Deck 10: Managing a Wireless LAN

ملء الشاشة (f)
exit full mode
سؤال
Information security weaknesses can never be entirely eliminated.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is another name for propagation loss?

A) transmission loss
B) effective loss
C) free space loss
D) signal loss
سؤال
In the Windows operating system, what window provides basic tools for monitoring a WLAN?

A) Wireless Adapter Information
B) Wireless Network Connection Status
C) Access Point Utilities
D) Network Monitor
سؤال
Almost all WLAN vendors provide utilities to assist in monitoring the wireless network.
سؤال
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
سؤال
____ attenuators are the only type permitted by the FCC for WLAN systems.

A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
سؤال
____ is a nonvolatile storage chip used in computers and other devices.

A) Firmware
B) SNMP
C) RMON
D) EEPROM
سؤال
A ____ antenna is most typically used on a WLAN.

A) panel
B) rod
C) sectorized
D) beam steering
سؤال
Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.
سؤال
What information is required for a link budget?

A) power of the transmitter
B) path length
C) frequency of the link
D) All of the above
سؤال
A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.

A) bidirectional
B) pre-injection
C) unidirectional
D) internal
سؤال
A wireless network is a static system.
سؤال
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.

A) donut
B) horizontal
C) plain
D) azimuth
سؤال
What is the last step in RF site tuning?

A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
سؤال
What tool(s) are used most often as "standard" network monitoring tools?

A) AP Monitor and Simple Network Management Protocol
B) WLAN Logger and Remote Monitoring
C) Simple Network Management Protocol and Remote Monitoring
D) All of the above
سؤال
The current version of SNMP (____) addresses security and remote configuration.

A) v1
B) v2
C) v3
D) v4
سؤال
For a proper WLAN performance, the link budget must be ____ dB.

A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
سؤال
Which type of RF loss is caused by the equipment itself, not external objects?

A) Refraction
B) Scattering
C) Voltage Standing Wave Ratio
D) Absorption
سؤال
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.

A) multicast
B) unicast
C) broadcast
D) netcast
سؤال
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.

A) manual
B) event
C) network
D) AP
سؤال
____________________ is software that is embedded into hardware to control the device.
سؤال
Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.

A) major
B) catastrophic
C) significant
D) small impact
سؤال
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.

A) Physical
B) Practical
C) Hardware
D) Social
سؤال
When conducting a security audit, ____ should determine vulnerabilities.

A) a highly-paid consultant
B) a wireless system administrator employed by the company
C) a junior administrator
D) a team with diverse backgrounds
سؤال
Many enterprise-level access points provide utilities that offer three types of information. What are they?
سؤال
List and describe three RF tuning settings.
سؤال
What is an RF amplifier?
سؤال
There are several factors that may result in RF loss. What are they?
سؤال
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.
سؤال
A radio frequency link between the sender and receiver consists of three basic elements. What are they?
سؤال
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.
سؤال
What is Remote Monitoring?
سؤال
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
سؤال
Describe a sectorized antenna.
سؤال
Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
سؤال
The first step in creating a security policy is ____.

A) risk assessment
B) security auditing
C) impact analysis
D) documentation
سؤال
What technique(s) is/are most effective for defeating social engineering attacks?

A) physical and software security
B) documentation
C) education and policies
D) undercover work by network administrators
سؤال
In order to use SNMP, a software ____________________ is loaded onto each network device that will be managed using SNMP.
سؤال
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.

A) RF attenuator
B) splitter
C) lightning arrestor
D) phase modulator
سؤال
What are the factors that should be considered in determining the relative value of assets?
سؤال
When creating a functional (working) security policy, there are several elements that should be considered. Describe them.
سؤال
Match between columns
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
firmware
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
splitter
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
software agent
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
link budget
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
attenuator
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
Remote Monitoring
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
RF site tuning
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
beam steering
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
effective receiving sensibility
device that decreases the RF signal
firmware
device that decreases the RF signal
splitter
device that decreases the RF signal
software agent
device that decreases the RF signal
link budget
device that decreases the RF signal
attenuator
device that decreases the RF signal
Remote Monitoring
device that decreases the RF signal
RF site tuning
device that decreases the RF signal
beam steering
device that decreases the RF signal
effective receiving sensibility
SNMP-based tool used to monitor LANs that are connected through a wide area network
firmware
SNMP-based tool used to monitor LANs that are connected through a wide area network
splitter
SNMP-based tool used to monitor LANs that are connected through a wide area network
software agent
SNMP-based tool used to monitor LANs that are connected through a wide area network
link budget
SNMP-based tool used to monitor LANs that are connected through a wide area network
attenuator
SNMP-based tool used to monitor LANs that are connected through a wide area network
Remote Monitoring
SNMP-based tool used to monitor LANs that are connected through a wide area network
RF site tuning
SNMP-based tool used to monitor LANs that are connected through a wide area network
beam steering
SNMP-based tool used to monitor LANs that are connected through a wide area network
effective receiving sensibility
software that is embedded into hardware to control the device
firmware
software that is embedded into hardware to control the device
splitter
software that is embedded into hardware to control the device
software agent
software that is embedded into hardware to control the device
link budget
software that is embedded into hardware to control the device
attenuator
software that is embedded into hardware to control the device
Remote Monitoring
software that is embedded into hardware to control the device
RF site tuning
software that is embedded into hardware to control the device
beam steering
software that is embedded into hardware to control the device
effective receiving sensibility
device that has a single input connector and multiple output connectors
firmware
device that has a single input connector and multiple output connectors
splitter
device that has a single input connector and multiple output connectors
software agent
device that has a single input connector and multiple output connectors
link budget
device that has a single input connector and multiple output connectors
attenuator
device that has a single input connector and multiple output connectors
Remote Monitoring
device that has a single input connector and multiple output connectors
RF site tuning
device that has a single input connector and multiple output connectors
beam steering
device that has a single input connector and multiple output connectors
effective receiving sensibility
part of SNMP that monitors network traffic and stores that information in its management information base
firmware
part of SNMP that monitors network traffic and stores that information in its management information base
splitter
part of SNMP that monitors network traffic and stores that information in its management information base
software agent
part of SNMP that monitors network traffic and stores that information in its management information base
link budget
part of SNMP that monitors network traffic and stores that information in its management information base
attenuator
part of SNMP that monitors network traffic and stores that information in its management information base
Remote Monitoring
part of SNMP that monitors network traffic and stores that information in its management information base
RF site tuning
part of SNMP that monitors network traffic and stores that information in its management information base
beam steering
part of SNMP that monitors network traffic and stores that information in its management information base
effective receiving sensibility
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
firmware
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
splitter
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
software agent
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
link budget
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
attenuator
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
Remote Monitoring
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
RF site tuning
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
beam steering
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
effective receiving sensibility
decreases interference by attenuating unwanted sources of interference
firmware
decreases interference by attenuating unwanted sources of interference
splitter
decreases interference by attenuating unwanted sources of interference
software agent
decreases interference by attenuating unwanted sources of interference
link budget
decreases interference by attenuating unwanted sources of interference
attenuator
decreases interference by attenuating unwanted sources of interference
Remote Monitoring
decreases interference by attenuating unwanted sources of interference
RF site tuning
decreases interference by attenuating unwanted sources of interference
beam steering
decreases interference by attenuating unwanted sources of interference
effective receiving sensibility
attempting to readjust the settings of the AP after a firmware upgrade
firmware
attempting to readjust the settings of the AP after a firmware upgrade
splitter
attempting to readjust the settings of the AP after a firmware upgrade
software agent
attempting to readjust the settings of the AP after a firmware upgrade
link budget
attempting to readjust the settings of the AP after a firmware upgrade
attenuator
attempting to readjust the settings of the AP after a firmware upgrade
Remote Monitoring
attempting to readjust the settings of the AP after a firmware upgrade
RF site tuning
attempting to readjust the settings of the AP after a firmware upgrade
beam steering
attempting to readjust the settings of the AP after a firmware upgrade
effective receiving sensibility
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Managing a Wireless LAN
1
Information security weaknesses can never be entirely eliminated.
True
2
What is another name for propagation loss?

A) transmission loss
B) effective loss
C) free space loss
D) signal loss
C
3
In the Windows operating system, what window provides basic tools for monitoring a WLAN?

A) Wireless Adapter Information
B) Wireless Network Connection Status
C) Access Point Utilities
D) Network Monitor
B
4
Almost all WLAN vendors provide utilities to assist in monitoring the wireless network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ attenuators are the only type permitted by the FCC for WLAN systems.

A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is a nonvolatile storage chip used in computers and other devices.

A) Firmware
B) SNMP
C) RMON
D) EEPROM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ antenna is most typically used on a WLAN.

A) panel
B) rod
C) sectorized
D) beam steering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
What information is required for a link budget?

A) power of the transmitter
B) path length
C) frequency of the link
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.

A) bidirectional
B) pre-injection
C) unidirectional
D) internal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A wireless network is a static system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.

A) donut
B) horizontal
C) plain
D) azimuth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is the last step in RF site tuning?

A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
What tool(s) are used most often as "standard" network monitoring tools?

A) AP Monitor and Simple Network Management Protocol
B) WLAN Logger and Remote Monitoring
C) Simple Network Management Protocol and Remote Monitoring
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
The current version of SNMP (____) addresses security and remote configuration.

A) v1
B) v2
C) v3
D) v4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
For a proper WLAN performance, the link budget must be ____ dB.

A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which type of RF loss is caused by the equipment itself, not external objects?

A) Refraction
B) Scattering
C) Voltage Standing Wave Ratio
D) Absorption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.

A) multicast
B) unicast
C) broadcast
D) netcast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.

A) manual
B) event
C) network
D) AP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________________ is software that is embedded into hardware to control the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.

A) major
B) catastrophic
C) significant
D) small impact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.

A) Physical
B) Practical
C) Hardware
D) Social
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
When conducting a security audit, ____ should determine vulnerabilities.

A) a highly-paid consultant
B) a wireless system administrator employed by the company
C) a junior administrator
D) a team with diverse backgrounds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Many enterprise-level access points provide utilities that offer three types of information. What are they?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
List and describe three RF tuning settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is an RF amplifier?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
There are several factors that may result in RF loss. What are they?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A radio frequency link between the sender and receiver consists of three basic elements. What are they?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is Remote Monitoring?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Describe a sectorized antenna.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
The first step in creating a security policy is ____.

A) risk assessment
B) security auditing
C) impact analysis
D) documentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
What technique(s) is/are most effective for defeating social engineering attacks?

A) physical and software security
B) documentation
C) education and policies
D) undercover work by network administrators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
In order to use SNMP, a software ____________________ is loaded onto each network device that will be managed using SNMP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.

