More cards in this set

Card 6

Front

How do wireless network adapters allow for?

Back

Preview of the front of card 6

Card 7

Front

What is a wireless repeater used for?

Back

Preview of the front of card 7

Card 8

Front

What are wireless encryption standards used for?

Back

Preview of the front of card 8

Card 9

Front

Why is a wired equivalent privacy unsecure?

Back

Preview of the front of card 9

Card 10

Front

What is the newer version of WPA which offers excellent security?

Back

Preview of the front of card 10

Card 11

Front

What does a wireless bridge connect?

Back

Preview of the front of card 11

Card 12

Front

Where does RFI interference come from?

Back

Preview of the front of card 12

Card 13

Front

What mode is being used if the base unit is configured with a SSID?

Back

Preview of the front of card 13

Card 14

Front

When the client wants to connect to the WAP how can it be identified?

Back

Preview of the front of card 14

Card 15

Front

What are 3 of the 6 best practices for configuring wireless security?

Back

Preview of the front of card 15