Which of the following organizations provides a seal of approval to interoperable devices?
A. IEEE
B. FCC
C. ETSI
D. Wi-Fi Alliance
Which of the following hardware uses flash memory technology?
A. DDR2 SDRAM
B. Secure digital card
C. PCMCIA card
D. Smart card reader
Which of the following statements are true about a virtual private network (VPN)? Each correct answer represents a complete solution. Choose all that apply.
A. It is a network that uses a public telecommunication infrastructure, such as the Internet.
B. It operates at the Physical layer of the OSl model.
C. It is a form of wide area network (WAN) that supplies network connectivity over a possibly long physical distance.
D. It works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP).
E. It provides remote offices or individual users with secure access to their organization's network.
John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John configures 802.11 authentications on all the clients present in the network. A client becomes active on the network and wants to pass traffic on the medium. Which of the following frames does the client use to search all access points in its radio range?
A. Probe request frame
B. Authentication request frame
C. Association request frame
D. Authentication response frame
Which of the following standards defines FHSS and DSSS RF technologies and operates at 1 or 2 Mbps?
A. Original 802.11
B. 802.11a
C. 802.11b
D. 802.11g
How many non-overlapping channels does the IEEE 802.11a have?
A. 15
B. 12
C. 18
D. 23
Which of the following access points does NOT support 802.11a protocol?
A. 1240 AG
B. 1130 AG
C. 1300 AP
D. 1250 AP
Which of the following layers is NOT a valid Wireless Application Protocol layer?
A. Session
B. Transport
C. Physical
D. Security