Which of the following protocols are IEEE 802.11 standards Select 3 Answers)?
A. 802.11a/b/g/n
B. 802.11i
C. 802.1X
D. 802.11s
Which of the following technologies works at 5 GHz (Select 2 Answers)?
A. Radar
B. Bluetooth
C. Infrared
D. Digital Satellite
On a WDS network, a root AP can connect to multiple leaf APs, but a leaf AP can connect to only one root AP.
A. True
B. False
Which of the following is included in the 82.802.11 WLAN CSMA/CA mechanism (Select 3 Answers)?
A. Carrier Sense
B. Multiple Access
C. Conflict Detection
D. Conflict Avoidance
Configure the authentication mode of the AP. What are the authentication modes supported by the AP (Select 3 Answers)?
A. mac-auth
B. sn-auth
C. no-auth
D. mac-sn-auth
TKIP encryption is more secure than WEP encryption because (Select 3 Answers).
A. Adopt a longer IV
B. Added a key distribution mechanism, no longer using a single key
C. Adopting a more complex encryption algorithm
D. Using a stronger data verification algorithm
What is the coverage of the AP (Select 3 Answers).
A. AP transmit power
B. Antenna gain
C. AP size
D. Transmission loss
What are the general methods for solving co-channel interference (ABD) (Select 3 Answers).
A. Adjust AP transmit power and adjust antenna feed
B. Reasonable frequency reuse to ensure that the same channel does not appear in the same or adjacent coverage area
C. Multi-directional coverage using omnidirectional antennas
D. Natural isolation using obstacles
How many management nodes (B) does the eSight Standard Edition support?
A. 60
B. 2000
C. 5000
D. 20000