6.5 Flashcards

1
Q

Hold information about protocol and use the type of frame being transmitted with a frame is part of a larger fragmented packet it was the frame is one that was a real issue after an unverified delivery times. It’s two bites in length this is known as

A

Frame control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

 This field may indicate how long is Fields transmission will take Other nodes will know when it will be available again, two bites long

A

Duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

6 Bites longsource address

A

Address one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Six bites long transmitter address

A

Address to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Six bites long receiver address

A

Address three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two bites long indicate how large a package fragmented

A

Sequence control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Six bites long destination address

A

Address for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Up to 2312 bites, includes the data originally sent by the source host plus headers from higher layers

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Six bites long uses a silicone code to check for errors in transmission

A

Frame check sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hey – – – – – assesses client requirements, facility characteristics, and coverage areas the resulting – – – – – – report will help you determine an access point arrangements so unsure reliable wireless connectivity within given areas

A

Site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Study building blueprints to identify potential obstacles, clarify the distances your network needs to spend on each floor and anticipate wireless demand The tend to occupy each floor during the dash – – –

A

Course of business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Users or network technicians install a specific app called an agents on the users device what is the voice is a smart phone laptop or tablet just gives the device trusted access to certain portions of the network. Access to email services file sharing services in certain network administrative features might all be controlled by the device information levels enabled by – – – – – that device

A

On boarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The reverse procedure involves removing the agent for security purposes network administrators need a feature that will allow them to do this remotely and the kings devices lost or stolen

A

Off boarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On boarding and off boarding policies or especially critical in a – – – – environment where IT staff motion sure the safety of the net work while allowing access by a wide range of employee on devices using Netwerk resources

A

BYOD Genie weenie little shriveled short dick bitches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This allows for wireless client to log on to the net work either by providing correct password for the SS ID or by providing user credentials that might be processed by – – – – server

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly