Wireless Signals Modulation (ENCOR/CCNP Quiz) Please enter your email: Which of the following WPA versions is considered to have the most secure personal mode? WPA2 WPA WPA1 WPA3 Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Intercontroller roaming Intracontroller roaming Autonomous roaming Which of the following is used to cache authentication key information to make roaming more efficient? EoIP PGP CCKM CCNA Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? Open Authentication WPA2 enterprise WebAuth WPA3 personal When a client moves its association from one autonomous AP to another, it is actually leaving and joining which one of the following? BSS DS ESS SSID Which one of the following makes the decision for a device to roam from one AP to another? The wireless LAN controller The original AP The candidate AP The client device Does open Authentication require the use of which one of the following? 802.1x None of the above HTTP/HTTPS Pre-Shared Key RADIUS When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the wireless client On the RADIUS server On the WLC On the AP A client roams from controller A to controller B. If it undergoes a Layer 3 roam, which one of the following best describes the role of controller A? Master controller Foreign controller Host controller Anchor controller Which of the following parameters is useful for computing a client device’s location with respect to an AP? RSS Channel BSS GPS Loading … Written by