Deck 10: Managing a Wireless LAN

Full screen (f)
exit full mode
Question
Information security weaknesses can never be entirely eliminated.
Use Space or
up arrow
down arrow
to flip the card.
Question
What is another name for propagation loss?

A) transmission loss
B) effective loss
C) free space loss
D) signal loss
Question
In the Windows operating system, what window provides basic tools for monitoring a WLAN?

A) Wireless Adapter Information
B) Wireless Network Connection Status
C) Access Point Utilities
D) Network Monitor
Question
Almost all WLAN vendors provide utilities to assist in monitoring the wireless network.
Question
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
Question
____ attenuators are the only type permitted by the FCC for WLAN systems.

A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
Question
____ is a nonvolatile storage chip used in computers and other devices.

A) Firmware
B) SNMP
C) RMON
D) EEPROM
Question
A ____ antenna is most typically used on a WLAN.

A) panel
B) rod
C) sectorized
D) beam steering
Question
Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.
Question
What information is required for a link budget?

A) power of the transmitter
B) path length
C) frequency of the link
D) All of the above
Question
A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.

A) bidirectional
B) pre-injection
C) unidirectional
D) internal
Question
A wireless network is a static system.
Question
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.

A) donut
B) horizontal
C) plain
D) azimuth
Question
What is the last step in RF site tuning?

A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
Question
What tool(s) are used most often as "standard" network monitoring tools?

A) AP Monitor and Simple Network Management Protocol
B) WLAN Logger and Remote Monitoring
C) Simple Network Management Protocol and Remote Monitoring
D) All of the above
Question
The current version of SNMP (____) addresses security and remote configuration.

A) v1
B) v2
C) v3
D) v4
Question
For a proper WLAN performance, the link budget must be ____ dB.

A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
Question
Which type of RF loss is caused by the equipment itself, not external objects?

A) Refraction
B) Scattering
C) Voltage Standing Wave Ratio
D) Absorption
Question
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.

A) multicast
B) unicast
C) broadcast
D) netcast
Question
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.

A) manual
B) event
C) network
D) AP
Question
____________________ is software that is embedded into hardware to control the device.
Question
Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.

A) major
B) catastrophic
C) significant
D) small impact
Question
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.

A) Physical
B) Practical
C) Hardware
D) Social
Question
When conducting a security audit, ____ should determine vulnerabilities.

A) a highly-paid consultant
B) a wireless system administrator employed by the company
C) a junior administrator
D) a team with diverse backgrounds
Question
Many enterprise-level access points provide utilities that offer three types of information. What are they?
Question
List and describe three RF tuning settings.
Question
What is an RF amplifier?
Question
There are several factors that may result in RF loss. What are they?
Question
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.
Question
A radio frequency link between the sender and receiver consists of three basic elements. What are they?
Question
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.
Question
What is Remote Monitoring?
Question
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
Question
Describe a sectorized antenna.
Question
Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
Question
The first step in creating a security policy is ____.

A) risk assessment
B) security auditing
C) impact analysis
D) documentation
Question
What technique(s) is/are most effective for defeating social engineering attacks?

A) physical and software security
B) documentation
C) education and policies
D) undercover work by network administrators
Question
In order to use SNMP, a software ____________________ is loaded onto each network device that will be managed using SNMP.
Question
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.

A) RF attenuator
B) splitter
C) lightning arrestor
D) phase modulator
Question
What are the factors that should be considered in determining the relative value of assets?
Question
When creating a functional (working) security policy, there are several elements that should be considered. Describe them.
Question
Match between columns
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
firmware
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
splitter
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
software agent
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
link budget
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
attenuator
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
Remote Monitoring
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
RF site tuning
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
beam steering
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
effective receiving sensibility
device that decreases the RF signal
firmware
device that decreases the RF signal
splitter
device that decreases the RF signal
software agent
device that decreases the RF signal
link budget
device that decreases the RF signal
attenuator
device that decreases the RF signal
Remote Monitoring
device that decreases the RF signal
RF site tuning
device that decreases the RF signal
beam steering
device that decreases the RF signal
effective receiving sensibility
SNMP-based tool used to monitor LANs that are connected through a wide area network
firmware
SNMP-based tool used to monitor LANs that are connected through a wide area network
splitter
SNMP-based tool used to monitor LANs that are connected through a wide area network
software agent
SNMP-based tool used to monitor LANs that are connected through a wide area network
link budget
SNMP-based tool used to monitor LANs that are connected through a wide area network
attenuator
SNMP-based tool used to monitor LANs that are connected through a wide area network
Remote Monitoring
SNMP-based tool used to monitor LANs that are connected through a wide area network
RF site tuning
SNMP-based tool used to monitor LANs that are connected through a wide area network
beam steering
SNMP-based tool used to monitor LANs that are connected through a wide area network
effective receiving sensibility
software that is embedded into hardware to control the device
firmware
software that is embedded into hardware to control the device
splitter
software that is embedded into hardware to control the device
software agent
software that is embedded into hardware to control the device
link budget
software that is embedded into hardware to control the device
attenuator
software that is embedded into hardware to control the device
Remote Monitoring
software that is embedded into hardware to control the device
RF site tuning
software that is embedded into hardware to control the device
beam steering
software that is embedded into hardware to control the device
effective receiving sensibility
device that has a single input connector and multiple output connectors
firmware
device that has a single input connector and multiple output connectors
splitter
device that has a single input connector and multiple output connectors
software agent
device that has a single input connector and multiple output connectors
link budget
device that has a single input connector and multiple output connectors
attenuator
device that has a single input connector and multiple output connectors
Remote Monitoring
device that has a single input connector and multiple output connectors
RF site tuning
device that has a single input connector and multiple output connectors
beam steering
device that has a single input connector and multiple output connectors
effective receiving sensibility
part of SNMP that monitors network traffic and stores that information in its management information base
firmware
part of SNMP that monitors network traffic and stores that information in its management information base
splitter
part of SNMP that monitors network traffic and stores that information in its management information base
software agent
part of SNMP that monitors network traffic and stores that information in its management information base
link budget
part of SNMP that monitors network traffic and stores that information in its management information base
attenuator
part of SNMP that monitors network traffic and stores that information in its management information base
Remote Monitoring
part of SNMP that monitors network traffic and stores that information in its management information base
RF site tuning
part of SNMP that monitors network traffic and stores that information in its management information base
beam steering
part of SNMP that monitors network traffic and stores that information in its management information base
effective receiving sensibility
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
firmware
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
splitter
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
software agent
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
link budget
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
attenuator
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
Remote Monitoring
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
RF site tuning
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
beam steering
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
effective receiving sensibility
decreases interference by attenuating unwanted sources of interference
firmware
decreases interference by attenuating unwanted sources of interference
splitter
decreases interference by attenuating unwanted sources of interference
software agent
decreases interference by attenuating unwanted sources of interference
link budget
decreases interference by attenuating unwanted sources of interference
attenuator
decreases interference by attenuating unwanted sources of interference
Remote Monitoring
decreases interference by attenuating unwanted sources of interference
RF site tuning
decreases interference by attenuating unwanted sources of interference
beam steering
decreases interference by attenuating unwanted sources of interference
effective receiving sensibility
attempting to readjust the settings of the AP after a firmware upgrade
firmware
attempting to readjust the settings of the AP after a firmware upgrade
splitter
attempting to readjust the settings of the AP after a firmware upgrade
software agent
attempting to readjust the settings of the AP after a firmware upgrade
link budget
attempting to readjust the settings of the AP after a firmware upgrade
attenuator
attempting to readjust the settings of the AP after a firmware upgrade
Remote Monitoring
attempting to readjust the settings of the AP after a firmware upgrade
RF site tuning
attempting to readjust the settings of the AP after a firmware upgrade
beam steering
attempting to readjust the settings of the AP after a firmware upgrade
effective receiving sensibility
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Managing a Wireless LAN
1
Information security weaknesses can never be entirely eliminated.
True
2
What is another name for propagation loss?

A) transmission loss
B) effective loss
C) free space loss
D) signal loss
C
3
In the Windows operating system, what window provides basic tools for monitoring a WLAN?

A) Wireless Adapter Information
B) Wireless Network Connection Status
C) Access Point Utilities
D) Network Monitor
B
4
Almost all WLAN vendors provide utilities to assist in monitoring the wireless network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ attenuators are the only type permitted by the FCC for WLAN systems.

A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a nonvolatile storage chip used in computers and other devices.

A) Firmware
B) SNMP
C) RMON
D) EEPROM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ antenna is most typically used on a WLAN.

A) panel
B) rod
C) sectorized
D) beam steering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
What information is required for a link budget?

A) power of the transmitter
B) path length
C) frequency of the link
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.

A) bidirectional
B) pre-injection
C) unidirectional
D) internal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A wireless network is a static system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.

A) donut
B) horizontal
C) plain
D) azimuth
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
What is the last step in RF site tuning?

A) adjust channel settings
B) documenting changes
C) modify throughput
D) validate coverage area
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
What tool(s) are used most often as "standard" network monitoring tools?

A) AP Monitor and Simple Network Management Protocol
B) WLAN Logger and Remote Monitoring
C) Simple Network Management Protocol and Remote Monitoring
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The current version of SNMP (____) addresses security and remote configuration.

A) v1
B) v2
C) v3
D) v4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
For a proper WLAN performance, the link budget must be ____ dB.

A) greater than zero
B) greater than five
C) greater than ten
D) less than ten
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Which type of RF loss is caused by the equipment itself, not external objects?

A) Refraction
B) Scattering
C) Voltage Standing Wave Ratio
D) Absorption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.

A) multicast
B) unicast
C) broadcast
D) netcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.

A) manual
B) event
C) network
D) AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ is software that is embedded into hardware to control the device.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Vulnerabilities that are ranked as ____ are events that would cause the organization to cease functioning or be seriously crippled in its capacity to perform.

A) major
B) catastrophic
C) significant
D) small impact
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.

A) Physical
B) Practical
C) Hardware
D) Social
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
When conducting a security audit, ____ should determine vulnerabilities.

A) a highly-paid consultant
B) a wireless system administrator employed by the company
C) a junior administrator
D) a team with diverse backgrounds
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Many enterprise-level access points provide utilities that offer three types of information. What are they?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe three RF tuning settings.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
What is an RF amplifier?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
There are several factors that may result in RF loss. What are they?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A radio frequency link between the sender and receiver consists of three basic elements. What are they?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What is Remote Monitoring?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Describe a sectorized antenna.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Although data from the access point and devices can be beneficial, there are drawbacks to relying solely on these sources of information. What are the drawbacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The first step in creating a security policy is ____.

A) risk assessment
B) security auditing
C) impact analysis
D) documentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What technique(s) is/are most effective for defeating social engineering attacks?

A) physical and software security
B) documentation
C) education and policies
D) undercover work by network administrators
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
In order to use SNMP, a software ____________________ is loaded onto each network device that will be managed using SNMP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.

