|
Question 1. Which authentication method can be combined with any other supplemental authentication method? A. preshared keys B. MAC authentication C. 802.1X authentication D. Extensible Authentication Protocol (EAP) Answer: B Question 2. Your network features a full public key infrastructure (PKI) with digital certificates for users and workstations, as well as for servers. You are now adding a wireless LAN (WLAN) that implements 802.1X authentication with Extensible Authentication Protocol (EAP). Which EAP method should you select for the highest security? A. Protected EAP (PEAP) B. EAP-Tunneled TLS (TTLS) C. EAP-Message Digest 5 (MD5) D. EAP-Transport Layer Security (TLS) Answer: D Question 3. Your company uses Wi-Fi Protected Access (WPA) encryption. Where is traffic encrypted? A. over wireless bridges only B. over the wired network only C. over the wireless network only D. over the wireless and wired network Answer: C Question 4. Match the encryption method to the security standard. Drag and drop the boxes on the right to the left and match the description to the security option. Answer: Question 5. Your company wants to implement the highest security authentication possible without installing certificates on each user's station. Which Extensible Authentication Protocol (EAP) method should you choose? A. EAP-Message Digest 5 (MD5) B. EAP-Transport Layer Security (TLS) C. Protected EAP (PEAP) MS-CHAPv2 D. EAP-Subscriber Identity Module (SIM) Answer: C Question 6. You are providing consulting services to a bookstore that wants to set up a wireless network to provide complimentary Internet access. Which security option should you choose to provide the widest support for customers who bring their own equipment? A. Web authentication (Web-Auth) B. MAC authentication (MAC-Auth) C. dynamic Wired Equivalent Privacy (WEP) D. Wi-Fi Protected Access (WPA) with preshared keys (PSK) Answer: A Question 7. Which action does an 802.1X authenticator take if its Extensible Authentication Protocol (EAP) messages to the supplicant time out? A. keeps the port closed B. opens the port, by default C. contacts the authentication server D. sends a wake-up message to the supplicant Answer: A Question 8. Which mechanisms are part of the 802.11h standard? (Select two.) A. fast roaming for 802.1X B. Transmit Power Control (TPC) C. Inter-Access Point Protocol (IAPP) D. fast roaming for Voice over IP (VoIP) E. Dynamic Frequency Selection (DFS) F. Quality of Service (QoS) for wireless stations Answer: B, E Question 9. A station is configured for passive scanning. Which statement describes its behavior? A. The station sends probe requests on only one channel. B. The station sends probe requests on all supported channels. C. The station listens for beacon frames from any access point (AP) within range. D. The station listens only for beacon frames for previously-accessed wireless LANs (WLANs). Answer: C Question 10. Which mode allows you to connect two wired networks through a wireless connection? A. in-cell relay mode B. internetwork mode C. peer-to-peer mode D. infrastructure mode Answer: A Question 11. Which type of message does a Radio Port (RP) transmit so that a ProCurve Wireless Edge Services xl Module can detect it on the network? A. Inter-Access Point Protocol (IAPP) B. Address Resolution Protocol (ARP) C. Link Layer Discovery Protocol (LLDP) D. Internet Control Message Protocol (ICMP) Answer: C
|
Question 1. Under optimal conditions, active RFID tags operating at 303.8MHz or 433.92MHz can be read at: A. less than 9.7 feet (3 meters). B. more than 322.6 feet (100 meters). C. more than 10 miles (16 kilometers). D. less than 6 inches (15 centimeters). Answer: B Question 2. High frequency (HF) output power is BEST measured as: A. decibels per meter. B. dBm. C. Effective Radiated Power (ERP). D. Effective Isotropic Radiated Power (EIRP). Answer: B Question 3. When firmware upgrades become available, which of the following should the technician consider FIRST? A. The benefits of new upgrade. B. When to schedule the upgrade. C. Whether the upgrade can be downloaded from the internet. D. How to install the upgrade. Answer: A Question 4. Based on the diagram below, at which of the following numbered locations should antennas be placed to read tags on six sides of an RF-opaque carton? (Select TWO). A. 2, 3, 4, 5 B. 2, 3, 8, 9 C. 3, 5, 8, 9 D. 2, 4, 8, 9 Answer: C, D Question 5. When installing a passive ultra high frequency (UHF) system that will read tags on consistently oriented cases as they move past an interrogator on a conveyor system, which of the following types of antenna would provide the BEST results? A. Circularly polarized B. Yagi C. Whip D. Linearly polarized Answer: D Question 6. RFID labels that were being printed correctly are now being printed with half the image area across two labels and the tags cannot be validated. Which of the following should the technician check FIRST? A. Communications protocol B. Print drivers C. Sensor settings D. Printer speed Answer: C Question 7. Which of the following is an attribute of an inductively coupled system [e.g. low frequency (LF), high frequency (HF)] that a capacitively coupled [e.g. ultra high frequency (UHF), uW] system does not have? A. Capacitive power circuitry. B. Inductive dipole antenna. C. Inductive coil antenna. D. Capacitive material in which to store power. Answer: C Question 8. A customer has an RFID system to sort packages by their destination in real time. When first installed, the system worked properly but now most packages are not going to the correct destination. Which of the following BEST describes the cause of this problem? A. The customer is using a bad batch of tags. B. Interrogator output power has degraded over time. C. There are increased losses in the antenna cabling. D. Sensors that control the interrogator were repositioned. Answer: D Question 9. Within an office environment, a property manager must place an RFID tag on all assets with a value of greater than $100. The tags must cost less than $10 each; be able to store a maximum of one kilobit of data and read with a portable interrogator. When performing inventory, the manager is unable to move the assets to interrogate the tags. The RFID tags used should be applied to the front of the asset with an adhesive strong enough to prevent tag removal and be: A. a Surface Acoustic Wave (SAW) tag. B. a passive Class 0 tag. C. a passive13.56 MHz tag. D. an active Class 1 Gen 2 tag. Answer: C Question 10. When using an RFID enabled printer to encode tags as they are being printed, which of the following determines the data being encoded? A. The printer is encoding in a sequence guaranteeing unique data on each tag. B. The software generating the print job. C. The printer's firmware. D. RFID enabled printers cannot encode RFID tags. Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.