A. 5 GHz equipment will not be able to penetrate through walls as well as 2.4 GHZ equipment.
B. 2.4 GHz equipment will not be able to penetrate through walls as well as 5 GHz equipment.
C. Mounting antennas near metal objects will slightly amplify the signal.
D. When determining coverage, you should begin measuring attenuation from the middle of the room.
您可能感興趣的試卷
你可能感興趣的試題
A. integrated security
B. collaborative security system
C. self provisioning
D. Adaptive Threat Defense
E. programmable security ASICs
F. Cisco lOS-based security
A. CiscoWorks Security Device Management Center (SD/MC)
B. Security Device Manager (SDM)
C. Adaptive Security Device Manager (ASDM)
D. CiscoWorks VMS/Management Center (VMS/MC)
A. BGP
B. IGRP
C. ISIS
D. OSPF
E. EIGRP
A. routers
B. LAN switches
C. PBX switches
D. TDM switches
E. appliances
A. a methodology for proactively updating equipment before it reaches the end of its life
B. a methodology for introducing new technologies
C. a methodology for creating a business plan
D. a methodology for determining total cost or ownership
最新試題
Which component of Cisco ASDM provides administrators with a complete system overview and device health statistics at a glance?()
Which two of these statements best describe fast secure roaming? (Choose two.)()
What is the purpose of the Dynamic Configuration Tool? ()
A Cisco Catalyst switch can belong to how many VTP domains? ()
What is one thing you should be aware of when conducting a wireless site survey?()
Which of these is a benefit of an integrated security management system? ()
Which two of these statements best describe the benefits of WPAv1? ()
A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)()