CWNA Take this one 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

The OSI model consists of how many layers? A. Four B. Six C. Seven D. Nine

Seven The OSI model is sometimes referred to as the seven-layer model.

A wave is divided into degrees. How many degrees make up a complete wave? A. 100 B. 180 C. 212 D. 360

360 A wave is divided into 360 degrees.

802.11ac VHT radios are backward compatible with which IEEE 802.11 radios? A. 802.11 legacy (FHSS) radios B. 802.11g (ERP) radios C. 802.11 legacy (DSSS) radios D. 802.11b (HR-DSSS) radios E. 802.11a (OFDM) radios F. 2.4 GHz 802.11n (HT) radios G. 5 GHz 802.11n (HT) radios H. None of the above

802.11a (OFDM) radios 5 GHz 802.11n (HT) radios 802.11ac (VHT) radios transmit in the 5 GHz U-NII bands and are not compatible with 2.4 GHz radios, such as 802.11 legacy (FHSS) radios, 802.11 legacy (DSSS) radios, 802.11b (HR-DSSS) radios, 802.11g (ERP) radios, or 802.11n radios, which transmit in the 2.4 GHz ISM frequency band. 802.11ac (VHT) radios are backward compatible with 5 GHz 802.11n (HT) radios and 802.11a (OFDM) radios.

What are some of the methods used to reduce MAC layer overhead, as defined by the 802.11n-2009 amendment? (Choose all that apply.) A. A-MSDU B. A-MPDU C. MCS D. PPDU E. MSDU

A-MSDU A-MPDU The 802.11n-2009 amendment introduced two new methods of frame aggregation to help reduce the overhead. Frame aggregation is a method of com-bining multiple frames into a single frame transmis-sion. The first method of frame aggregation is known as an aggregate MAC service data unit (A-MSDU). The second method of frame aggregation is known as an aggregate MAC protocol data unit (A-MPDU).

What can be delivered over-the-air to WLAN mobile devices, such as tablets and smartphones, when a mobile device management (MDM) solution is deployed? A. Configuration settings B. Applications C. Certificates D. Web clips E. All of the above

All of the above Mobile device management (MDM) solutions can be used for both a company-issued device (CID) and a bring your own device (BYOD), which is owned by an employee. MDM solutions offer the capability of over-the-air installation and distribution of security certificates, web clips, applications, and configuration settings.

802.11 wireless bridge links are typically associated with which network architecture layer? A. Core B. Distribution C. Access D. Network

Distribution 802.11 wireless bridge links are typically used to perform distribution layer services. Core layer devices are usually much faster than 802.11 wireless devices, and bridges are not used to provide access layer services. The Network layer is a layer of the OSI model, not a network architecture layer.

Which of the following wireless communications parameters and usage are typically governed by a local regulatory authority? (Choose all that apply.) A. Frequency B. Bandwidth C. Maximum transmit power D. Maximum EIRP E. Indoor/outdoor usage

Frequency Bandwidth Maximum transmit power Maximum EIRP Indoor/outdoor usage All of these are typically regulated by the local or regional radio frequency (RF) regulatory authority.

The 802.11-2016 standard was created by which organization? A. IEEE B. OSI C. ISO D. Wi-Fi Alliance E. FCC

IEEE The Institute of Electrical and Electronics Engineers (IEEE) is responsible for the creation of all of the 802 standards.

What are the advantages of using unlicensed frequency bands for RF transmissions? (Choose all that apply.) A. There are no governmental regulations. B. There is no additional financial cost. C. Anyone can use the frequency band. D. There are no rules.

There is no additional financial cost. Anyone can use the frequency band. The main advantages of an unlicensed frequency are that permission to transmit on the frequency is free and that anyone can use the unlicensed frequency. Although there are no additional financial costs, you still must abide by transmission regulations and other restrictions. The fact that anyone can use the frequency band is also a disadvantage because of overcrowding.

