Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "2B0-015" Exam

Good Dump from Itcertkeys

 Question 1.
Which of the following is NOT a feature of the Roam About Client Utility?

A. Monitor the amount of collisions in the wireless network before enabling the RTS/CTS Protocol
B. Monitor SNR levels and signal and noise levels
C. Monitor the wireless performance of the client Roam About 802.11b PC Card
D. View and modify the configuration on the Roam About 802.11b PC Card

Answer: A

Question 2.
IEEE 802.11 stipulates the use of which security measure to make the wireless network at least as secure as a normal wired LAN?

A. Host key generation
B. WEP Encryption
C. 802.1X Authentication
D. A lockable security box for the Access Point

Answer: B

Question 3.
What must be configured before an Access Point can be successfully upgraded via the console?

A. Wireless Network Parameters
B. Image files
C. TFTP/BootP server
D. The "Reset to Factory Defaults" parameter

Answer: C

Question 4.
Where would you look to find what MIBs are supported on the Roam About Access Points?

A. Firmware release notes
B. Guide to Wireless LANs
C. The Help file in your NMS
D. In the device .cfg file

Answer: A

Question 5.
What is a wireless device called when its transmissions cannot be sensed by another wireless device or devices in the network?

A. Hidden Client
B. Hidden Station
C. Rogue Client
D. Rogue Station

Answer: B

Question 6.
What does the Roam About employ, by default, to confirm successful frame delivery?

A. The receiving station sends a MAC level acknowledgement
B. Resolution by upper layer protocols (i.e., TCP) at the sending station
C. The sending station sends a source frame to verify delivery
D. There is no method of ensuring successful delivery

Answer: A

Question 7.
What media access method does the Roam About use?

A. CSMA/CD
B. Beacon exchange
C. Binary Sequential Back off
D. CSMA/CA

Answer: D

Question 8.
Which of the following does NOT affect the size of a cell?

A. Network utilization
B. Radio frequency noise
C. Transmit speeds
D. Humidity

Answer: D

Question 9.
Which of the following does NOT affect the size of a cell?

A. Network utilization
B. Radio frequency noise
C. Transmit speeds
D. Humidity

Answer: D

Question 10.
For Rapid Rekeying to be employed, what must be enabled and configured on the Access Point?

A. Secure Shell
B. 802.1X Authentication
C. Dynamic Key Distribution
D. User Personalized Networking

Answer: B

Question 11.
When configuring LAN-to-LAN Endpoint, which of the following do you need?

A. Wired MAC Address of the remote Access Point
B. Wireless MAC Address of the remote Access Point
C. IP Address of the remote Access Point
D. Different channels configured on both Access Points

Answer: B

Question 12.
To upgrade firmware and Boot ROMs, go to which window in AP Manager?

A. Filtering
B. Hardware
C. Reload
D. Discover

Answer: C

Question 13.
IEEE 802.11 stipulates the use of which security measure to make the wireless network at least as secure as a normal wired LAN?

A. Host key generation
B. WEP Encryption
C. 802.1X Authentication
D. A lockable security box for the Access Point

Answer: B

Question 14.
With Secure Access enabled on an AP with an IEEE 802.11b PC Card installed, which of the following is true?

A. The AP allows access to wireless clients that use "ANY" as the wireless network name
B. The AP allows access to wireless clients that leave the wireless network name configuration 
     blank
C. The AP denies access to wireless clients that do not provide the proper access password
D. The AP denies access to wireless clients that do not use the correct wireless network name

Answer: D

Question 15.
Ad Hoc Mode is an example of which wireless topology?

A. EESS? External Extended Service Set
B. BSS? Basic Service Set
C. IBSS? Independent Basic Service Set
D. ESS? Extended Service Set

Answer: C

Question 16.
When should an Upline Dump be enabled for the AP 2000?

A. When configuring the AP for an upgrade to its firmware
B. When troubleshooting a poor SNR
C. When copying configurations from one AP to another
D. When requested by a Roam About service representative

Answer: D

Question 17.
How can you tell whether or not you are in a secure web management session?

A. The web address begins with https://
B. A "Secure Web" banner is displayed
C. A different password is required for access
D. There is no way to tell

Answer: A

Question 18.
When configuring LAN-to-LAN Endpoint, which of the following do you need?