A) RF attenuator
B) splitter
C) lightning arrestor
D) phase modulator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the factors that should be considered in determining the relative value of assets?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
When creating a functional (working) security policy, there are several elements that should be considered. Describe them.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
firmware
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
splitter
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
software agent
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
link budget
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
attenuator
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
Remote Monitoring
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
RF site tuning
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
beam steering
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
effective receiving sensibility
device that decreases the RF signal
firmware
device that decreases the RF signal
splitter
device that decreases the RF signal
software agent
device that decreases the RF signal
link budget
device that decreases the RF signal
attenuator
device that decreases the RF signal
Remote Monitoring
device that decreases the RF signal
RF site tuning
device that decreases the RF signal
beam steering
device that decreases the RF signal
effective receiving sensibility
SNMP-based tool used to monitor LANs that are connected through a wide area network
firmware
SNMP-based tool used to monitor LANs that are connected through a wide area network
splitter
SNMP-based tool used to monitor LANs that are connected through a wide area network
software agent
SNMP-based tool used to monitor LANs that are connected through a wide area network
link budget
SNMP-based tool used to monitor LANs that are connected through a wide area network
attenuator
SNMP-based tool used to monitor LANs that are connected through a wide area network
Remote Monitoring
SNMP-based tool used to monitor LANs that are connected through a wide area network
RF site tuning
SNMP-based tool used to monitor LANs that are connected through a wide area network
beam steering
SNMP-based tool used to monitor LANs that are connected through a wide area network
effective receiving sensibility
software that is embedded into hardware to control the device
firmware
software that is embedded into hardware to control the device
splitter
software that is embedded into hardware to control the device
software agent
software that is embedded into hardware to control the device
link budget
software that is embedded into hardware to control the device
attenuator
software that is embedded into hardware to control the device
Remote Monitoring
software that is embedded into hardware to control the device
RF site tuning
software that is embedded into hardware to control the device
beam steering
software that is embedded into hardware to control the device
effective receiving sensibility
device that has a single input connector and multiple output connectors
firmware
device that has a single input connector and multiple output connectors
splitter
device that has a single input connector and multiple output connectors
software agent
device that has a single input connector and multiple output connectors
link budget
device that has a single input connector and multiple output connectors
attenuator
device that has a single input connector and multiple output connectors
Remote Monitoring
device that has a single input connector and multiple output connectors
RF site tuning
device that has a single input connector and multiple output connectors
beam steering
device that has a single input connector and multiple output connectors
effective receiving sensibility
part of SNMP that monitors network traffic and stores that information in its management information base
firmware
part of SNMP that monitors network traffic and stores that information in its management information base
splitter
part of SNMP that monitors network traffic and stores that information in its management information base
software agent
part of SNMP that monitors network traffic and stores that information in its management information base
link budget
part of SNMP that monitors network traffic and stores that information in its management information base
attenuator
part of SNMP that monitors network traffic and stores that information in its management information base
Remote Monitoring
part of SNMP that monitors network traffic and stores that information in its management information base
RF site tuning
part of SNMP that monitors network traffic and stores that information in its management information base
beam steering
part of SNMP that monitors network traffic and stores that information in its management information base
effective receiving sensibility
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
firmware
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
splitter
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
software agent
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
link budget
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
attenuator
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
Remote Monitoring
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
RF site tuning
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
beam steering
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
effective receiving sensibility
decreases interference by attenuating unwanted sources of interference
firmware
decreases interference by attenuating unwanted sources of interference
splitter
decreases interference by attenuating unwanted sources of interference
software agent
decreases interference by attenuating unwanted sources of interference
link budget
decreases interference by attenuating unwanted sources of interference
attenuator
decreases interference by attenuating unwanted sources of interference
Remote Monitoring
decreases interference by attenuating unwanted sources of interference
RF site tuning
decreases interference by attenuating unwanted sources of interference
beam steering
decreases interference by attenuating unwanted sources of interference
effective receiving sensibility
attempting to readjust the settings of the AP after a firmware upgrade
firmware
attempting to readjust the settings of the AP after a firmware upgrade
splitter
attempting to readjust the settings of the AP after a firmware upgrade
software agent
attempting to readjust the settings of the AP after a firmware upgrade
link budget
attempting to readjust the settings of the AP after a firmware upgrade
attenuator
attempting to readjust the settings of the AP after a firmware upgrade
Remote Monitoring
attempting to readjust the settings of the AP after a firmware upgrade
RF site tuning
attempting to readjust the settings of the AP after a firmware upgrade
beam steering
attempting to readjust the settings of the AP after a firmware upgrade
effective receiving sensibility
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.