Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the primary difference between 802.11g and 802.11a?



What is the primary difference between 802.11g and 802.11a?..

Answer / chaitanya

802.11g operates in the 2.4 GHz frequency range, as do 802.11b and 802.11i, whereas 802.11a operates in the 5 GHz frequency range.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More WiFi Security Interview Questions

how can i see the security information of my wifi provider in my command prompt?

0 Answers   Cap Gemini,


What is the difference between the HostAP drivers and the wlan-ng drivers for Linux?

1 Answers  


What is the primary difference between 802.11g and 802.11a?

1 Answers  


How many types of Extensible Authentication Protocols (EAPs) are supported by WPA/WPA2 and what are they?

1 Answers  


Who determines the wireless standards?

1 Answers  


What is the difference between active and passive WLAN detection?

1 Answers  


How to hack the wifi password ?

1 Answers  


Why should not the user close the popup control window which appears after the authentication with the CaptivePortal?

1 Answers  


I have a Wi-Fi network and would like to protect it from unauthorized access. It is better to use a RADIUS server that allows me to have 802.1x authentication and protection with WPA or WPA2 or use a Captive Portal that authenticates access via web login?

1 Answers  


Briefly describe the process involved in cracking WEP.

1 Answers  


Captive gateways can work in Routed Mode or in Bridged Mode. What does that mean?

1 Answers  


Should an impostor capture the authenticator on the network and, without decrypting it, sends it as is to the captive gateway, could he or she obtain illegal access to the network?

1 Answers  


Categories