| Exam 200-355 | Question id=2460 | 802.11 Technology Fundamentals |
Which two algorithms are available in RRM?
| A. |
coverage-hole detection | |
| B. |
dynamic channel assignment | |
| C. |
RSSI normalizer | |
| D. |
transmitting channel expander | |
| E. |
rogue detection |
Most clients enable you to associate to a detected network (broadcasted SSID) or configure a specific profile. In all cases, you must configure the network name (SSID), the operating mode (ad-hoc or infrastructure), and some security settings (that will be different depending on whether the SSID uses Pre-Shared Key Security or Enterprise [EAP/802.1x] security).