How many modulation and coding schemes (MCSs) are defined by the 802.11ac-2013 amendment? A. 10 B. 100 C. 7 D. 77 E. 22

10 The 802.11n-2009 amendment defined 77 modula-tion and coding schemes (MCSs). The 802.11ac-2013 amendment lowers the number to 10. The 802.11ac da-ta rates are determined by the number of spatial streams, the channel width, the guard interval, and which one of the 10 MCSs is used.

A bridge transmits at 10 mW. The cable to the antenna produces a loss of 3 dB, and the antenna produces a gain of 20 dBi. What is the EIRP?

500 mW The 10 mW of power is decreased by 3 dB, or divided by 2, giving 5 mW. This is then increased by 20 dBi, or multiplied by 10 twice, giving 500 mW.

Which of these frequencies has the longest wavelength? A. 750 KHz B. 2.4 GHz C. 252 GHz D. 2.4 MHz

750KHz 750 KHz signal has an approximate wavelength of 1,312 feet, or 400 meters. A 252 GHz signal has an approximate wavelength of less than 0.05 inches, or 1.2 millimeters. Remember, the higher the frequency of a signal, the smaller the wavelength property of an electromagnetic signal

Which IEEE 802.11 amendment specifies the use of up to eight spatial streams of modulated data bits?

802.11ac-2013 The 802.11ac-2013 amendment defines the use of 256-QAM modulation, up to eight spatial streams, multiuser MIMO, 20 MHz channels, 40 MHz channels, 80 MHz channels, and 160 MHz channels. 802.11 MIMO technology and 40 MHz channels debuted with the ratification of the 802.11n-2009 amendment.

What type of signal is required to carry data? A. Communications signal B. Data signal C. Carrier signal D. Binary signal E. Digital signal

Carrier signal A carrier signal is a modulated signal that is used to transmit binary data.

What is the best tool for detecting an RF jamming denial-of-service attack? A. Time-domain analysis software B. Protocol analyzer C. Spectrum analyzer D. Predictive modeling software E. Oscilloscope

Spectrum analyzer The only tool that will absolutely identify an interfering signal is a spectrum analyzer. A spectrum analyzer is a layer 1 frequency domain tool that can detect any RF signal in the frequency range that is being scanned. Some WLAN vendors offer low-grade spectrum analysis as a built-in feature of their access points.

The IEEE 802.11-2016 standard defines communication mechanisms at which layers of the OSI model? (Choose all that apply.) A. Network B. Physical C. Transport D. Application E. Data-Link F. Session

Physical Data-Link The IEEE 802.11-2016 standard defines communication mechanisms at only the Physical layer and MAC sublayer of the Data-Link layer of the OSI model.

Which capabilities defined by the 802.11n-2009 amendment are no longer defined by the 802.11ac-2013 amendment? (Choose all that apply.) A. Equal modulation B. Unequal modulation C. RIFS D. SIFS E. 40 MHz channels

Unequal modulation RIFS Reduced interframe spacing (RIFS), unequal modulation, Greenfield mode, and implicit beamform-ing are 802.11n capabilities that are no longer defined with the advent of the 802.11ac amendment.

What organization ensures interoperability of WLAN products? A. IEEE B. ITU-R C. ISO D. Wi-Fi Alliance E. FCC

Wi-Fi Alliance The Wi-Fi Alliance provides certification testing. When a product passes the test, it receives a Wi-Fi Interoperability Certificate.

An 802.11n (HT) network can operate on which frequency bands? (Choose all that apply.) A. 902-928 MHz B. 2.4-2.4835 GHz C. 5.15-5.25 GHz D. 5.47-5.725 GHz

2.4-2.4835 GHz 5.15-5.25 GHz 5.47-5.725 GHz High throughput (HT) technology is defined by the IEEE 802.11n-2009 amendment and is not frequency-dependent. 802.11n (HT) can operate in the 2.4 GHz ISM band as well as all the 5 GHz U-NII frequency bands

Which keying method is most susceptible to interference from noise? A. FSK B. ASK C. PSK D. DSK

ASK Because of the effects of noise on the amplitude of a signal, amplitude-shift keying (ASK) has to be used cautiously.

