CWNA test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

E. 30dBm

A WLAN transmitter that emits a 200 mW signal is connected to a cable with 3 dB loss.If the cable is connected to an antenna with 10 dBi gain, what is the EIRP at the antenna element? A. 10dBm B. 13dBm C. 20dBm D. 26dBm E. 30dBm

C. 300 Mbps is the maximum supported data rate for this device.

A Wi-Fi Alliance interoperability certificate indicates that a device is a/b/g/n certified. It further indicates one transmit and receive spatial stream for both the 2.4 GHz and 5.0 GHz bands. It further indicates support for both WPA and WPA2 Enterprise and Personal. Finally, it indicates support for EAP-TLS, EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2 andPEAPv1/EAP-GTC. Which one of the following statements is false? A. This client device supports protection mechanisms such as RTS/CTS and/or CTS-to- Self. B. This client device supports both TKIP and CCMP cipher suites. C. 300 Mbps is the maximum supported data rate for this device. D. This client device supports the ERP, OFDM, and HT physical layer specifications. E. This client device supports X.509 certificates for EAP authentication. EAP-TTLS

A. A heat map demonstrating signal quality in areas where VoWiFi is supported. D. Test results from an active survey with a VoWiFi handset

A company has hired you to perform a pre-deployment site survey of their facility. During an interview, the network manager informs you that the new wireless network must use 5 GHz bands and OFDM, and VoWiFi handsets will be used extensively over the wireless network.What items do you need to include in the RF site survey report? (Choose2) A. A heat map demonstrating signal quality in areas where VoWiFi is supported. B. Codec types and sampling rates for each VoWiFi phone C. Security parameters and configuration steps for VoWiFi handsets. D. Test results from an active survey with a VoWiFi handset E. Results of OFDM versus ERP performance in each BSA

C. The voice client does not support DFS, and therefore experiences some 5 GHz coverage holes as it moves through the network.

ABC Company has a 2.4 and 5 GHz WLAN deployment. DFS functionality is enabled as required by the regulatory domain and APs use DFS channels as long as radar is not detected. Band steering is also enabled to encourage dual-band clients to use frequency bands with more capacity. Your performance analysis shows that many dual-band VoWiFi client devices will move back and forth between 2.4 and 5 GHz as the users roam throughout the building. All APs have 2.4 and 5GHz radios enabled with transmit power adjusted to accommodate relatively similar cell sizes. This "band hopping" behavior is viewed by network staff to be undesirable. What is the most likely cause of the unpredictable client band selection behavior? A. Interference from 5 GHz radar sources has increased frame corruption and retries on channels 36-48. B. 5 GHz frequencies offer better RF penetration than 2.4 GHz, but 2.4 GHz offers more voice call capacity and lower latency than 5GHz. C. The voice client does not support DFS, and therefore experiences some 5 GHz coverage holes as it moves through the network. D. The client's band selection algorithm prefers 5 GHz, but band steering behavior usually steers 75-85% of client devices to 2.4GHz.

C. Beamwidth

ABC Company has just purchased a 6 dBi patch antenna. After performing some tests with the 6 dBi antenna, they have concluded that more antenna gain is needed to cover their outdoor courtyard. When choosing an antenna with higher gain, what other antenna characteristic will also always change? A. Fresnel Zone size B. Maximum input power C. Beamwidth D. Impedance E. VSWR Ratio

A. RF pre-deployment planning and post-deployment reporting of access point locations on a floor plan B. Performance and security monitoring of WLAN controllers with alarms and notifications for Administrative staff E. Management of WLAN controller configuration and provisioning of firmware updates

ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system. What network functions are performed by the enterprise-class WNMS? (Choose3) A. RF pre-deployment planning and post-deployment reporting of access point locations on a floor plan B. Performance and security monitoring of WLAN controllers with alarms and notifications for Administrative staff C. Radio management, fast roaming, key caching, and other centralized control plane operations D. Centralized bridging of guest data traffic and application of firewall and QoS policies to data E. Management of WLAN controller configuration and provisioning of firmware updates F. Generating, encrypting, and decrypting 802.11 frames and collecting RF radio data.

D. The root bridge

ABC Company is planning a point-to- multipoint outdoor bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux- based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1XAuthenticator? A. The RADIUS server B. All non-root bridges C. A designated non-root bridge D. The root bridge E. The Ethernet switch

D. The power budget in the edge switches must be carefully planned and monitored based on the number of supported PoE devices.

ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3 PoE. After hearing this information, what immediate concerns do you note? A. VoIP phones and 802.11 access points should not be powered by the same edge switch due to distortion. B. The edge Ethernet switches should support Ether-channel to get the best results out of the network. C. If the switches are in optimal locations for VoIP phones, they are likely to be suboptimal locations for 802.11APs. D. The power budget in the edge switches must be carefully planned and monitored based on the number of supported PoE devices.

D. Packet capturing

ABC Company performs government contract work that requires disabling WLANs and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their "NO WIRELESS" network security policy. What attack type cannot be recognized by the WIPS? A. Deauthentication B. Rogue Aps installation C. Layer 3DoS D. Packet capturing E. RF jamming

D. The existing WLAN plan, including the AP locations, may not provide the benefits seen in HT and VHT 802.11 PHY capabilities

ABC Hospital is planning a Wi-Fi infrastructure upgrade where the 802.11b/g APs (HR/DSSS and ERP) would be replaced with new dual-radio 802.11n/802.11ac (HT and VHT) APs. ABC wants to minimize the time and cost associated with performing a new site survey, so they will be mounting all of the new APs in the same locations and with the same cable drops as the existing APs. What is one performance drawback with this deployment method? A. Multipath will increase, causing excessive layer-2 retransmissions. The retransmissions will cause latency for VoWiFi handsets. B. Increased receiver sensitivity on the VHT APs will cause them to continually change channels to avoid co-channel interference. C. If the existing UTP cabling is not Category 3 or better, the total Ethernet backhaul for each AP will be limited to 100Mbps. D. The existing WLAN plan, including the AP locations, may not provide the benefits seen in HT and VHT 802.11 PHY capabilities.

AC_VO (access category voice) AC_VI (access category video) AC_BE (access category best effort) AC_BK (access category background)

ACCESS PROFILES four access categories. in order of highest to lowest priority:

C. Two spatial streams, because the definition of the AP indicates that it is capable of only two spatial streams

AP-1 is a 3x3:2 AP. STA-3 is a 3x3:3 client. What is the maximum number of spatial streams that can be used for a downlink HT-OFDM transmission from AP-1 to STA-3? A. One spatial stream, because the definition of the AP indicates that it is capable of only one spatial stream. B. Three spatial streams, because the definition of the client indicates that it is capable of only three spatial streams. C. Two spatial streams, because the definition of the AP indicates that it is capable of only two spatial streams. D. Three spatial streams, because the definition of the AP indicates that it is capable of only three spatial streams.

E. 1000mW

An 802.11 WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB of loss. The cable is connected to an antenna with 16 dBi of gain. What is the EIRP power output? A. 10mW B. 25mW C. 50mW D. 250mW E. 1000mW

C. The beacons are from an IBSS instead of a BSS

As XYZ Company's wireless specialist, you have been asked to troubleshoot some unexpected frame patterns in a wireless protocol capture. Your peers explain that the network's beacon frames are inconsistent. That is, the BSSID is the same for all beacons, but the source address varies between three different addresses. What network configuration would cause this beacon frame behavior? A. A single AP supports multiple BSSs with different SSIDs B. A virtual cell single channel network has been implemented C. The beacons are from an IBSS instead of a BSS D. Three APs still share the same default configuration

E. Your solution meets both required objectives, but does not meet the optional objective.

As a consultant, you have been hired by ABC Company to implement an outdoor WLAN connection between two buildings that are 2 kilometers (1.24 miles) from each other, with no obstructions in between. Your first required objective is to create a point-to- point link between the two buildings within the local regulatory body's 800 mW EIRP maximum. Your second required objective is to provide an industry-standard security solution capable of supporting mutual authentication. As an optional objective, you must minimize the amount of interference from, and to, nearby WLAN networks. You install an OFDM wireless bridge at each building, configuring one in root mode and the other in non-root mode. You set each radio for 100 mW (20 dBm) and attach 9 dBi omni-directional antennas to both. You configure the network for WPA2-Enterprise withPEAPv0/EAP-MSCHAPv2 authentication. Which statement is true about the solution you chose to deploy? A. Your solution meets both required objectives and the optional objective. B. Your solution meets the first required objective and the optional objective, but not the second objective. C. Your solution meets the second required objective and the optional objective, but not the first required objective. D. Your solution meets neither required objective but meets the optional objective. E. Your solution meets both required objectives, but does not meet the optional objective. F. Your solution does not meet either required objective, or the optional objective.

C. 802.11ac devices support the features of the VHT PHY only in the 5 GHz frequency band.

As a consultant, you've been hired by XYZ Company to provide recommendations about client device selection, operation, and interoperability. What information should be considered to help them choose the right WLAN client devices? A. 802.11n OFDM is more susceptible to high-power, narrowband interference than 802.11a B. In order to earn Wi-Fi Alliance certification, 802.11n clients stations are required to support both 2.4 and 5 GHz frequencies C. 802.11ac devices support the features of the VHT PHY only in the 5 GHz frequency band. D. 802.11ac is not backwardly compatible with 802.11n or802.11a. E. When HR/DSSS devices are present, VHT MCS rates are disabled for the entire BSS.

A. Dynamic Rate Switching

As a station moves away from the access point to which it is associated, it changes its data rate from 600 Mbps to 540 Mbps and then to 450Mbps. What IEEE 802.11 term is used to describe this functionality? A. Dynamic Rate Switching B. Multirate Control C. Modulation and Codings election D. Rate Set Selectivity E. Adaptive Rate Management

B. Inverse square law

As an RF wave propagates through space, the wave front experiences natural expansion that reduces its signal strength in an area. What term describes the rate at which this expansion happens? A. MU-MIMO B. Inverse square law C. Path spread phenomenon D. Fresnel zone thinning Fresnel Zone E. Ohm's law

E. Clients send null data frames to the AP and switch the power management bit from 1 to 0 to receive queued data.

As defined in the 802.11 specification, legacy Power Save requires an inefficient back-and-forth frame exchange process. Due to this inefficiency, many WLAN device implementations use a variation of 802.11 Power Save to accomplish the same function. What non-standard power save behavior is used by most Wi-Fi devices in actual legacy Power Save implementations? A. Client devices ignore the TIM field and automatically send PS-Poll frames after every beacon. B. After each beacon, the AP attempts to empty its frame buffer by sending Wake-on- WLAN frames to wake each dozing client. C. Request-to- Send and Clear-to- Send frame exchanges are used to trigger the delivery of buffered data. D. The Beacon interval is changed from the default 100 time units to 10 or less time units. E. Clients send null data frames to the AP and switch the power management bit from 1 to 0 to receive queued data. F. Stations send a CTS-to- self frame to the AP with a very long duration period so they can receive all of their buffered data at once.

A. Microwave ovens C. Elevator shafts

As you prepare for a site survey in a multi-floor corporate office, you have learned about several wireless devices that support connection-oriented, real-time applications. These applications are sensitive to service interruptions and require excellent signal quality, low latency, and low loss. For that reason, it is important to identify sources of RF interference as well as building characteristics that would cause RF blockage or dead spots.What systems or environmental characteristics are most likely to cause interference or RF blockage and disrupt service for these applications? (Choose2) A. Microwave ovens B. Narrow hallways C. Elevator shafts D. RFID chokepoints E. Workspace dividers

B. The client and AP each choose the optimal data rate to use independently of one another, based on their own measurements related to the RF link.

During the discovery and connectivity process, client and AP stations exchange information about their supported data rates. After the association, how do client and AP stations select the supported data rate that will be used to send an 802.11 data frame? A. During the association, the client and AP agree to use the same transmit rate, but either station can request a change at any time after the association. B. The client and AP each choose the optimal data rate to use independently of one another, based on their own measurements related to the RF link. C. The client and AP may use different transmit rates, but the AP determines the data rate that will be used by each client station in the BSS. D. The client and AP may use different transmit rates, but the client determines the data rate that it will use and the data rate that the AP will use when communicating to the client. E. The client and AP may use a different transmit rates, but the transmit rate is determined by the peer station, based on the peer's experience of the RF link.

B. Physical security and theft prevention C. Protection from environmental conditions

For what likely reasons might an organization choose to purchase an AP designed for outdoor deployment to use as an indoor WLAN AP at an industrial facility? (Choose2) A. Aesthetic requirements B. Physical security and theft prevention C. Protection from environmental conditions D. Reduce transient RF interference E. 802.11 security compliance

C. By adding non-overlapping channel layers through the addition of more APs

How is throughput capacity scaled in a single channel architecture (SCA) WLAN system? A. By increasing transmit power and placing APs that are on a single channel farther from one another. B. By adding more SSIDs to existing APs to spread users across different contention domains. C. By adding non-overlapping channel layers through the addition of more APs. D. By using downlink data compression and uplink flow control at the AP. E. By using a single 802.11n radio to transmit simultaneous downlink data streams to different users.

C. The signals will be distorted if the indirect signal arrives simultaneously at the receiver, but 90 degrees out-of- phase.

If an 802.11 RF transmission reaches a receiving antenna simultaneously by direct and reflected paths, what effect will the reflected signal have on the signal that took the direct line-of- sight path? A. The direct signal will only be received if the reflected signal is more than 180 degrees out of phase. B. The direct signal cannot be received if the indirect signal is less than 90 degrees out-of- phase. C. The signals will be distorted if the indirect signal arrives simultaneously at the receiver, but 90 degrees out-of- phase. D. If the signals are in-phase, they will combine together, cancel one another out, and create a null.

C. WPA2-PSK D. EAP-TLS

In WLAN security, which authentication methods always create Layer 2 dynamic encryption keys? (Choose2) A. HTTPS Captive Portal B. WEP C. WPA2-PSK D. EAP-TLS E. Shared Key F. TKIP

E. EAP Authentication Type

In a Wi-Fi client configuration utility, what feature is most likely to be user configurable? A. 802.1p to WMM mappings B. SNMPv3Users C. WMM-PS Dozing Interval D. RADIUS Server IP Address E. EAP Authentication Type

A. Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading

In a long-distance RF link, what statement about Fade Margin is true? A. Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading. B. The Fade Margin of a long-distance radio link should be equivalent to the receiver's antenna gain. C. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions. D. The Fade Margin is a measurement of signal loss through free space, and is a function of frequency and distance.

A. Client stations would see two different sets of AP capabilities as they roam between APs with the same BSSID.

In a single channel architecture (SCA) WLAN system, 802.11n (HT) APs should not share an SSID with 802.11g (ERP) APs. What is the reason for this recommendation? A. Client stations would see two different sets of AP capabilities as they roam between APs with the same BSSID. B. The added range of 802.11n APs would cause additional co-channel interference. C. The additional beacon material in 802.11n beacons would confuse 802.11b/g client stations. D. Beacons from 802.11n APs use 40 MHz channels, while beacons from 802.11g APs use 20 MHz channels.

C. Capacity analysis results

In addition to coverage analysis results, what should be included in a site survey report to ensure WLAN users experience acceptable performance? A. Application Layer protocol availability analysis results B. Layer 4 protocol availability analysis results C. Capacity analysis results D. WAN interface analysis results

B. Better link reliability between 802.11a/b/g client devices and 802.11ac APs C. Improves service quality for real-time applications at greater distances

In addition to throughput enhancements, what other improvements does a dual-band 802.11ac AP provide when compared with 802.11a/g APs? (Choose2) A. Introduces "fast transition" roaming protocols for VoWiFi phones B. Better link reliability between 802.11a/b/g client devices and 802.11ac APs C. Improves service quality for real-time applications at greater distances D. Increases in receive sensitivity enhance RTLS location accuracy E. Stronger security with more robust encryption modes.

A. Channels 5 and10 D. Channels 2 and 8

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping? (Choose 2) A. Channels 5 and10 B. Channels 1 and5 C. Channels 3 and7 D. Channels 2 and8 E. Channels 8 and11 F. Channels 10 and13

C. The DCF and EDCA coordination functions require backoff algorithms D. WLAN devices cannot detect collisions and must receive positive frame acknowledgment.

In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network bandwidth (e.g. 130 Mbps) for user data throughput when multiple clients are actively exchanging data with the AP? (Choose2) A. Radio receiver hardware cannot process data as quickly as it can be transmitted. B. Half of the bandwidth is allocated to uplink traffic and half to down link traffic. C. The DCF and EDCA coordination functions require backoff algorithms D. WLAN devices cannot detect collisions and must receive positive frame acknowledgment. E. APs do not have sufficient wired connection speeds to the LAN.

D. Mode 3: Non-HT mixed mode

In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use? A. Mode 0: No protection mode (Greenfield) B. Mode 1: Nonmember protection mode C. Mode 2: 20 MHz protection mode D. Mode 3: Non-HT mixed mode

B. The SSID of the current AP does not match the SSID of the new AP.

In an enterprise WLAN, what condition will prevent a dual-band VHT/HT client device from performing a fast and seamless transition (i.e. latency-sensitive applications are not disrupted) between two access points that are managed by the same WLAN controller? A. The current AP is using channel 1 and the new AP is using channel40. B. The SSID of the current AP does not match the SSID of the new AP. C. The current AP supports only HT and the new AP is VHT capable. D. The access points are hiding the SSID in Beacons and Probe Response frames.

D. Access points broadcast Beacons on a single channel for which they are programmed. Nearby client stations listen for Beacon frames and record information found in the Beacons for use in the association process.

In an infrastructure Basic Service Set (BSS), how does the passive scanning process occur? A. Access points broadcast Beacons on all channels of each radio within the regulatory domain. Nearby client stations record information found in the Beacons for use in the association process. B. Client stations broadcast Probe Request frames on all supported channels in the regulatory domain. Nearby access points respond with Probe Response frames. Client stations record information in the Probe Response frames for use in the association process. C. Client stations broadcast Probe Request frames on the single channel for which they are programmed. Nearby access points respond on that channel with Probe Response frames. Client stations record information found in the Probe Response frames for use in the association process. D. Access points broadcast Beacons on a single channel for which they are programmed. Nearby client stations listen for Beacon frames and record information found in the Beacons for use in the association process.

D. Enable station-to- station traffic blocking by the access points in the hotel

Lynne runs a small hotel, and as a value added service for her customers she has implemented Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. She wants to avoid this problem at her hotel. What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on her customers wireless computers? A. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches B. Require EAP-FAST authentication and provide customers with a username/password on their receipt C. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login D. Enable station-to- station traffic blocking by the access points in the hotel

A. Signal strength of access point beacons received

Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association? A. Signal strength of access point beacons received B. Proximity to potential access points C. Retry rate of probe request and response frames D. Average round trip time to reach the Internet DNS server E. Average round trip time to reach the IP router

B. An impedance mismatch between components in the RF system

Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter. What will cause high return loss in an RF transmission system, including the radio,cables, connectors and antenna? A. A Voltage Standing Wave Ratio (VSWR) of 1:1 B. An impedance mismatch between components in the RF system C. Cross-polarization of the RF signal as it passes through the RF system D. The use of cables longer than one meter in the RF system E. High output power at the transmitter and use of a low-gain antenna

A. DCF

The 802.11 protocol specifies a fundamental channel access method that is required for all stations and is used in all IBSS and BSS networks. What is this fundamental channel access method called? A. DCF B. PCF C. HCF D. EDCAF E. HCCA F. PCF/CA

A. HT B. OFDM

The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using which other 802.11 physical layer specifications (PHYs)? (Choose2) A. HT B. OFDM C. HR/DSSS D. ERP-PBCC E. DSSS-OFDM

D. DFS may be required in some regulatory domains on some channels.

The IEEE 802.11a/n/ac physical layer technologies utilize the 5 GHz frequency band. What is true of the channels in this frequency spectrum? A. 14 channels are available worldwide. B. 11 channels are available worldwide. C. Regulatory domains worldwide require DFS and TPC in all these channels. D. DFS may be required in some regulatory domains on some channels. E. 802.11 channels are separated by 5Mhz

C. PLCP D. MAC

The OSI model is a 7-layer model for understanding the functions of a communication system. What OSI sublayers are specifically addressed by the IEEE 802.11-2012 standard? (Choose2) A. Network B. PPDU C. PLCP D. MAC E. IP F. Transport

D. 2.427GHz

The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2.412 Hz). What is the center frequency of channel 4? A. 2.413GHz B. 2.417GHz C. 2.422GHz D. 2.427GHz E. 2.437GHz

B. The AP may ignore the initial probe requests or 802.11 authentication requests sent in the 2.4GHz band by dual-band clients

The client devices that connect to your network include a mix of dual-band 802.11n and 802.11ac, single-band 802.11b/g/n, and some 802.11a/g/n. Your access points are configured with the same SSID on both the 2.4 and 5 GHz bands. The APs are also configured to prioritize client connectivity to 5GHz. How does an AP perform band steering to encourage clients to use 5GHz? A. When the client sends a probe request in the 2.4 GHz band, the AP may reply with information about the 5 GHz BSS. B. The AP may ignore the initial probe requests or 802.11 authentication requests sent in the 2.4 GHz band by dual-band clients C. The AP may allow an 802.11 association with the client in the 2.4 GHz band, then send unicast channel switch announcements to the client announcing the 5 GHz channel as the new channel. D. After receiving probe request frames from the same client in both bands, the AP may send an association request frame to the client in the 5 GHz band. E. The AP may allow an 802.11 association with the client in the 2.4 GHz band, then the AP may perform a transparent client handoff by transferring the client's MAC address to the 5 GHz radio.

A. Theft prevention and data security of WLAN infrastructure devices B. Wireless intrusion monitoring and response procedures E. Training of the IT staff on WLAN operational security

The network administrator at XYZ Company recently attended a training class on wireless security and realized that he should update the corporate security policy to address WLAN technology. The network administrator is listing the items that should be addressed in the security policy update, and has asked for your input. What WLAN topics should be addressed by a company security policy? (Choose3) A. Theft prevention and data security of WLAN infrastructure devices B. Wireless intrusion monitoring and response procedures C. WLAN performance analysis baseline documentation D. Wired network performance analysis and baseline documentation E. Training of the IT staff on WLAN operational security F. User density planning and AP client association thresholds

C. RBAC

To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based on their department. What WLAN feature would allow the network administrator to accomplish this task? A. SNMP B. VRRP C. RBAC D. IPSec E. WIPS F. WPA2

A. The access points are mounted too closely to one another. D. The output power on the access points is too high.

Two co-located 802.11b/g/n APs can interfere with one another and cause contention and collisions, even when the two APs are operating on non-overlapping channels (e.g. 1 & 6). What deployment flaw could cause this problem? (Choose2) A. The access points are mounted too closely to one another. B. Reflective objects in the area are causing significant multipath. C. A client station is using active scanning to probe for access points on multiple channels. D. The output power on the access points is too high. E. A client station authenticates to both access points, but does not associate. F. The access points are not synchronized to the same NTP server.

B. Business justification C. User productivity impact

Users and Network support personnel at a mid-sized equipment manufacturer have been discussing the potential uses and benefits of implementing an indoor WLAN. The network administrator and network manager have requested a meeting of senior management personnel to discuss a WLAN implementation before performing a site survey or taking any implementation steps. The first topic of discussion in the meeting is the corporate policy concerning implementation and use of WLAN technology. What specific topics are appropriate in this policy meeting? (Choose2) A. Use of the latest 802.11acequipment B. Business justification C. User productivity impact D. Antenna types E. Defining RF channels for use

A. Spatial multiplexing

What HT technology requires MIMO support on both the transmitter and receiver? A. Spatial multiplexing B. Short guard intervals C. Maximal ratio combining D. Orthogonal Frequency Division Multiplexing

A. Multiple WLAN Profiles D. Access Categories

What WLAN system feature is required to produce a scenario with the following configuration on a single access point? (Choose2) 1. SSID = Guest / BSSID = AA:AA:AA:AA:AA:AA / VLAN = 22 / Subnet = 192.168.22.0 / RF Channel =6 2. SSID = Corporate / BSSID = BB:BB:BB:BB:BB:BB/ VLAN = 33 / Subnet = 192.168.33.0 / RF Channel = 6 / User TypeA 3. SSID = Corporate / BSSID = BB:BB:BB:BB:BB:BB/ VLAN = 44 / Subnet = 192.168.44.0 / RF Channel = 6 / User TypeB A. Multiple WLAN Profiles B. Call Admission Control C. Virtual Cell with SCA D. Access Categories E. User-based authentication F. Dual-radio AP hardware G. Integrated DHCP server

B. Predictive modeling software makes it simple to assess multiple different AP locations and then adjust and display the AP's expected coverage pattern in almost real-time. E. It takes less time to create an initial site survey for a large facility when using predictive modeling software than when performing a manual survey.

What advantages does using predictive site survey modeling software offer over performing a manual site survey? (Choose2) A. Predictive modeling software can predict the ideal access point location 100% of the time, whereas the results from manual surveying are less reliable. B. Predictive modeling software makes it simple to assess multiple different AP locations and then adjust and display the AP's expected coverage pattern in almost real-time. C. Predictive modeling software provides more reliable data than manual surveys when fine-tuning and validating access point placement after the installation. D. The exact impact of interference sources from external networks can be more accurately measured when using predictive modeling software than with manual surveys. E. It takes less time to create an initial site survey for a large facility when using predictive modeling software than when performing a manual survey.

C. Virtual E. Physical

What answers correctly complete the following sentence? _____ and _____ carrier sense functions are used to determine if the wireless medium is busy. (Choose2) A. Backoff B. Pseudo-random C. Virtual D. Active E. Physical F. Interframe G. Vector

A. 20MHz B. 20/40MHz

What are two channel modes specified by the 802.11n (High Throughput) PHY? (Choose2) A. 20MHz B. 20/40MHz C. 40/80MHz D. 22MHz E. 80MHz F. 160MHz

A. An impedance mismatch in the RF cables and connectors

What can cause an excessively high VSWR (Voltage Standing Wave Ratio) in a WLANRF transmission line? A. An impedance mismatch in the RF cables and connectors B. Reflected direct current (DC) voltage on the main RF signal line C. Attenuation of the RF signal as it travels along the main signal path D. Crosstalk (inductance) between adjacent RF conductors

E. Obstacles between client stations causing attenuation F. Large 802.11 cells with physically distributed stations

What causes of hidden nodes within a BSS would be more likely lead to an increase in collisions and retries? (Choose2) A. Data frames too large for the physical environment B. Client stations broadcasting with too much power C. Access points broadcasting with too little power D. Client stations too close in proximity to each other E. Obstacles between client stations causing attenuation F. Large 802.11 cells with physically distributed stations

E. RTS or CTS frames

What component of the 802.11 standard allows stations to reserve access to the RF medium for a specified period of time? A. Short guard intervals B. DTIM Interval C. Listen Interval D. Probe Request frames E. RTS or CTS frames

A. An IBSS does not have a distribution system (DS), but a BSS does.

What distinguishes an independent basic service set (IBSS) from an infrastructure basic service set (BSS)? A. An IBSS does not have a distribution system (DS), but a BSS does. B. An IBSS does not require beacon frames, but a BSS does. C. An IBSS does not support 802.11 authentication or association, but a BSS does. D. An IBSS does not support any 802.11ac enhancements, but a BSS does.

A. Use of WEP or TKIP for encryption instead of CCMP D. RF interference from more than 10 nearby Bluetooth transmitters E. Increasing or decreasing the number of spatial streams in use by the client station and AP

What factors are likely to cause the greatest impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS? (Choose 3) A. Use of WEP or TKIP for encryption instead of CCMP B. Use of passphrase authentication instead of 802.1X/EAP authentication C. Increasing the beacon interval from 100 to 200 (TUs) D. RF interference from more than 10 nearby Bluetooth transmitters E. Increasing or decreasing the number of spatial streams in use by the client station and AP

A. Operating frequency B. Transmit antenna gain C. Transmit power

What factors are taken into account when calculating the Link Budget of a point-to- point outdoor WLAN bridge link? Choose all that apply. A. Operating frequency B. Transmit antenna gain C. Transmit power D. Antenna height

B. Receiving station's radio sensitivity C. Free Space Path Loss E. Transmitting station's output power

What factors influence the distance that an RF signal can be effectively received? (Choose 3) A. Transmitting station's power source B. Receiving station's radio sensitivity C. Free Space Path Loss D. MAC layer encryption E. Transmitting station's output power F. Temperature in the Fresnel zone

A. The number of client stations associated to the BSS D. The data rates at which nearby client stations are transmitting and receiving data

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2) A. The number of client stations associated to the BSS B. The power management settings in the access point's beacons C. The presence of co-located (10m away) access points on non-overlapping channels D. The data rates at which nearby client stations are transmitting and receiving data E. The layer 3 protocol used by each station to transmit data over the wireless link

A. An IP tunnel is established between the AP and controller for AP management and control functions E. In a distributed data forwarding model, the AP handles frame encryption and decryption

What facts are true regarding controllers and APs in a Split MAC architecture? (Choose2) A. An IP tunnel is established between the AP and controller for AP management and control functions. B. Using centralized data forwarding, APs never tag Ethernet frames with VLAN identifiers or 802.1pCoS. C. With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the authenticator. D. Management and data frame types must be processed locally by the AP, while control frame types must be sent to the controller. E. In a distributed data forwarding model, the AP handles frame encryption and decryption.

B. 802.1p and DSCP QoS C. BGP and Frame Relay D. Captive web portals E. IGMP snooping

What feature(s) are most likely to be supported by 802.11 enterprise-class WLAN controllers? (Choose4) A. Link aggregation / port trunking B. 802.1p and DSCP QoS C. BGP and Frame Relay D. Captive web portals E. IGMP snooping

B. Power management D. Roaming aggressiveness

What features are most often configurable within 802.11 WLAN client utilities? (Choose2) A. Frame generator utility B. Power management C. Co-channel interference threshold D. Roaming aggressiveness E. AES key and block size

D. Transmit Power Control (TPC) F. Dynamic Frequency Selection (DFS)

What features were introduced in the IEEE 802.11h amendment in order to uphold regulatory requirements for 5 GHz operation? (Choose2) A. 256-QAM B. Distributed Coordination Function(DCF) C. Phase Shift Keying(PSK) D. Transmit Power Control (TPC) E. Radio Resource Management (RRM) F. Dynamic Frequency Selection (DFS)

A. HT Protection mode B. Non-ERP Present field

What information is transmitted in the Beacon management frames of an HT access point to communicate about backward compatibility with ERP and HR/DSSS stations? (Choose2) A. HT Protection mode B. Non-ERP Present field C. Secondary channel offset D. RIFS mode E. Power save mode of clients

B. AP Signal strength meter E. Link statistics display

What is a common feature of an 802.11 WLAN client utility? (Choose2) A. Real-time retry monitor B. AP Signal strength meter C. Spectrum analyzer utility D. VLAN configuration E. Link statistics display

E. A Fresnel Zone that is at least 60% clear of obstructions

What is always required to establish a high quality 2.4 GHz RF link at a distance of 3 miles (5 kilometers)? A. Minimum output power level of 2W B. Accurate Earth Bulge calculations C. Grid antennas at each endpoint D. A minimum antenna gain of 11 dBi at both endpoints E. A Fresnel Zone that is at least 60% clear of obstructions

D. WPA2-Personal uses dynamic encryption keys, and WEP-128 uses static keys.

What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11networks? A. WPA2-Personal uses 802.1X/EAP for authentication, and WEP-128 uses preshared keys. B. WPA2-Personal is based on IEEE 802.11 industry standards, but WEP is not. C. WPA2-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption. D. WPA2-Personal uses dynamic encryption keys, and WEP-128 uses static keys. E. WPA2-Personal requires complex 64-character hex keys, whereas WEP-128 requires weak 26-character hex keys.

B. Mounting an omnidirectional antenna to a mast

What is the intended use for the WLAN hardware known as a pole or mast mount unit? A. Mounting a lightning arrestor to a grounding rod B. Mounting an omnidirectional antenna to a mast C. Mounting an RF amplifier to a dipole antenna D. Mounting a PoE injector to a perforated radome E. Mounting an access point to a site survey tripod

A. A facility map with an explanation of applications used in each area

What item is essential for performing a manual RF site survey for a warehouse facility? A. A facility map with an explanation of applications used in each area B. I-Beam mounting kits for hanging temporary access points C. Low-gain omni-antennas for APs mounted high on warehouse ceilings D. Predictive site survey software that supports highly directional antennas E. NEMA enclosures that protect APs used for the survey

A. Random backoff timer B. Clear channel assessment C. Network allocation vector

What mechanisms are specified by the IEEE 802.11 standard to attempt to prevent multiple radios from transmitting on the RF medium at a given point in time? (Choose3) A. Random backoff timer B. Clear channel assessment C. Network allocation vector D. Slot assessment value E. Collision detection

A. Alternates between awake and dozing, depending on its need to transmit and receive information - Wi-Fi Multimedia 802.1e

What phrase correctly completes the following sentence? When using WMM Power Save operation, a wireless client device . A. Alternates between awake and dozing, depending on its need to transmit and receive information-Wi-Fi Multimedia 802.1e B. Enters a low-power radio state until it receives a WMM PS-Poll frame from the AP C. Experiences higher throughput and lower latency than when operating in Active mode D. Powers down a subset of MIMO radio chains and transmits information at a slower data rate E. Buffers frames destined to the low-power AP until the AP wakes its radio and begins beaconing again

C. The highest RF signal strength that is transmitted from a given antenna

What phrase defines Equivalent Isotropically Radiated Power (EIRP)? A. The power output from the radio into the RF cable B. The power output from the radio after cable losses C. The highest RF signal strength that is transmitted from a given antenna D. Reflected power due to an impedance mismatch in the signal path E. Power supplied from the transmission line to the antenna input

A. Wi-Fi enabled voice handsets with low transmit power can experience asynchronous downlink and uplink performance. D. Cell size may be too large, causing co-channel interference to adjacent cells and reducing system capacity

What problems may exist for a multiple channel architecture (MCA) WLAN when its APs are all operating at full power (typically 100mW)? (Choose2) A. Wi-Fi enabled voice handsets with low transmit power can experience asynchronous downlink and uplink performance. B. WLAN client stations can experience the hidden node problem when located near each other within the same cell. C. The mismatched power between WLAN client stations and APs violates regulatory and IEEE signal quality requirements. D. Cell size may be too large, causing co-channel interference to adjacent cells and reducing system capacity. E. APs operating in the 2.4 GHz band would prevent microwave ovens and analog video cameras from functioning.

B. High retransmission count for a subset of client stations

What problems may occur when there are hidden nodes in the BSS? A. Increase in downlink (transmitted by AP) frame retries B. High retransmission count for a subset of client stations C. Use of frame fragmentation with fragment bursts D. Excessive use of null data frames E. Duration values vary widely in each data frame

A. Use of larger frame sizes results in greater throughput in low interference environments

What statement about 802.11 WLAN performance is true? A. Use of larger frame sizes results in greater throughput in low interference environments. B. BSS support for 65 KB A-MPDUs will increase the maximum data rate available to client devices. C. In 802.11ac, changing the security mechanism from WPA2-Personal to WPA2-Enterprise will enable the VHT MCS rates. D. Compared to an Independent BSS, an Infrastructure BSS can provide almost twice the throughput between wireless nodes. E. Use of short guard intervals improves reliability and throughput in high multipath environments

A. Up to 30 watts of power may be provided through an Ethernet cable.

What statement about 802.3-2012, Clause 33 Power over Ethernet is true? A. Up to 30 watts of power may be provided through an Ethernet cable. B. By using CAT3 cabling, you can increase the maximum draw available to the PD. C. When using CAT5 cabling, you decrease the maximum draw available to the PD. D. Only endpoint PSEs are supported. E. Only midspan PSEs are supported.

A. 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.

What statement about the IEEE 802.11e QoS facility is true? A. 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention. B. Four 802.1p user priorities are mapped to eight 802.11 transmit queues. C. When the Voice queue has frames awaiting transmission, no data will be transmitted from the Best Effort queue. D. To improve efficiency, Block Acknowledgments are required for Voice and Video WMM queues. E. 802.11 control frames are assigned to the 802.11 EF priority queue.

D. Granting access to specific network services according to a user profile

What statement describes the authorization component of a AAA implementation? A. Verifying that a user is who he says he is B. Validating client device credentials against a database C. Logging the details of user network behavior in order to review it at a later time D. Granting access to specific network services according to a user profile E. Implementing a WIPS as a full-time monitoring solution to enforce policies

D. 802.11ac VHT-OFDM utilizes 256-QAM, which increases the data rate significantly over 64-QAM available in HT-OFDM.- 802.11ac runs on 802.11a 5GHz band

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) in IEEE 802.11WLANs? A. 802.11a and 11n use six (6) "pilot" subcarriers as a reference for the receiver to detect frequency and phase shifts of the signal. B. 802.11a/g/n OFDM includes several combinations of modulation and coding to achieve data rates from 1-600Mbps. C. With 802.11a OFDM, 16-QAM provides either 48 or 54 Mbps data rates, depending upon coding rates. D. 802.11ac VHT-OFDM utilizes 256-QAM, which increases the data rate significantly over 64-QAM available in HT-OFDM.- 802.11ac runs on 802.11a 5GHz band E. In 802.11a OFDM, fifty-six (56) subcarriers are used as parallel symbol transmission paths to carry data.

B. The SSID must be included in an association request frame. E. The SSID is an alphanumeric value with a maximum length of 32 octets.

What statements about the SSID are true? (Choose2) A. The SSID is a security session identifier used in RSNs. B. The SSID must be included in an association request frame. C. The SSID is an alphanumeric value assigned to device manufacturers by the IEEE. D. The SSID is a pseudo-random number assigned to each client by an AP. E. The SSID is an alphanumeric value with a maximum length of 32 octets. F. When configuring a new network, creating an SSID is optional.

C. Horizontal and vertical beamwidth are calculated at the points in which the main lobe decreases power by 3dB. D. Horizontal beamwidth is displayed (in degrees) on the antenna's Azimuth Chart.

What statements about the beamwidth of an RF antenna are true? (Choose2) A. The lower the gain of an antenna, the more narrow one or both beamwidths become. B. The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops propagating. C. Horizontal and vertical beamwidth are calculated at the points in which the main lobe decreases power by 3dB. D. Horizontal beamwidth is displayed (in degrees) on the antenna's Azimuth Chart.

A. RF cables have upper and lower frequency range specifications. C. Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications. D. Every RF connector causes insertion loss.

What statements accurately describe the RF cables and connectors that are used in an 802.11 WLAN system? (Choose 3) A. RF cables have upper and lower frequency range specifications. B. 75 and 125 ohms are the typical impedances of 802.11 WLAN connectors. C. Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications. D. Every RF connector causes insertion loss. E. Large diameter RF cables cause greater loss than small diameter cables.

B. Some vendors use proprietary protocols, and some vendors use protocols based on public standards like RFCs. D. All vendors support at least one L2 or L3 broadcast protocol for controller discovery by controller-based APs.

What statements describe industry practices for communication protocols between WLAN controllers and controller-based APs? (Choose2) A. All vendors use the same protocol so that APs will interoperate with WLAN controllers from other vendors. B. Some vendors use proprietary protocols, and some vendors use protocols based on public standards like RFCs. C. For most vendors, the controller-based APs maintain data and control tunnels with at least two controllers for immediate failover and redundancy. D. All vendors support at least one L2 or L3 broadcast protocol for controller discovery by controller-based APs. E. All vendors recommend using L2 (instead of L3) controller discovery and tunneling protocols in large enterprises.

F. Symbols

What term correctly completes the following sentence? 802.11a/b/g used a mandatory 800ns guard interval. 802.11n introduced an optional short 400ns guard interval. Guard intervals (GI) are necessary in OFDM to reduce the likelihood of interference between two consecutive ____. A. Frames B. Packets C. Segments D. Bits E. Bytes F. Symbols

A. MAC Service Data Unit (MSDU)

What term correctly completes the following sentence? In an IEEE 802.11 frame, the IP packet is considered by the MAC layer to be a(n) ____. A. MAC Service Data Unit (MSDU) B. MAC Protocol Data Unit (MPDU) C. IP datagram D. PLCP Service Data Unit (PSDU) E. PLCP Protocol Data Unit (PPDU)

D. Passive Gain

What term describes the effect of increasing the intensity of an RF wave with an antenna by focusing the energy in a specific direction? A. Distributed Radiation B. Active Amplification C. Beam Compression D. Passive Gain E. RF Flooding

A. CCMP, TKIP

What terms accurately complete the following sentence? The IEEE 802.11-2012 standard specifies mandatory support of the _____cipher suite for Robust Security Network Associations, and optional use of the ________cipher suite, which is designed for use with pre-RSNA hardware. A. CCMP, TKIP B. 802.1X/EAP, WEP C. TLS, SSL D. CCKM, WEP E. RC5,RC4

A. Counter Mode with CBC-MAC Protocol F. Wired Equivalent Privacy G. Temporal Key Integrity Protocol

What three cipher suites are specified by the IEEE 802.11-2012 standard? (Choose3) A. Counter Mode with CBC-MAC Protocol B. Wi-Fi Protected Access v1 andv2 C. Internet Protocol Security D. Extensible Authentication Protocol E. GCM with Galois Message Authentication Code (GMAC)Protocol F. Wired Equivalent Privacy G. Temporal Key Integrity Protocol

C. Microwave oven

What type of device often causes interference across 50% or more of the 2.4 GHz frequency band? A. Military radar B. Properly configured AP C. Microwave oven D. Wireless video camera E. WIPS sensor

C. Refraction

What word describes the bending of an RF signal as it passes through a medium of a varying density from that of free space? A. Diffraction B. Reflection C. Refraction D. Diffusion E. Scattering

D. The new access point transmits a Reassociation Response to the client station with a status value. E. The client and new access point create unicast encryption keys.

When a client moves to a new BSS within an ESS, what steps are part of the 802.11 reassociation process? (Choose2) A. The client station transmits a Reassociation Request frame to its current access point. B. The current access point informs the IP gateway of the reassociation. C. The current access point triggers the client's reassociation service. D. The new access point transmits a Reassociation Response to the client station with a status value. E. The client and new access point create unicast encryption keys. F. The client station transmits a deauthentication frame to the current access point.

E. Each AP responds in turn after preparing a probe response and winning contention

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond? A. After waiting a SIFS, all APs reply at the same time with a probe response. B. After waiting a SIFS, a designated AP sends an ACK, and then replies with a probe response. C. Each AP checks with the DHCP server to see if it can respond and then acts accordingly. D. For each probe request frame, only one AP may reply with a probe response. E. Each AP responds in turn after preparing a probe response and winning contention.

B. VHT TXOP power save uses the partial AID (Association Identifier) in the preamble to allow clients to identify frames targeted for them.

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN? A. VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not. B. VHT TXOP power save uses the partial AID (Association Identifier) in the preamble to allow clients to identify frames targeted for them. C. Legacy Power Save mode was removed in the 802.11acamendment. D. VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.

B. Use directional antennas to isolate the RF propagation F. Implement a band steering feature for dual-band clients

When designing a WLAN infrastructure implementation for high client density at a public venue such as a conference or stadium, what are common best practices? (Choose2) A. Use high-gain omnidirectional antennas to improve SNR B. Use directional antennas to isolate the RF propagation C. Configure APs to transmit at or near their maximum power setting D. Use WPA2-Personal security for ease of deployment E. Disable 802.11ac MCS rates to prevent high overhead protection mechanisms F. Implement a band steering feature for dual-band clients

C. The channel reuse pattern should be three dimensional with the RF cell extending coverage of each access point to other floors.

When performing a site survey for a Multiple Channel Architecture (MCA) system in a multi-tenant building with five floors, what aspect should you, as the site surveyor, keep in mind? A. The RF interference caused by passing airplanes supporting on-board Wi-Fi should be a prime consideration. B. The omni-directional antennas of the access points should be oriented parallel to the floor to maximize the coverage pattern across as many floors as possible. C. The channel reuse pattern should be three dimensional with the RF cell extending coverage of each access point to other floors. D. The Fresnel Zone is completely blocked between floors so each floor is considered a separate site survey.

A. All ports on the Ethernet switch will be supporting Class 3 PoE powered devices

When planning an access point deployment that utilizes Power over Ethernet (PoE) switches at the network edge, what design decision could adversely affect the operation of 802.3-2012,Clause 33 APs? A. All ports on the Ethernet switch will be supporting Class 3 PoE powered devices. B. Some APs are connected to a PoE switch and are also receiving power from an A Coutlet. C. The Ethernet switch uplink ports are not connected to an 802.3-2012, Clause 33-compliant core or distribution Ethernet switch. D. A gigabit Ethernet switch port supporting an 802.11a/g AP auto-negotiates to 100Mbps. E. The installation team is not informed that PoE support will reduce the recommended maximum UTP cabling length from 100m to50m.

A. Beamwidth

When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease? A. Beamwidth B. Range C. Active gain D. Receive sensitivity E. Fresnel Zone size

B. Throughloss

When using an RF splitter to connect one transceiver to sector antennas loss is incurred. What is this loss called? A. Conversion loss B. Throughloss C. Active loss D. Intentional loss

C. ERP (802.11g D. HT (802.11n)

Which IEEE 802.11 physical layer (PHY) specifications includes support for and compatibility of both OFDM and HR/DSSS? (Choose2) A. HR/DSSS (802.11b) B. OFDM (802.11a) C. ERP (802.11g) D. HT (802.11n) E. CCK (802.11b) F. VHT (802.11ac)

A. Hybrid, contention-based

Which answer correctly completes the following sentence? The WMM certification, created by the Wi-Fi Alliance, is based on the ______ coordination function with support for ______ QoS priority. A. Hybrid, contention-based B. Point, scheduled C. Dynamic, distributed D. Distributed, trigger-and- delivery E. Enhanced, contention-free

A. Dipole B. Patch

Which antenna types are commonly used by indoor Wi-Fi devices in a MIMO diversity implementation? (Choose2) A. Dipole B. Patch C. Dish D. Grid E. Sector

B. 11Mbps

Which data rate is supported by 802.11g radios that is not supported by 802.11a radios? A. 9Mbps B. 11Mbps C. 12Mbps D. 54Mbps E. 65Mbps F. 130Mbps

C. 802.1X/EAP D. CCMP cipher suite

Which features are incorporated in the 802.11-2012 specification and are recommend for robust WLAN client security? (Choose2) A. SSID hiding B. CAPWAP with DTLS C. 802.1X/EAP D. CCMP cipher suite E. IPSec VPN F. MAC address whitelists

B. 2.4000 - 2.4835GHz C. 5.15 - 5.25GHz D. 5.470 - 5.725GHz E. 5.725 - 5.875GHz

Which of the following frequency ranges are specified for use by IEEE 802.11 radios? (Choose all that apply.) A. 902 - 928MHz B. 2.4000 - 2.4835GHz C. 5.15 - 5.25GHz D. 5.470 - 5.725GHz E. 5.725 - 5.875GHz

A. dBm

Which unit of measurement is an absolute unit that is used to quantify power levels on a linear scale? A. dBm B. W C. dB D. mW E. VSWR

A. To improve capacity in the BSS B. To reduce the size of the AP's effective service area

Why is it recommended for a wireless network administrator to disable 1 Mbps and 2 Mbps data rates on the WLAN infrastructure? (Choose2) A. To improve capacity in the BSS B. To reduce the size of the AP's effective service area C. To prevent 802.11b devices from associating D. To maximize the range of the highest data rates E. To prevent VoWiFi multicast frames F. To enable support for long preambles

C.802.11r E.802.11w

XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets. As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2012, should be supported to provide the management frame protection and fast secure roaming security features? (Choose2) A.802.11j B.802.11p C.802.11r D.802.11u E.802.11w F802.11z

B. Determine how much signal strength is passing between floors. C. Locate wiring closets on each floor occupied by XYZ Company.

XYZ Company has hired you to perform an indoor site survey of their 5-story facility. They own the building and rents out unused floors (floors 2 and 4) to other companies, and the other companies already use 802.11 WLANs. XYZ Company wants all of the offices they occupy to be surveyed as part of the project. What actions should be recommended as part of the site survey project? (Choose2) A. Verify that RF signals from XYZ Company's APs are not penetrating outside the perimeter of the building. B. Determine how much signal strength is passing between floors. C. Locate wiring closets on each floor occupied by XYZ Company. D. Identify security best practice violations on neighboring WLANs. E. Verify that XYZ Company's APs are not directly above or below APs on adjacent floors.

B. The Equivalent Isotropically Radiated Power (EIRP) will decrease.

XYZ Corporation is experiencing connectivity problems with their existing building-to- building bridge link. A concrete wall on the roof of one building is partially blocking the Fresnel Zone, and the connection is dropping many frames. The administrator moves the antenna to an area not obstructed by the concrete wall and then realizes the RF cable cannot reach the new location. If an extension cable is added to move the antenna, what are the likely results? A. The data throughput rate will increase because VSWR will decrease. B. The Equivalent Isotropically Radiated Power (EIRP) will decrease. C. The antenna's azimuth beamwidth will decrease. D. The size of the Fresnel zone will increase. E. The likelihood of a direct lightning strike will increase.

A. What data cabling is currently installed in the rooms and throughout the hotel? D. What types of applications will be used by the hotel staff?

You are an independent contractor, hired to perform an indoor site survey and network design for Luxury Full Service Hotels International. The network will support hotel staff and guest users. You are interviewing the network manager to determine business, performance, and security requirements for the future 802.11WLAN. What questions should you ask the IT manager? (Choose2) A. What data cabling is currently installed in the rooms and throughout the hotel? B. How much RF loss do you expect between hotel rooms? C. Who installed your existing wired network? D. What types of applications will be used by the hotel staff? E. On what frequency do the microwave ovens operate in the hotel suites?

B. RF heat map illustrating coverage and signal quality for each frequency band D. Documentation noting where each access point will be placed and how it will be mounted

You are being interviewed by ABC Company for employment as a wireless site survey expert. The interviewing manager asks you what items should be included in a site survey report generated as part of a manual site survey process. What answer would be accurate? (Choose2) A. Itemized list of equipment, licenses, and support contracts required for the facility B. RF heat map illustrating coverage and signal quality for each frequency band C. Documentation proving proper entry of wall material types into the site survey software D. Documentation noting where each access point will be placed and how it will be mounted E. Documentation noting how each WLAN user group will authenticate to the network

B.144

You are implementing a VHT-capable AP. Which one of the following channels is available in the 802.11ac amendment to the 802.11-2012 standard, which was not available in the standard before this amendment? A.153 B.144 C.161 D. 56 E. 48

B. Testing a constant conversation or handset tone while roaming from area to area, or performing an active survey

You are onsite with a client to perform a post-deployment site survey. When verifying a multiple channel VoWiFi deployment using a VoWiFi handset, which aspect is most important? A. Performing protocol analysis with a single wireless adapter that is scanning all channels in use B. Testing a constant conversation or handset tone while roaming from area to area, or performing an active survey C. Configuring DSCP-to- 802.11e QoS maps on the handset for each access category. D. Verifying the VHT functionality to handle the call volume incurred by a single VoIP phone call.

C. Impedance in Ohms D. Elevation Beamwidth F. Operating Frequencies

You are selecting antennas for a WLAN operating in the 5 GHz frequency band. What specifications should be evaluated for an antenna before it is implemented in this WLAN system? (Choose3) A. 802.11adcompatibility B. TPC support C. Impedance in Ohms D. Elevation Beamwidth E. Return Loss Rating F. Operating Frequencies

A. Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Response frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames. C. Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting to connect to the corporate network.

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field. Your manager suggests implementing these security practices. What response should you give to this suggestion? (Choose2) A. Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Response frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames. B. This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS. C. Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting to connect to the corporate network. D. Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key. E. To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

E. WLAN discovery tool

You are using a tool that allows you to see signal strength for all APs in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available. What kind of application is described? A. Site survey utility B. Wireless Network Management System C. Protocol analyzer D. Spectrum analyzer E. WLAN discovery tool F. Wireless Intrusion Protection System

B. Evaluate the client's operating frequency band with a spectrum analyzer, looking for a high noise floor or interference sources

You have been sent as a consultant to a customer site that is experiencing problems with some 2.4 GHz clients on their 802.11a/g/n/ac network. After collecting information from the company about the problem, your initial troubleshooting step is to find a client device experiencing performance problems and observe its 802.11 frame exchanges in a protocol analyzer. The retransmission rate for that client is 65% instead of the company's baseline, which is 9%. Based on this information, what troubleshooting step should follow to isolate the problem? CBVC A. Check the frame decodes in the protocol analyzer and look for an excessive number of deauthentication frames. B. Evaluate the client's operating frequency band with a spectrum analyzer, looking for a high noise floor or interference sources. C. Utilize a laptop-based site survey and planning tool to create a predictive model of the optimal AP placement in the customer's facility. D. With a protocol analyzer, identify the client's roaming threshold settings and reassociation behavior. E. Install Wi-Fi endpoint security and reporting software on the client device to monitor and log the retransmission behavior.

A. Coverage analysis to verify appropriate coverage and roaming boundaries E. Application analysis with an active phone call on a VoWiFi handset

You were previously onsite at XYZ's facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey. When performing this type of post-deployment RF site survey for VoWiFi, what are two steps that must be performed? (Choose2) A. Coverage analysis to verify appropriate coverage and roaming boundaries B. Spectrum analysis to locate and identify RF interference sources C. Frequency-band hopping analysis to detect improper RF channel implementations D. Protocol analysis to discover channel use on neighboring APs E. Application analysis with an active phone call on a VoWiFi handset

A. With a spectrum analyzer, identify the type, amplitude, and location of RF interference sources,if any are present. B. Evaluate the building materials at ABC's facility and confirm that the floor plan documents are consistent with the actual building.

Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive modeling software for surveying, but the company insists on a pre-deployment site visit. What tasks should be performed as part of the pre-deployment visit to prepare for a predictive survey? (Choose2) A. With a spectrum analyzer, identify the type, amplitude, and location of RF interference sources,if any are present. B. Evaluate the building materials at ABC's facility and confirm that the floor plan documents are consistent with the actual building. C. Test several antenna types connected to the intended APs for use in the eventual deployment. D. Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers. E. Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls.


Kaugnay na mga set ng pag-aaral

Banzai Plus Post test study guide

View Set

BA 3350 Chapter 6 Test Prep THIDA 80

View Set

BIOL 2120 Chapter 5: An Introduction to Carbohydrates

View Set

Chp. 23 Genomics II: Functional genomics, proteomics and bioinformatics

View Set

UNIT 1 -13 Level 1 certification

View Set

Marketing Research Test 2: Chpt 4-6

View Set