You are creating documentation for a new wireless solution that is deployed in the organization. Why is it important to document APIs in use within the system?
You must ensure proper security controls are in place for a wireless solution. The solution allows for the use of groups to grant access to resources and capabilities. What is the term used to describe a situation where an individual is granted more access than required because of inclusion in a group?
In a wireless link, as the signal strength decreases, what else may decrease?
You are planning a wireless implementation. At what point should you begin to consider security requirements for the implementation?
As an RF signal propagates it becomes weaker at any given measurement point as it gets farther away from the transmitter. What concept is described?
You are defining capacity for a wireless solution. What is the most important factor related to each use case defined in relation to capacity?
What statement best describes the difference between authentication and authorization?