802.11 technology is typically deployed at which fundamental layer of network architecture? A. Core B. Distribution C. Access D. Network

Access 802.11 wireless networking is typically used to connect client stations to the network via an access point (AP). Access points are deployed at the access layer.

Which of these attacks can be detected by a wireless intrusion detection system (WIDS)? (Choose all that apply.) A. Deauthentication spoofing B. MAC spoofing C. Rogue ad hoc network D. Association flood E. Rogue AP

All 802.11 wireless intrusion detection systems may be able to monitor for as many as 100 or more attacks. Any layer 2 DoS attack and spoofing attack and most rogue devices can be detected.

The height or power of a wave is known as what? A. Phase B. Frequency C. Amplitude D. Wavelength

Amplitude Height and power are two terms that describe the amplitude of a wave. Frequency is how often a wave repeats itself. Wavelength is the actual length of the wave, typically measured from peak to peak. Phase refers to the starting point of a wave in relation to another wave.

Which wave properties can be modulated to encode data? (Choose all that apply.) A. Amplitude B. Frequency C. Phase D. Wavelength

Amplitude Frequency Phase The three keying methods that can be used to encode data are amplitude-shift keying (ASK), frequency-shift keying (FSK), and phase-shift keying (PSK).

Rebekah McAdams was hired to perform a wireless packet analysis of your network. While performing the analysis, she noticed that many of the data frames were preceded by an RTS frame followed by a CTS frame. What could cause this to occur? (Choose all that apply.) A. Because of high RF noise levels, some of the stations have automatically enabled RTS/CTS. B. An AP was manually configured with a low RTS/CTS threshold. C. A nearby cell phone is causing some of the nodes to enable a protection mechanism. D. Legacy 802.11b clients are connected to an 802.11g AP.

An AP was manually configured with a low RTS/CTS threshold. Legacy 802.11b clients are connected to an 802.11g AP. AP radios can be manually configured to use RTS/CTS for all transmissions. This is usually done to diagnose hidden node problems or to prevent hidden node problems when installing point-to-multipoint networks. 802.11g or 802.11n nodes may have enabled RTS/CTS as their protection mechanism

What must a powered device (PD) do to be considered PoE compliant (IEEE 802.3-2015, Clause 33)? (Choose all that apply.) A. Be able to accept power in either of two ways (through the data lines or unused pairs). B. Reply with a classification signature. C. Reply with a 35-ohm detection signature. D. Reply with a 25-ohm detection signature. E. Receive 30 watts of power from the power sourcing equipment.

Be able to accept power in either of two ways (through the data lines or unused pairs). Reply with a 25-ohm detection signature. For a powered device (PD) such as an access point to be considered compliant with the IEEE 802.3-2015, Clause 33 PoE standard, the device must be able to receive power through the data lines or the unused twisted pairs of an Ethernet cable. The PD must also reply to the power-sourcing equipment (PSE) with a 25-ohm detection signature. The PD may reply with a classification signature, but it is optional. The current PoE standard allows for a maximum draw of 12.95 watts by the PD from the power-sourcing equipment.

Which of these solutions would be considered strong WLAN security? A. SSID cloaking B. MAC filtering C. WEP D. Shared Key authentication E. CCMP/AES F. TKIP

CCMP/AES .CCMP/AES is defined as the default encryption type by the IEEE 802.11i security amendment. Cracking the AES cipher would take the lifetime of the sun using the tools that are available today

Beacon management frames contain which of the following information? (Choose all that apply.) A. Channel information B. Destination IP address C. Basic data rate D. Traffic indication map (TIM) E. Vendor proprietary information F. Time stamp

Channel information Basic data rate Traffic indication map (TIM) Vendor proprietary information Time stamp From the list of choices, the only information not contained in the beacon management frame is the destination IP address. The body of all 802.11 management frames contains only layer 2 information; therefore, IP information is not included in the frame. Other information that is included in a beacon includes security and QoS parameters.

