Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please give the best answers for the questions below some might need multiple answers Question 18 5 points Save Answ From the following statements, select

Please give the best answers for the questions below some might need multiple answers image text in transcribed
image text in transcribed
image text in transcribed
Question 18 5 points Save Answ From the following statements, select all that correctly describe types of Ethemet protocols. Data rate of 1Gbps can be supported on a 1000Base-T cable used to connect two computers even if the cable length exceods 1000 meters 1000Base-T is a type of Ethernet that uses 2 pairs of twisted-pair cables and the maximum data rate that is supported on each cable is 250Mbps 1000Base-F is a type of Ethernet designed to tranamit data over fber-optic cables in half-duplex or full-duplex transmission. 1000Base-F is a type of Ethernet designed to transmit data over fber-optio cables only in half-duplex transmission. 1000Base-T is a type of Ethernet that uses 4 pairs of twisted-pair cables Question 19 5 points Save Answer From the following statements, select all that correctly describe the various Wireless Local Area Network (WLAN) protocols that are based on the IEEE 802.11 standards, commonly known as Wi-Fi O There are four versions of the 802.11ac protocol. OAll Wi-Fi WLAN protocols are backward compatible. O The 802.1In WLAN protocol has a greater maximum range than does the 802.11g WLAN protocol. O The 802.1In protocol provides three channels of 450 Mbps cach that are designated as channels 1, 2 and 3. O The development of new devices that adhere to the 802.11a protocol is discontinued Question20 5 points Save Answer From the following statements, select all that correctly describe Wireless Local Area network (WLAN) security a Wired Equivalent Privacy (WEP) has a number of weaknesses that allow a determined hacker to break into a WLAN that uses only WEP security. Ob. The practice of walking or driving around and using hardware and software tools to discover WLAN signals is often referred to as wardriving. Oc. The only difference between Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) is that the WPA key is longer than the WEP key Od. Wi-Fi Protected Access 2 (WPA2) uses the Advanced Eneryption Standard (AES) Oe MAC Address Filtering offers the greatest security for a WLAN

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 15th International Conference Dasfaa 2010 Tsukuba Japan April 2010 Proceedings Part 1 Lncs 5981

Authors: Hiroyuki Kitagawa ,Yoshiharu Ishikawa ,Wenjie Li ,Chiemi Watanabe

2010th Edition

3642120253, 978-3642120251

Students also viewed these Databases questions

Question

Apply task-related tactics for effective team play.

Answered: 1 week ago