|
Question 1. Which statement is true about digital signals as a receiver moves further away from the transmitter? A. The gain is higher. B. The amplitude is lower. C. The amplitude is higher. D. The delay spread increases. Answer: B Question 2. Why should you use more than one antenna on an Access Point? (Choose two.) A. The coverage area is larger. B. An Access Point cannot operate with only one antenna. C. Null zones within the coverage area are reduced or eliminated. D. Reception is better if the transmitter is at the edge of the range. Answer: C, D Question 3. Which type is ambient RF background noise? A. wideband B. sideband C. edgeband D. narrowband Answer: A Question 4. What are antennas that radiate a toroid-shaped pattern? A. broadband B. directional C. omni-directional D. multi-directional Answer: C Question 5. What is multipathing? A. radio signals being reflected, refracted, and absorbed B. a method used by wireless Access Points to correctly route traffic C. a part of the design process used to determine Access Point location D. a method used by mobile units to determine the best Access Point to associate with Answer: A Question 6. What is FHSS? A. Full Heterodyne Spread Spectrum B. Frequency Hash Streaming System C. Frequency Hopping Spread Spectrum D. Function Harmonics Spread Sequence Answer: C Question 7. Which two are characteristics of narrow band RF transmissions? (Choose two.) A. require smaller antenna radiators B. have an inherent high level of diversity C. occupy less RF space than wideband RF transmissions D. are more susceptible to interference than wideband RF transmissions Answer: C, D Question 8. What is DSSS? A. Digital Signal Stream System B. Direct Sequence Spread Spectrum C. Doppler Sending Spread Spectrum D. Designated System Spread Spectrum Answer: B Question 9. Which type of network should you use for wireless communication between a workstation and its peripherals? A. Wide Area Network (WAN) B. Local Area Network (LAN) C. Personal Area Network (PAN) D. Satellite Area Network (SAN) Answer: C Question 10. What is the width of a single channel used by FHSS systems? A. 1 MHz B. 2 MHz C. 11 MHz D. 22 MHz Answer: A
|
Question 1. Which two key tasks belong to Acceptance Testing? (Choose two.) A. Get Acceptance from the Customer for the Design and Project Plan B. Coordinate Required Customer Involvement C. Proof of Concept D. Stage Equipment E. Tune Policies Further if Needed Answer: B, E Question 2. What describes the Business Requirements Development service component in the prepare phase? A. meetings with different customer stakeholders to gather the customer's requirements for the security solution B. a process by which the partner can determine if the security solution that is being proposed matches the customer's security requirements C. the creation of a topology map for the solution and the identification of products and services that will be required to implement the solution D. a process that identifies the customer's security reporting requirements E. the creation of a model network that replicates the proposed security solution Answer: A Question 3. Which task is conducted as part of developing a detailed design for IPS or IDS? A. Identify SQL Server Requirements B. Define Sensor Maintenance Procedures C. Review LAN/WAN Configurations D. Define Configuration Database Design Answer: B Question 4. Your boss at ITCertKeys, Mrs. ITCertKeys, is curious about flow of events for a CSA policies and groups implementation. What is the correct order? Answer: Question 5. Which task is performed during the development of a detailed design for CSA? A. Determine CSA Feature and Function Design Specifications B. Define Policies and Groups C. Review and Generate an IP Addressing Scheme D. Determine Network Availability/Redundancy Specifications Answer: B Question 6. Which service component should be executed before Change Management? A. Operations Design B. Operations Setup C. Operation Assessment D. Escalation Process Answer: B Question 7. What is the first activity that is conducted in an IPS mode implementation? A. Fine Tune the Custom Policy B. Tune for False Positives C. Create a Rule from a Query D. Install the Sensor, Schedule a Network Outage Prior to the Installation Answer: D Question 8. Which two tasks are parts of the (CSA) Security System Installation? (Choose two.) A. Identify a Set of Systems That Will Be Protected in a Pilot Implementation Based upon Guidelines B. Determine CSA Feature and Function Design Specifications C. Identify SQL Server Requirements D. Ensure Specified CSA Network Connectivity Requirements Are Met Answer: A, D Question 9. Which resource is most often used during the Detailed Design Development: Feature/Functionality Design Development? A. Site Survey B. Acceptance Test Plan C. Product Configuration Checklist D. System Readiness Assessment Report E. Business Requirements Document Answer: C Question 10. For a security solution, which task is associated with the Business Requirements Development service component in the prepare phase? A. Review Security Alerts and Notification Requirements B. Document Current Topology, Hardware and Software C. Document System Level Functionality D. Analyze the Security Solution Integration Requirements with Existing Legacy Platforms E. Assess Technical Requirements for the Proposed Security Solution Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.