Question 6
In a WALN security, what authentication method always creates Layer2 dynamic encryption keys?
Question 7
To ease user complexity, your company has implemented a single SSID for all employees.
However, the network administrator needs a way to control the network resources that can be accessed by each employee based on their department.
What WLAN feature would allow the network administrator to accomplish this task?
Question 8
What Linux shell command can be used to view the hardware and PHY capabilities of a wireless adapter in detail including channel widths, output power settings, channels supported, and more?
Question 9
When performing a validation survey for a Multiple Channel Architecture (MCA) system in a multi- tenant building with five floors, what aspect should you, as the surveyor, keep in mind?
Question 10
Lynne runs a small hotel, and as a value added service for her customers she has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot- spots trying to take advantage of unsuspecting users. She wants to avoid this problem at her hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on her customers' wireless computers?
