Exam 200-355 | Question id=2460 | 802.11 Technology Fundamentals |
Which two algorithms are available in RRM?
A. |
coverage-hole detection | |
B. |
dynamic channel assignment | |
C. |
RSSI normalizer | |
D. |
transmitting channel expander | |
E. |
rogue detection |
Most clients enable you to associate to a detected network (broadcasted SSID) or configure a specific profile. In all cases, you must configure the network name (SSID), the operating mode (ad-hoc or infrastructure), and some security settings (that will be different depending on whether the SSID uses Pre-Shared Key Security or Enterprise [EAP/802.1x] security).