SlideShare a Scribd company logo
1) What type of WLAN security is used to protect data transmissions?
A) 802.X/TKIP
B) 802.X/EAP
C) IPsec
2) What are some of the security capabilities you would not typically find in an enterprise
WLAN router that is deployed in remote branch locations? (Choose all that apply.)
A) Integrated WIPS server
B) Integrated VPN client
C) Integrated Firewall
3) Of the protocols listed, which one should be avoided when managing WLAN infrastructure
devices remotely?
A) SSH
B) HTTPS
C) Telnet
D) HTTP
4) Which protocol listed below is often used to restrict user traffic to specific endpoints?
A) DTLS
B) GRE
C) CAPWAP
D) SNMP
5) What layers of the OSI model receive no encryption when using an IPsec VPN security
solution?
A) Layer 7
B) Layer 2
C) Layer 6
D) Layer 1

More Related Content

More from leelaelec

More from leelaelec (20)

1) The monogastric animal's stomach is divided into four major areas t.pdf
1) The monogastric animal's stomach is divided into four major areas t.pdf1) The monogastric animal's stomach is divided into four major areas t.pdf
1) The monogastric animal's stomach is divided into four major areas t.pdf
 
1) Set the text color to navy- for all elements- 2) Set the text color.pdf
1) Set the text color to navy- for all elements- 2) Set the text color.pdf1) Set the text color to navy- for all elements- 2) Set the text color.pdf
1) Set the text color to navy- for all elements- 2) Set the text color.pdf
 
1) Platt Corporation paid $87-500 for a 70- interest in Suve Corporati.pdf
1) Platt Corporation paid $87-500 for a 70- interest in Suve Corporati.pdf1) Platt Corporation paid $87-500 for a 70- interest in Suve Corporati.pdf
1) Platt Corporation paid $87-500 for a 70- interest in Suve Corporati.pdf
 
1) Solve the generalized eigenvalue problem- Reference from 114- - c.pdf
1) Solve the generalized eigenvalue problem-   Reference from 114- - c.pdf1) Solve the generalized eigenvalue problem-   Reference from 114- - c.pdf
1) Solve the generalized eigenvalue problem- Reference from 114- - c.pdf
 
1) Please share an experience that you have working with individuals f.pdf
1) Please share an experience that you have working with individuals f.pdf1) Please share an experience that you have working with individuals f.pdf
1) Please share an experience that you have working with individuals f.pdf
 
1) How do fossils help geologists determine ages of rocks- 2) Why is r.pdf
1) How do fossils help geologists determine ages of rocks- 2) Why is r.pdf1) How do fossils help geologists determine ages of rocks- 2) Why is r.pdf
1) How do fossils help geologists determine ages of rocks- 2) Why is r.pdf
 
1) Income from an employment may be the only source for some individua.pdf
1) Income from an employment may be the only source for some individua.pdf1) Income from an employment may be the only source for some individua.pdf
1) Income from an employment may be the only source for some individua.pdf
 
1) Grant Hill discusses the challenge teams have to get younger fans o.pdf
1) Grant Hill discusses the challenge teams have to get younger fans o.pdf1) Grant Hill discusses the challenge teams have to get younger fans o.pdf
1) Grant Hill discusses the challenge teams have to get younger fans o.pdf
 
1) For the purpose of Cost-Saving- your organization is planning to mo.pdf
1) For the purpose of Cost-Saving- your organization is planning to mo.pdf1) For the purpose of Cost-Saving- your organization is planning to mo.pdf
1) For the purpose of Cost-Saving- your organization is planning to mo.pdf
 
1 Explore the extracted files and search for interesting information-.pdf
1 Explore the extracted files and search for interesting information-.pdf1 Explore the extracted files and search for interesting information-.pdf
1 Explore the extracted files and search for interesting information-.pdf
 
1) Explain the different types of firewalls- 2) How is a firewall diff.pdf
1) Explain the different types of firewalls- 2) How is a firewall diff.pdf1) Explain the different types of firewalls- 2) How is a firewall diff.pdf
1) Explain the different types of firewalls- 2) How is a firewall diff.pdf
 
1) General transcription factors function to activate gene expression.pdf
1) General transcription factors function to activate gene expression.pdf1) General transcription factors function to activate gene expression.pdf
1) General transcription factors function to activate gene expression.pdf
 
1) describe what a function is and how it can be used- 2) describe th.pdf
1) describe what a function is and how it can be used-  2) describe th.pdf1) describe what a function is and how it can be used-  2) describe th.pdf
1) describe what a function is and how it can be used- 2) describe th.pdf
 
1) Define the term Market Potential- and why is it an important to a f.pdf
1) Define the term Market Potential- and why is it an important to a f.pdf1) Define the term Market Potential- and why is it an important to a f.pdf
1) Define the term Market Potential- and why is it an important to a f.pdf
 
1) Explain the impact technology has on control- 2) Do you believe tha.pdf
1) Explain the impact technology has on control- 2) Do you believe tha.pdf1) Explain the impact technology has on control- 2) Do you believe tha.pdf
1) Explain the impact technology has on control- 2) Do you believe tha.pdf
 
1) Discuss various theories of financing a public transport infrastruc.pdf
1) Discuss various theories of financing a public transport infrastruc.pdf1) Discuss various theories of financing a public transport infrastruc.pdf
1) Discuss various theories of financing a public transport infrastruc.pdf
 
1 The United States is considered a net debtor nation- a net creditor.pdf
1 The United States is considered a net debtor nation- a net creditor.pdf1 The United States is considered a net debtor nation- a net creditor.pdf
1 The United States is considered a net debtor nation- a net creditor.pdf
 
1) Compare and contrast the leadership traits discussed in the TedTalk.pdf
1) Compare and contrast the leadership traits discussed in the TedTalk.pdf1) Compare and contrast the leadership traits discussed in the TedTalk.pdf
1) Compare and contrast the leadership traits discussed in the TedTalk.pdf
 
1) Create table RoomReservation for hotel management system a- Assume.pdf
1) Create table RoomReservation for hotel management system a- Assume.pdf1) Create table RoomReservation for hotel management system a- Assume.pdf
1) Create table RoomReservation for hotel management system a- Assume.pdf
 
1) Create a SAGE function PI(n) prints all prime numbers below n- 2) C.pdf
1) Create a SAGE function PI(n) prints all prime numbers below n- 2) C.pdf1) Create a SAGE function PI(n) prints all prime numbers below n- 2) C.pdf
1) Create a SAGE function PI(n) prints all prime numbers below n- 2) C.pdf
 

Recently uploaded

Recently uploaded (20)

Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 

1) What type of WLAN security is used to protect data transmissions- A.pdf

  • 1. 1) What type of WLAN security is used to protect data transmissions? A) 802.X/TKIP B) 802.X/EAP C) IPsec 2) What are some of the security capabilities you would not typically find in an enterprise WLAN router that is deployed in remote branch locations? (Choose all that apply.) A) Integrated WIPS server B) Integrated VPN client C) Integrated Firewall 3) Of the protocols listed, which one should be avoided when managing WLAN infrastructure devices remotely? A) SSH B) HTTPS C) Telnet D) HTTP 4) Which protocol listed below is often used to restrict user traffic to specific endpoints? A) DTLS B) GRE C) CAPWAP D) SNMP 5) What layers of the OSI model receive no encryption when using an IPsec VPN security solution? A) Layer 7 B) Layer 2 C) Layer 6