Name a potential source of RF interference in the 5 GHz U-NII band. A. Cordless phones B. AM radio C. FM radio D. Microwave ovens E. Bluetooth

Cordless phones Some cordless phones transmit in the 5 GHz U-NII-3 band and are a potential source of RF interference, Bluetooth devices transmit in the 2.4 GHz frequency space. FM and AM radios transmit in licensed frequencies

You have been hired by the ABC Corporation to conduct an indoor site survey. What information will be in the final site survey report? (Choose two.) A. Security analysis B. Coverage analysis C. Spectrum analysis D. Routing analysis E. Switching analysis

Coverage analysis Spectrum analysis The final site survey report, known as the deliverable, will contain spectrum analysis information identifying potential sources of interference. Coverage analysis will also define RF cell boundaries. The final report also contains recommended access point placement, configuration settings, and antenna orientation. Capacity planning is considered to be mandatory when designing a WLAN; however, application throughput testing is often an optional analysis report included in the final survey report. Security, switching, and routing analysis are not included in a site survey report.

At which layers of the OSI model does 802.11 technology operate?

Data Link Physical

What are some possible effects of voltage standing wave ratio (VSWR)? (Choose all that apply.) A. Increased amplitude B. Decreased signal strength C. Transmitter failure D. Erratic amplitude E. Out-of-phase signals

Decreased signal strength Transmitter failure Erratic amplitude Reflected voltage caused by an impedance mismatch may cause a degradation of amplitude, erratic signal strength, or even the worst-case scenario of transmitter burnout.

A service set identifier is often synonymous with which of the following? A. IBSS B. ESSID C. BSSID D. BSS

ESSID The logical network name of a wireless LAN is often called an ESSID (extended service set identifier) and is essentially synonymous with SSID (service set identifier), which is another term for a logical network name in the most common deployments of a WLAN.

What type of communications do 802.11 radios use to transmit and receive? A. Simplex B. Half-duplex C. Full-duplex D. Echo-duplex

Half-duplex In half-duplex communications, both devices are capable of transmitting and receiving; however, only one device can transmit at a time. Walkie-talkies, or two-way radios, are examples of half-duplex devices. All radio frequency (RF) communications by nature are half-duplex. IEEE 802.11 WLAN radios use half-duplex communications.

Which security standard defines port-based access control? A. IEEE 802.11x B. IEEE 802.3b C. IEEE 802.11i D. IEEE 802.1X E. IEEE 802.11s

IEEE 802.1X The IEEE 802.1X standard is not specifically a wireless standard and often is mistakenly referred to as IEEE 802.11x. The IEEE 802.1X standard is a port-based access control standard. IEEE 802.1X provides an authorization framework that allows or disallows traffic to pass through a port and thereby access network resources.

While performing some research, Janie comes across a reference to a document titled RFC 3935. Which of the following organization's website would be best to further research this document? A. IEEE B. Wi-Fi Alliance C. WECA D. FCC E. IETF

IETF The Internet Engineering Task Force (IETF) is responsible for creation of Request for Comments (RFC) documents. The Institute of Electrical and Electronics Engineers (IEEE) is responsible for the 802 standards. The Wi-Fi Alliance is responsible for certification tests. The Wi-Fi Alliance used to be known as the Wireless Ethernet Compatibility Alliance (WECA) but changed its name to Wi-Fi Alliance in 2002. The Federal Communications Commission (FCC) is responsible for radio frequency (RF) regulatory rules in the United States.

What term best describes the bulk of the data generated on the Internet being created by sensors, monitors, and machines? A. Wearables B. Cloud-enabled networking (CEN) C. Cloud-based networking (CBN) D. Software as a service (SaaS) E. Internet of Things (IoT)

Internet of Things (IoT) Over the years, most of the data generated on the Internet has been created by human beings. The theory of Internet of Things (IoT) is that in the future, the bulk of the data generated on the Internet might be created by sensors, monitors, and machines. 802.11 radio NICs used as client devices have begun to show up in many types of machines and devices

What signal characteristics are common in spread spectrum and OFDM-based signaling methods? (Choose two.) A. Narrow bandwidth B. Low power C. High power D. Wide bandwidth

Low power Wide bandwidth Both spread spectrum and OFDM signals utilize bandwidth that is wider than what is required to carry the data and has low transmission power requirements.

Which sublayer of the OSI model's Data-Link layer is used for communication between 802.11 radios? A. LLC B. PLCP C. MAC D. PMD

MAC The IEEE 802.11-2016 standard defines communication mechanisms at only the Physical layer and MAC sublayer of the Data-Link layer of the OSI model.

What is another name for an 802.11 data frame that is also known as a PSDU? A. PPDU B. MSDU C. MPDU D. BPDU

MPDU The technical name for an 802.11 data frame is MAC protocol data unit (MPDU). An MPDU contains a layer 2 header, a frame body, and a trailer, which is a 32-bit CRC known as the frame check sequence (FCS). Inside the frame body of an MPDU is a MAC service data unit (MSDU), which contains data from the LLC and layers 3-7.

Which organization is responsible for enforcing maximum transmit power rules in an unlicensed frequency band? A. IEEE B. Wi-Fi Alliance C. ISO D. IETF E. None of the above

None of the above Radio frequency (RF) communications are regulated differently in many regions and countries. The local regulatory domain authorities of individual countries or regions define the spectrum policies and transmit power rules.

Which ESS design scenario is required by the IEEE 802.11-2016 standard? A. Two or more access points with overlapping coverage cells B. Two or more access points with overlapping disjointed coverage cells C. One access point with a single BSA D. Two basic service sets interconnected by a distribution system medium (DSM) E. None of the above

None of the above The scenarios described in options A, B, C, and D are all examples of how an extended service set may be deployed. The IEEE 802.11-2016 standard defines an extended service set (ESS) as "a set of one or more interconnected basic service sets." However, the IEEE 802.11-2016 standard does not mandate any of the examples given in the options

WLAN vendors have begun to offer the capability for guest users to log in to a guest WLAN with preexisting social media credentials, such as Facebook or Twitter usernames and passwords. Which authorization framework can be used for social media logins to WLAN guest networks? A. Kerberos B. RADIUS C. 802.1X/EAP D. OAuth E. TACACS

OAuth The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service and is often used for social login for Wi-Fi guest networks.

Which technology subdivides a channel, allowing parallel transmissions of smaller frames to multiple users to occur simultaneously? (Choose all that apply.) A. OFDMA B. OFDM C. Channel blocking D. Sub-channelization E. RTS/CTS

OFDMA Orthogonal frequency-division multiple access (OFDMA) is a technology that can be found in the proposed 802.11ax draft amendment. It allows 20 MHz channels to be partitioned into as many as 9 smaller channels, providing for multiple-user transmissions.

Which of these terms can best be used to compare the relationship between two radio waves that share the same frequency? A. Multipath B. Multiplexing C. Phase D. Spread spectrum

Phase Phase involves the positioning of the amplitude crests and troughs of two waveforms.

What is the number one cause of layer 2 retransmissions? A. Low SNR B. Hidden node C. Adjacent cell interference D. RF interference

RF interference All the answers are possible causes of layer 2 re-transmissions; however, RF interference is the main reason for layer 2 frame retransmissions to occur. WLAN performance is negatively impacted if the re-transmission rate exceeds 10 percent.