A) RF attenuator
B) splitter
C) lightning arrestor
D) phase modulator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the factors that should be considered in determining the relative value of assets?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
When creating a functional (working) security policy, there are several elements that should be considered. Describe them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
firmware
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
splitter
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
software agent
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
link budget
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
attenuator
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
Remote Monitoring
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
RF site tuning
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
beam steering
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
effective receiving sensibility
device that decreases the RF signal
firmware
device that decreases the RF signal
splitter
device that decreases the RF signal
software agent
device that decreases the RF signal
link budget
device that decreases the RF signal
attenuator
device that decreases the RF signal
Remote Monitoring
device that decreases the RF signal
RF site tuning
device that decreases the RF signal
beam steering
device that decreases the RF signal
effective receiving sensibility
SNMP-based tool used to monitor LANs that are connected through a wide area network
firmware
SNMP-based tool used to monitor LANs that are connected through a wide area network
splitter
SNMP-based tool used to monitor LANs that are connected through a wide area network
software agent
SNMP-based tool used to monitor LANs that are connected through a wide area network
link budget
SNMP-based tool used to monitor LANs that are connected through a wide area network
attenuator
SNMP-based tool used to monitor LANs that are connected through a wide area network
Remote Monitoring
SNMP-based tool used to monitor LANs that are connected through a wide area network
RF site tuning
SNMP-based tool used to monitor LANs that are connected through a wide area network
beam steering
SNMP-based tool used to monitor LANs that are connected through a wide area network
effective receiving sensibility
software that is embedded into hardware to control the device
firmware
software that is embedded into hardware to control the device
splitter
software that is embedded into hardware to control the device
software agent
software that is embedded into hardware to control the device
link budget
software that is embedded into hardware to control the device
attenuator
software that is embedded into hardware to control the device
Remote Monitoring
software that is embedded into hardware to control the device
RF site tuning
software that is embedded into hardware to control the device
beam steering
software that is embedded into hardware to control the device
effective receiving sensibility
device that has a single input connector and multiple output connectors
firmware
device that has a single input connector and multiple output connectors
splitter
device that has a single input connector and multiple output connectors
software agent
device that has a single input connector and multiple output connectors
link budget
device that has a single input connector and multiple output connectors
attenuator
device that has a single input connector and multiple output connectors
Remote Monitoring
device that has a single input connector and multiple output connectors
RF site tuning
device that has a single input connector and multiple output connectors
beam steering
device that has a single input connector and multiple output connectors
effective receiving sensibility
part of SNMP that monitors network traffic and stores that information in its management information base
firmware
part of SNMP that monitors network traffic and stores that information in its management information base
splitter
part of SNMP that monitors network traffic and stores that information in its management information base
software agent
part of SNMP that monitors network traffic and stores that information in its management information base
link budget
part of SNMP that monitors network traffic and stores that information in its management information base
attenuator
part of SNMP that monitors network traffic and stores that information in its management information base
Remote Monitoring
part of SNMP that monitors network traffic and stores that information in its management information base
RF site tuning
part of SNMP that monitors network traffic and stores that information in its management information base
beam steering
part of SNMP that monitors network traffic and stores that information in its management information base
effective receiving sensibility
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
firmware
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
splitter
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
software agent
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
link budget
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
attenuator
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
Remote Monitoring
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
RF site tuning
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
beam steering
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
effective receiving sensibility
decreases interference by attenuating unwanted sources of interference
firmware
decreases interference by attenuating unwanted sources of interference
splitter
decreases interference by attenuating unwanted sources of interference
software agent
decreases interference by attenuating unwanted sources of interference
link budget
decreases interference by attenuating unwanted sources of interference
attenuator
decreases interference by attenuating unwanted sources of interference
Remote Monitoring
decreases interference by attenuating unwanted sources of interference
RF site tuning
decreases interference by attenuating unwanted sources of interference
beam steering
decreases interference by attenuating unwanted sources of interference
effective receiving sensibility
attempting to readjust the settings of the AP after a firmware upgrade
firmware
attempting to readjust the settings of the AP after a firmware upgrade
splitter
attempting to readjust the settings of the AP after a firmware upgrade
software agent
attempting to readjust the settings of the AP after a firmware upgrade
link budget
attempting to readjust the settings of the AP after a firmware upgrade
attenuator
attempting to readjust the settings of the AP after a firmware upgrade
Remote Monitoring
attempting to readjust the settings of the AP after a firmware upgrade
RF site tuning
attempting to readjust the settings of the AP after a firmware upgrade
beam steering
attempting to readjust the settings of the AP after a firmware upgrade
effective receiving sensibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.