group receiver address must always be sent at a rate in the Basic Rate Set.