ICND Part 1 Vol 1 Module 3 Review

18 Questions | Attempts: 73
Share
Please wait...
Question 1 / 18
0 %
0/100
Score 0/100
1. Which standard provides the strongest level of WLAN security? (Source: Understanding WLAN Security)
Submit
Please wait...
About This Quiz
ICND Quizzes & Trivia

Module 3 Review

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What method does a WLAN use to control transmissions? (Source: Exploring Wireless Networking)
Submit
3. Which regulatory agency controls the 801.11 standard that governs WLANs? (Source: Exploring Wireless Networking)
Submit
4. Which organization offers certification for interoperability between vendors of 802.11 products? (Source: Exploring Wireless Networking)
Submit
5. Which statement is true of a comparison between WP A and WP A2? (Source: Understanding WLAN Security)
Submit
6. Which three are the steps to secure a WLAN? (Choose three.) (Source: Understanding WLAN Security)
Submit
7. What is a rogue access point? (Source: Understanding WLAN Security) A)         
Submit
8. When you are implementing extended service areas, how much overlap is suggested? (Source: Implementing a WLAN)
Submit
9. When implementing a WLAN, when should you use WEP? (Source: Implementing a WLAN)
Submit
10. Which 802.11 standard transmits using the 5-GHz band? (Source: Exploring Wireless Networking)
Submit
11. What is the most tangible benefit of wireless implementation? (Source: Exploring -Fireless Networking)
Submit
12. Which two of the 802.11 standards have the highest possible data rates? (Choose two.) (Source: Exploring Wireless Networking)
Submit
13. Which statement is true about the Wi-Fi Alliance? (Source: Exploring Wireless Networking)
Submit
14. Which three are the unlicensed bands used by WLANs? (Choose three.) (Source: Exploring Wireless Networking)
Submit
15. What allows a client to communicate while moving? (Source: Implementing a WLAN)
Submit
16. What factor determines which access point a client will associate with? (Source: Understanding WLAN Security
Submit
17. Which three are basic wireless access point parameters? (Choose three.) (Source: Implementing a WLAN)
Submit
18. When using 802.IX, how is the client authenticated? (Source: Understanding WLAN Security)
Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 10, 2009
    Quiz Created by
    Whithickson
Cancel
  • All
    All (18)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which standard provides the strongest level of WLAN security? (Source:...
What method does a WLAN use to control transmissions? (Source:...
Which regulatory agency controls the 801.11 standard that governs...
Which organization offers certification for interoperability between...
Which statement is true of a comparison between WP A and WP A2?...
Which three are the steps to secure a WLAN? (Choose three.) (Source:...
What is a rogue access point? (Source: Understanding WLAN Security)...
When you are implementing extended service areas, how much overlap is...
When implementing a WLAN, when should you use WEP? (Source:...
Which 802.11 standard transmits using the 5-GHz band? (Source:...
What is the most tangible benefit of wireless implementation? (Source:...
Which two of the 802.11 standards have the highest possible data...
Which statement is true about the Wi-Fi Alliance? (Source: Exploring...
Which three are the unlicensed bands used by WLANs? (Choose three.)...
What allows a client to communicate while moving? (Source:...
What factor determines which access point a client will associate...
Which three are basic wireless access point parameters? (Choose...
When using 802.IX, how is the client authenticated? (Source:...
Alert!

Advertisement