Wireless Signals Modulation (ENCOR/CCNP Quiz) Please enter your email: Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WebAuth WPA3 personal Open Authentication WPA2 enterprise Does open Authentication require the use of which one of the following? HTTP/HTTPS 802.1x RADIUS Pre-Shared Key None of the above When a client moves its association from one autonomous AP to another, it is actually leaving and joining which one of the following? ESS DS SSID BSS When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the WLC On the AP On the wireless client On the RADIUS server Which of the following parameters is useful for computing a client device’s location with respect to an AP? BSS RSS GPS Channel Which one of the following makes the decision for a device to roam from one AP to another? The client device The original AP The wireless LAN controller The candidate AP A client roams from controller A to controller B. If it undergoes a Layer 3 roam, which one of the following best describes the role of controller A? Host controller Foreign controller Master controller Anchor controller Which of the following is used to cache authentication key information to make roaming more efficient? EoIP CCNA PGP CCKM Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Intracontroller roaming Autonomous roaming Intercontroller roaming Indirect roaming Which of the following WPA versions is considered to have the most secure personal mode? WPA1 WPA WPA2 WPA3 Loading … Written by