최신 920-271 무료덤프 - Nortel WLAN 2300 Rls.7.0 implementation and Management
WLAN IP telephony handsets can access the WLAN through different forms of authentication/encryption. The authentication/encryption used depends on the security requirements of the network. What are possible methods of authentication and/or encryption for IP telephony handsets? (Choose two.)
정답: B,C
A signal with a strength of 200 mW leaves an access point and travels through a cable with a loss of -3 dB. Using the rule of 3s and 10s, calculate the power of the signal when it reaches the antenna.
정답: C
In a Smart Mobile Virtual Controller cluster, which WSS has a local copy of the domain configuration?
정답: B
What does the radping command do?
정답: D
Many services can be configured and used with the Wireless Security System (WSS) such as Telnet, SNMP and HTTPS. What else can be configured to work with the WSS?
정답: D