• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/3

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

3 Cards in this Set

  • Front
  • Back

Get answers

http://www.storehomework.com/product/netw-360-week-8-final-exam

NETW 360 Week 8 Final Exam

NETW 360 Week 8 Final Exam1. (TCO 1) Depending on the standard used, WLANs can transmit at speeds anywhere from 11 Mbps up to 54 Mbps and at distances of up to _____ feet. (Points : 5)2. (TCO 1) A _____ is an extension of a wired LAN, connecting to it through a device called a wireless access point. (Points : 5)3. (TCO 2) Signal loss due to an object in the path causing the wave to bend is known as _____. (Points : 5)4. (TCO 2) Phase modulation varies the cycle’s _____. (Points : 5)5. (TCO 3) The 802.11 series of standards are an example of a _____ standard. (Points : 5)6. (TCO 4) An antenna is used to _____. (Points : 5)7. (TCO 5) An access point contains all of the following parts, except _____. (Points : 5)8. (TCO 6) Wireless metropolitan area networks (WMAN) can cover an area of up to _____. (Points : 5)9. (TCO 7) The primary reason for obtaining business requirements for the wireless network is to _____. (Points : 5)10. (TCO 8) Access control is a method to address which CIA characteristic of information security? (Points : 5)1. (TCO 9) When using SNMP, the software agent monitors the network and stores the information in its _____. (Points : 5)2. (TCO 10) Each of the following is data that many enterprise-level access points can provide, except _____. (Points : 5)3. (TCO 10) IEEE 802.11b/g and Bluetooth devices _____. (Points : 5)4. (TCO 9) A SNMP trap refers to _____. (Points : 5)5. (TCO 8) The two primary security vulnerabilities in 802.11’s original security mechanisms were _____. (Points : 5)6. (TCO 7) Which is not a location in which businesses install wireless networks for increased employee productivity? (Points : 5)7. (TCO 6) IrDA devices connect to which type of network? (Points : 5)8. (TCO 5) The bit pattern used in a WLAN direct sequence spread spectrum transmission is called the _____. (Points : 5)9. (TCO 4) Changes in frequency are illustrated by an up-and-down wave called a _____. (Points : 5)10. (TCO 3) An access point has a(n) _____ interface that allows it to connect to a wired network. (Points : 5)1. (TCO 1) Explain the 10s and 3s rules for RF math. (Points : 20)2. (TCO 2) Describe three of the most important characteristics of direct sequence spread spectrum (DSSS). (Points : 20)3. (TCO 3) Describe multipath distortion. What can be done to correct it? (Points : 20)4. (TCO 4) What are de facto standards? (Points : 20)5. (TCO 5) What are the features of a wireless gateway? (Points : 20)1. (TCO 6) Describe the last mile connection problem. (Points : 20)2. (TCO 7) What should be included in the narrative of a site survey report? (Points : 20)3. (TCO 8) List two ways in which a denial of service (DoS) attack can be launched against a WLAN. (Points : 20)4. (TCO 9) What is remote monitoring? (Points : 20)

storehomework.com

StoreHomeworkis the web's largest tutorial store. Currently we are providing homework tutorials for universities like Ashford, DeVry, Grantham, Phoenix, Strayer. The tutorials are compiled by experts in various fields of study.