Nortel-WLAN-2300-Rls-6-0-Planning-and-Engineering-(920-258).pdf - Nortel 920-258 Nortel WLAN 2300 Rls.6.0 Planning and Engineering

Nortel-WLAN-2300-Rls-6-0-Planning-and-Engineering-(920-258).pdf

This preview shows page 1 - 3 out of 4 pages.

920-258 Nortel Nortel WLAN 2300 Rls.6.0 Planning and Engineering
Image of page 1
Answer: D QUESTION:51 The WLAN 2300 series uses various robust security methods such as the Wi-Fi Protected Access (WPA) security method. Which statement about WPA is true? A. It uses TKIP for encryption. B. User verification is required. C. User authentication occurs after data encryption. D. Data encryption occurs after user authentication. Answer:A QUESTION:52 A large lumberyard operation has an existing wired network with subnets in the business office and showroom. They wish to extend wireless access to the storage yard. There are a number of mobile users who move to and from the business office, showroom, and storage yard areas with customers. Which WLAN mode of operation is best suited to these mobile users?
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 4 pages?

  • Fall '16
  • Mohammad Alizadeh
  • Wi-Fi, Wireless access point, IEEE 802.11, Wired Equivalent Privacy, Extensible Authentication Protocol, Protected Extensible Authentication Protocol

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture