A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The customer wishes to use IEEE 802.1X authentication using certificate services. Which EAP-type combinations are appropriate?
A customer brings you a previously completed site survey for the initial wireless implementation from 12 months ago. The customer currently has six access points deployed in the warehouse. The survey shows that the
installed coverage provides for a 15-percent overlap between cells at 5.5 Mbps, and a 5-percent overlap at 11
Mbps. This solution has proved to provide adequate coverage and roaming capabilities for the data applications.Why would this site survey not be adequate for a VoIP application?
When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products?
Before a Cisco Unified Wireless IP Phone 7920 can place a call, it will compare the QBSS in the beacon from the access point with the QBSS threshold on the phone. What action will the Unified Wireless IP Phone 7920 take if the QBSS threshold in the beacon is exceeded?
When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products?