Matching
Match each item with an statement below:
Premises:
specifies information that access points need to exchange to support WLAN roaming.
verifies that the person requesting access to the network is who they claim to be.
subset of a larger network.
adds mobility components to the Fixed WiMAX standard.
original IEEE 802.11 encryption mechanism.
used circuit-switched digital networks and started in the early 1990s.
standard network management protocol for both wired and wireless networks.
restricts the traffic on a network based on specific criteria.
uses discovery tools to continuously monitor the RF for attacks
Responses:
Network segment
2G cellular telephony
Wireless authentication
Traffic filtering
IEEE 802.11F
WLAN management system
SNMP
Wired equivalent privacy (WEP)
Mobile WiMAX
Correct Answer:
Premises:
Responses:
specifies information that access points need to exchange to support WLAN roaming.
verifies that the person requesting access to the network is who they claim to be.
subset of a larger network.
adds mobility components to the Fixed WiMAX standard.
original IEEE 802.11 encryption mechanism.
used circuit-switched digital networks and started in the early 1990s.
standard network management protocol for both wired and wireless networks.
restricts the traffic on a network based on specific criteria.
uses discovery tools to continuously monitor the RF for attacks
Premises:
specifies information that access points need to exchange to support WLAN roaming.
verifies that the person requesting access to the network is who they claim to be.
subset of a larger network.
adds mobility components to the Fixed WiMAX standard.
original IEEE 802.11 encryption mechanism.
used circuit-switched digital networks and started in the early 1990s.
standard network management protocol for both wired and wireless networks.
restricts the traffic on a network based on specific criteria.
uses discovery tools to continuously monitor the RF for attacks
Responses:
Related Questions
Q32: What are the types of changes that
Q33: Known as _, it is the mechanism
Q34: Encryption under theWPA2 personal security model is
Q35: The first generation of wireless cellular telephony
Q36: The current 802.16 standard, known as _,
Q37: How does RADIUS work?
Q38: The primary difference between 2G and 2.5G
Q39: The IEEE _ standard would permit users
Q40: Why is it important to train and
Q41: What are the characteristics of 3G technology
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents