adplus-dvertising
frame-decoration

Question

Which of these is not a valid Signal-Hiding Technique for Wireless networks?

a.

reducing the signal strength to the lowest level such that it still provides requisite coverage

b.

using directional antennas and signal shielding techniques

c.

installing the wireless access point away from exteriors of the building

d.

none of the mentioned

Answer: (d).none of the mentioned

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of these is not a valid Signal-Hiding Technique for Wireless networks?

Similar Questions

Discover Related MCQs

Q. Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security category?

Q. “Installation of third party applications are prohibited on many company hardware devices such as laptops, mobiles, etc.” Which Mobile Device security category of implementation does this fall under?

Q. VPN stands for –

Q. Another name for the Wireless Ethernet 802.11a is-

Q. WPA stands for –

Q. Which layer in the IEEE 802.11 protocol stack has the function of flow control and error control?

Q. With respect to IEEE 802.11 Wireless LAN, MSDU stands for-

Q. Frequency band definition and Wireless signal encoding are functions of which layer?

Q. The correct order of the of the MAC header is-

Q. CRC is a component of the MAC trailer.

Q. Reliable data delivery and Wireless access control protocols are functions of which layer?

Q. Which layer keeps track of the frames that have been transmitted and received?

Q. The smallest building block of a wireless LAN is –

Q. In an IBSS system all communications are done via access points (APs).

Q. __________ consists of two or more basic service sets interconnected by a distribution system.

Q. IEEE 802.11 defines ___________ services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.

Q. ___________ services are used to control IEEE 302.11 LAN access and confidentiality.

Q. __________ services are used to control IEEE 302.11 LAN delivery of MDSUs between stations.

Q. _________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.

Q. The _________ service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.