单选题A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()AThe client does not support 802.11nBIncorrect frequency on the client is being usedCIncorrect encryption on the APDThe client distance from the AP

单选题
A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()
A

The client does not support 802.11n

B

Incorrect frequency on the client is being used

C

Incorrect encryption on the AP

D

The client distance from the AP


参考解析

解析: 暂无解析

相关考题:

单选题Which of the following cables is the MOST susceptible to interference?()AFiberBCoaxCUTPDSTP

单选题Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()ABaselinesBRegulationsCLogical network diagramsDWiring schematics

单选题Which of the following is a multifunction device in a SOHO network?()ABandwidth shaperBProxy serverCWireless routerDLoad balancer

单选题Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()ANetwork managementBProtocol analyzerCNetwork monitoringDSystem diagnostic

单选题Which of the following uses PKI?()ABlowfishBAESCPGPD3DES

单选题Which of the following ports is the default telnet port?()A20B21C22D23

单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()AWEPBPort filteringCWPADLonger SSID broadcast intervals

单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()AMulticastBUnicastCBroadcastDPeer-to-peer

单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()ASecure VPNBMAC filteringCIP filteringDStatic IP addresses