A. 5 GHz equipment will not be able to penetrate through walls as well as 2.4 GHZ equipment.
B. 2.4 GHz equipment will not be able to penetrate through walls as well as 5 GHz equipment.
C. Mounting antennas near metal objects will slightly amplify the signal.
D. When determining coverage, you should begin measuring attenuation from the middle of the room.
您可能感興趣的試卷
你可能感興趣的試題
A. integrated security
B. collaborative security system
C. self provisioning
D. Adaptive Threat Defense
E. programmable security ASICs
F. Cisco lOS-based security
A. CiscoWorks Security Device Management Center (SD/MC)
B. Security Device Manager (SDM)
C. Adaptive Security Device Manager (ASDM)
D. CiscoWorks VMS/Management Center (VMS/MC)
A. BGP
B. IGRP
C. ISIS
D. OSPF
E. EIGRP
A. routers
B. LAN switches
C. PBX switches
D. TDM switches
E. appliances
A. a methodology for proactively updating equipment before it reaches the end of its life
B. a methodology for introducing new technologies
C. a methodology for creating a business plan
D. a methodology for determining total cost or ownership
最新試題
Which of these is a benefit of an integrated security management system? ()
What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()
Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()
Which of these best describes the Cisco Lifecycle Services approach? ()
Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()
At which stage of the Cisco Lifecycle Services approach would you test for system acceptance?()
At which stage of the Cisco Lifecycle Services approach should customer education presentations occur? ()
At which stage of the Cisco Lifecycle Services approach would you recommend supporting and troubleshooting the system? ()
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()