A. Wired MAC Address of the remote Access Point
B. Wireless MAC Address of the remote Access Point
C. IP Address of the remote Access Point
D. Different channels configured on both Access Points

Answer: B

Question 19.
Which AP Manager utility is used during LAN-to-LAN installations to determine signal strength?

A. Authentication
B. Link test
C. Integrity Check
D. Site Monitor

Answer: B

Question 20.
Ad Hoc Mode is an example of which wireless topology?

A. EESS? External Extended Service Set
B. BSS? Basic Service Set
C. IBSS? Independent Basic Service Set
D. ESS? Extended Service Set

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for RF0-001 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "RF0-001" Exam

RFID+ Certification Exam

 Question 1.
Under optimal conditions, active RFID tags operating at 303.8MHz or 433.92MHz can be read at:

A. less than 9.7 feet (3 meters).
B. more than 322.6 feet (100 meters).
C. more than 10 miles (16 kilometers).
D. less than 6 inches (15 centimeters).

Answer: B

Question 2.
High frequency (HF) output power is BEST measured as:

A. decibels per meter.
B. dBm.
C. Effective Radiated Power (ERP).
D. Effective Isotropic Radiated Power (EIRP).

Answer: B

Question 3.
When firmware upgrades become available, which of the following should the technician consider FIRST?

A. The benefits of new upgrade.
B. When to schedule the upgrade.
C. Whether the upgrade can be downloaded from the internet.
D. How to install the upgrade.

Answer: A

Question 4.
Based on the diagram below, at which of the following numbered locations should antennas be placed to read tags on six sides of an RF-opaque carton? (Select TWO).

A. 2, 3, 4, 5
B. 2, 3, 8, 9
C. 3, 5, 8, 9
D. 2, 4, 8, 9

Answer: C, D

Question 5.
When installing a passive ultra high frequency (UHF) system that will read tags on consistently oriented cases as they move past an interrogator on a conveyor system, which of the following types of antenna would provide the BEST results?

A. Circularly polarized
B. Yagi
C. Whip
D. Linearly polarized

Answer: D

Question 6.
RFID labels that were being printed correctly are now being printed with half the image area across two labels and the tags cannot be validated. 

Which of the following should the technician check FIRST?

A. Communications protocol
B. Print drivers
C. Sensor settings
D. Printer speed

Answer: C

Question 7.
Which of the following is an attribute of an inductively coupled system [e.g. low frequency (LF), high frequency (HF)] that a capacitively coupled [e.g. ultra high frequency (UHF), uW] system does not have?

A. Capacitive power circuitry.
B. Inductive dipole antenna.
C. Inductive coil antenna.
D. Capacitive material in which to store power.

Answer: C

Question 8.
A customer has an RFID system to sort packages by their destination in real time. When first installed, the system worked properly but now most packages are not going to the correct destination. 

Which of the following BEST describes the cause of this problem?

A. The customer is using a bad batch of tags.
B. Interrogator output power has degraded over time.
C. There are increased losses in the antenna cabling.
D. Sensors that control the interrogator were repositioned.

Answer: D

Question 9.
Within an office environment, a property manager must place an RFID tag on all assets with a value of greater than $100. The tags must cost less than $10 each; be able to store a maximum of one kilobit of data and read with a portable interrogator. When performing inventory, the manager is unable to move the assets to interrogate the tags. The RFID tags used should be applied to the front of the asset with an adhesive strong enough to prevent tag removal and be:

A. a Surface Acoustic Wave (SAW) tag.
B. a passive Class 0 tag.
C. a passive13.56 MHz tag.
D. an active Class 1 Gen 2 tag.

Answer: C

Question 10.
When using an RFID enabled printer to encode tags as they are being printed, which of the following determines the data being encoded?

A. The printer is encoding in a sequence guaranteeing unique data on each tag.
B. The software generating the print job.
C. The printer's firmware.
D. RFID enabled printers cannot encode RFID tags.

Answer: B

Question 11.
After viewing a site diagram, it is observed that the location of one of the interrogation zones is bisected by a steel door. 

Which of the following problems could this cause?

A. Having steel doors amplifies the interrogator signal.
B. Tags on the other side of the closed door would be read more than once.
C. If the door is closed, the interrogation area is reduced by one-half.
D. With the doors closed, the signal strength would overload the interrogator.

Answer: C



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.