M03 Chapter 6 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

The open system authentication process uses how many frames?

Two

IEEE 802.11n protection mode _______ allows backward compatibility to non-802.11n devices.

3

A service set identifier (SSID) has a maximum limit of how many characters or octets?

32

Which items describe a service set identifier (SSID)? (Choose two.)

32 characters maximum Is case sensitive

WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)?

802.11a client devices

A basic service set identifier (BSSID) is the unique identifying MAC address of the ____________.

AP radio

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?

Active mode

A basic service set (BSS) consists of how many access points?

At least one

In order for a wireless client to become completely part of the basic service set, it must first ____________ and then ____________.

Authenticate, associate

The IEEE 802.11 association process happens after which phase?

Authentication

As a device moves away from an access point, which of the following is true regarding dynamic rate switching?

Data rate decreases

You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

Dynamic rate switching

You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?

ERP protection

Which of the following is not an advantage of an IBSS network?

Easy to secure

The IEEE 802.11 Shared key authentication method exchanges ____ frames as defined in the IEEE 802.11 standard.

Four

When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set?

Independent

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

Management

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

Mismatched SSID

How many access points are used by a basic service set (BSS)?

One

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

One or more

When a WLAN device listens for beacon frames, it is participating in which phase?

Passive scanning

Which of the following is not an IEEE 802.11 management frame type?

RTS

The process in which a WLAN client connection moves from one access point to another is called ____________.

Roaming

In order to set up an ad hoc network, a user must know which two parameters? (Choose two.)

SSID Channel


Conjuntos de estudio relacionados

PFPL 540 Module 6: Plan Distributions

View Set

Environmentaln Science - Chapter 5

View Set

sports med chapter 1 study guide

View Set

AP Human Geography Final Exam Review

View Set

Ch. 20- Freak the Mighty Strikes Again

View Set

Chapter 35: Employment Discrimination

View Set

Social/Behavioral Research: Module 8

View Set

Crime and Punishment - characterization

View Set