What are some potential causes of layer 2 retransmissions? (Choose all that apply.) A. RF interference B. Low signal-to-noise ratio (SNR) C. Dual-frequency transmissions D. Fade margin E. Multiplexing

RF interference Low signal-to-noise ratio (SNR) Layer 2 retransmissions can be caused by many different variables in a WLAN environment. Multipath, RF interference, hidden nodes, adjacent cell interference, and low signal-to-noise ratio (SNR) are all possible causes of layer 2 retransmissions.

You have been hired by the US-based XYZ Company to conduct a wireless site survey. Which government agencies need to be informed before a tower that exceeds 200 feet above ground level is installed? (Choose all that apply.) A. RF regulatory authority B. Local municipality C. Fire department D. Tax authority E. Aviation authority

RF regulatory authority Local municipality Aviation authority In the United States, if any tower exceeds a height of 200 feet above ground level (AGL), you must contact both the FCC and FAA, which are communications and aviation regulatory authorities, respectively. Other countries will have similar height restrictions, and the proper RF regulatory authority and aviation authority must be contacted to find out the details. Local municipalities may have construction regulations or height restrictions, and a permit may be required

Which of these measurements are taken for indoor coverage analysis? (Choose all that apply.) A. Received signal strength B. Signal-to-noise ratio C. Noise level D. Path loss E. Packet loss

Received signal strength Signal-to-noise ratio Noise level Packet loss RF coverage cell measurements that are taken during an indoor passive site survey include re-ceived signal strength, noise levels, signal-to-noise ra-tio (SNR), and data rates. Packet loss can be an addi-tional measurement recorded during an active manual site survey. Packet loss is a calculation needed for an outdoor wireless bridging survey.

What term best describes how Wi-Fi can be used to identify customer behavior and shopping trends? A. Radio analytics B. Customer analytics C. Retail analytics D. 802.11 analytics

Retail analytics To further support and understand customers and their behaviors, retail analytics products are being installed to monitor customer movement and behavior. Strategically placed access points or sensor devices listen for probe frames from Wi-Fi-enabled smartphones. MAC addresses are used to identify each unique device, and signal strength is used to monitor and track the location of the shopper. Retail analytics can identify the path the shopper took while walking through the store, along with the time spent in different areas of the store. This information can be used to identify shopping patterns and to analyze the effectiveness of in-store displays and advertisements.

The hidden node problem occurs when one client station's transmissions are not heard by some of the other client stations in the coverage area of a basic service set (BSS). What are some of the consequences of the hidden node problem? (Choose all that apply.) A. Retransmissions B. Intersymbol interference (ISI) C. Collisions D. Increased throughput E. Decreased throughput

Retransmissions Collisions Decreased throughput The stations that cannot hear the hidden node may transmit at the same time that the hidden node is transmitting. This will result in continuous transmission collisions in a half-duplex medium. Collisions will corrupt the frames, and they will need to be retransmitted. Any time retransmissions are necessary, more overhead is added to the medium, resulting in decreased throughput. Intersymbol interference is a result of multipath, not the hidden node problem.

Which of the following measures the difference between the power of the primary RF signal compared against the sum of the power of the RF interference and background noise? A. Noise ratio B. SNR C. SINR D. BER E. DFS

SINR Signal-to-interference-plus-noise (SINR) relates the primary RF signal to both interference and noise. While the noise level tends not to fluctuate much, interference from other devices is likely to be more common and frequent

Which CSMA/CA conditions must be met before an 802.11 radio can transmit? (Choose all that apply.) A. The NAV timer must be equal to zero. B. The random backoff timer must have expired. C. The CCA must be idle. D. The proper interframe space must have occurred. E. The access point must be in PCF mode.

The NAV timer must be equal to zero. The random backoff timer must have expired. The CCA must be idle. The proper interframe space must have occurred. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a medium access method that utilizes multiple checks and balances to try to minimize collisions. These checks and balances can also be thought of as several lines of defense. The various lines of defense are put in place to hopefully ensure that only one radio is transmitting while all other radios are listening. The four lines of defense include the network allocation vector, the random backoff timer, the clear channel assessment, and interframe spacing.

When installing a higher-gain omnidirectional antenna, which of the following occurs? (Choose two.) A. The horizontal coverage increases. B. The horizontal coverage decreases. C. The vertical coverage increases. D. The vertical coverage decreases.

The horizontal coverage increases. The vertical coverage decreases. When the gain of an omnidirectional antenna is increased, the vertical coverage area decreases while the horizontal coverage area is increased.

Which WLAN device uses dynamic layer 2 routing protocols? A. WLAN switch B. WLAN controller C. WLAN router D. WLAN mesh access point

WLAN mesh access point WLAN mesh access points create a self-forming WLAN mesh network that automatically connects access points at installation and dynamically updates routes as more clients are added. Most WLAN mesh networks use dynamic layer 2 routing protocols with metrics such as RSSI, SNR, and client load.

The Wi-Fi Alliance is responsible for which of the following certification programs? A. 802.11i B. WEP C. 802.11-2016 D. WMM

WMM Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance certification program that enables Wi-Fi networks to prioritize traffic generated by different applications. 802.11-2016 is the IEEE standard, and WEP (Wired Equivalent Privacy) is a legacy encryption method defined as part of the IEEE 802.11-2016 standard. 802.11i was the IEEE amendment that defined the robust security network (RSN) and is also part of the 802.11-2016 standard.

Which Wi-Fi Alliance certification defines the mechanism for conserving battery life that is critical for handheld devices such as bar code scanners and VoWiFi phones?

WMM-PS Helps conserve battery power for devices using Wi-Fi radios by managing the time the client devices spend in sleep mode. Conserving battery life is critical for handheld devices such as bar code scanners and VoWiFi phones. To take advantage of power-saving capabilities, both the device and the access point must support WMM-Power Save.

What Wi-Fi Alliance certifications are required before a Wi-Fi radio can be certified as Voice-Enterprise compliant? (Choose all that apply.) A. WMM-Power Save B. Wi-Fi Direct C. WPA2-Enterprise D. Voice-Personal E. WMM-Admission Control

WMM-Power Save WPA2-Enterprise WMM-Admission Control Voice-Enterprise offers enhanced support for voice applications in enterprise Wi-Fi networks. Voice-Enterprise equipment must also support seamless roaming between access points (APs), WPA2-Enterprise security, optimization of power through the WMM-Power Save mechanism, and traffic management through WMM-Admission Control.

What are the communication differences between Wi-Fi Direct and Wi-Fi CERTIFIED TDLS devices? (Choose all that apply.) A. Wi-Fi CERTIFIED TDLS devices never associate to an AP. B. Wi-Fi Direct devices can communicate with each other without associating to an AP. C. Wi-Fi CERTIFIED TDLS devices remain associated to an AP while communicating directly with each other. D. Wi-Fi Direct devices must associate with an AP before they can communicate with each other.

Wi-Fi Direct devices can communicate with each other without associating to an AP. Wi-Fi CERTIFIED TDLS devices remain associated to an AP while communicating directly with each other. Wi-Fi Direct is designed to provide easy setup for communications directly between wireless devices without the need for an access point (AP). Tunneled Direct Link Setup (TDLS) communications operate between client devices while they are still associated to an AP.

dBi is an expression of what type of measurement?

gain Theoretically, an isotropic radiator can radiate an equal signal in all directions. An antenna cannot do this because of construction limitations. However, antennas are often referred to as isotropic radiators because they radiate RF energy. The gain, or increase, of power from an antenna when compared to what an isotropic radiator would generate is known as decibels isotropic (dBi). Another way of phrasing this is decibel gain referenced to an isotropic radiator, or change in power relative to an antenna. dBi is a measurement of antenna gain.


Conjuntos de estudio relacionados

APEX English 10 Unit 2 Quiz 2.2.4: American Born Chinese Part 2

View Set

Boards - Ocular Motility and Binocular Vision

View Set

8.03 Quiz: Applications of Triangle Similarity

View Set