Which modulation method does the following picture belong to?
A. amplitude modulation
B. frequency modulation
C. phase modulation
D. modulation
What is the bandwidth of each channel in the 802.11g band?
A. 25 MHz
B. 20 MHz
C. 50 MHz
D. 22 MHz
The basic service set is the basic component of an 802.11 network and consists of a set of workstations that communicate with each other.
A. True
B. False
Which of the following protocols is defined in the Mesh networking?
A. 802.11a
B. 802.11g
C. 802.11e
D. 802.11s
The modulation methods adopted by DSSS are BPSK and QPSK respectively.
A. True
B. False
Which is the longest interval between 802.11 frames?
A. SIFS
B. IFS
C. DIFS
D. PIFS
What is correct in the following options (Select 3 Answers)?
A. SSID technology can divide a wireless local area network into several sub-networks that require different authentication. Each sub-network needs independent authentication. Only authenticated users can enter the corresponding sub-network to prevent unauthorized access. The user enters the network.
B. The BSSID is actually the MAC address of the AP, which is used to identify the BSS managed by the AP, and maps the BSSID and SSID in the same AP.
C. Users can implement roaming under different SSIDs.
D. The SSID is the same in an ESS, but the BSSID corresponding to each AP in the ESS is different. If an AP can support multiple SSIDs at the same time, the AP will assign different BSSIDs to correspond to these SSIDs.
Among the following encryption methods, the best security is.
A. Clear text encryption
B. WEP encryption
C. TKIP encryption
D. CCMP encryption
The following is a description of TKIP encryption. The error is .
A. The length of the IV used in A. TKIP encryption is 24bits.
B. TKIP encryption uses the same encryption algorithm as WEP encryption.
C. The motivation for developing TKIP encryption is to upgrade the security of legacy WEP hardware.
D. Added the mechanism of key generation, management and delivery in TKIP encryption.
The IEEE 802.11 standard used to define roaming is
A. IEEE 802.11c
B. IEEE 802.11h
C. IEEE 802.11j
D. IEEE 802.11r
Among the following options, is the reason for using 5G priority access.
A. 5G frequency band is easier to network planning
B. 5G frequency band can provide better access capacity and capacity The connection speed between the user and the AP is fast in the
C. 5G frequency band. The transmission rate of the
D. 5G frequency band is higher than the 2.4G frequency band.
Among the following obstacles, has the greatest loss of wireless signals.
A. Gypsum ceiling
B. Glass
C. 120mm Brick wall
D. 200mm Concrete wall
For indoor distributed APs, the following description is correct (B).
A. AP power can be up to 800mW.
B. It can be deployed in conjunction with the carrier's 3G network.
C. Waterproof and dustproof
D. AP6310SN supports dual frequency mode
The equipment manufacturer can usually be judged according to the following.
A. SSID
B. MAC address
C. Encryption type
D. Channel