ICND Part 1 Vol 1 Module 3 Review

18 Questions | Attempts: 73
Please wait...
Question 1 / 19
🏆 Rank #--
Score 0/100

1. Which standard provides the strongest level of WLAN security? (Source: Understanding WLAN Security)

Submit
Please wait...
About This Quiz
ICND Quizzes & Trivia

Module 3 Review

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What method does a WLAN use to control transmissions? (Source: Exploring Wireless Networking)

Submit

3. Which regulatory agency controls the 801.11 standard that governs WLANs? (Source: Exploring Wireless Networking)

Submit

4. Which organization offers certification for interoperability between vendors of 802.11 products? (Source: Exploring Wireless Networking)

Submit

5. Which statement is true of a comparison between WP A and WP A2? (Source: Understanding WLAN Security)

Submit

6. Which three are the steps to secure a WLAN? (Choose three.) (Source: Understanding WLAN Security)

Submit

7. What is a rogue access point? (Source: Understanding WLAN Security) A)         

Submit

8. When you are implementing extended service areas, how much overlap is suggested? (Source: Implementing a WLAN)

Submit

9. When implementing a WLAN, when should you use WEP? (Source: Implementing a WLAN)

Submit

10. Which 802.11 standard transmits using the 5-GHz band? (Source: Exploring Wireless Networking)

Submit

11. What is the most tangible benefit of wireless implementation? (Source: Exploring -Fireless Networking)

Submit

12. Which two of the 802.11 standards have the highest possible data rates? (Choose two.) (Source: Exploring Wireless Networking)

Submit

13. Which statement is true about the Wi-Fi Alliance? (Source: Exploring Wireless Networking)

Submit

14. Which three are the unlicensed bands used by WLANs? (Choose three.) (Source: Exploring Wireless Networking)

Submit

15. What allows a client to communicate while moving? (Source: Implementing a WLAN)

Submit

16. What factor determines which access point a client will associate with? (Source: Understanding WLAN Security

Submit

17. Which three are basic wireless access point parameters? (Choose three.) (Source: Implementing a WLAN)

Submit

18. When using 802.IX, how is the client authenticated? (Source: Understanding WLAN Security)

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (18)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which standard provides the strongest level of WLAN security? (Source:...
What method does a WLAN use to control transmissions? (Source:...
Which regulatory agency controls the 801.11 standard that governs...
Which organization offers certification for interoperability between...
Which statement is true of a comparison between WP A and WP A2?...
Which three are the steps to secure a WLAN? (Choose three.) (Source:...
What is a rogue access point? (Source: Understanding WLAN Security)...
When you are implementing extended service areas, how much overlap is...
When implementing a WLAN, when should you use WEP? (Source:...
Which 802.11 standard transmits using the 5-GHz band? (Source:...
What is the most tangible benefit of wireless implementation? (Source:...
Which two of the 802.11 standards have the highest possible data...
Which statement is true about the Wi-Fi Alliance? (Source: Exploring...
Which three are the unlicensed bands used by WLANs? (Choose three.)...
What allows a client to communicate while moving? (Source:...
What factor determines which access point a client will associate...
Which three are basic wireless access point parameters? (Choose...
When using 802.IX, how is the client authenticated? (Source:...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!