itsp215/itsp216

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

7. _____ allows for Application layer data communication between two stations using lower layers as a support system. A. Logical addressing B. Physical addressing C. Data encapsulation D. Data encryption E. Point-to-point

C

A self-contained intelligent access point is: A. Controller-based B. Heavyweight C. Autonomous D. Thin

C

CompactFlash (CF) cards are available in two types. What is the main difference between the two types? A. Length B. Width C. Thickness D. Height

C

Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge only mode B. Repeater only mode C. Root access point mode D. Access mode

C

Which client device will allow a user to connect several Ethernet devices on a common segment to an access point? A. PCMCIA B. PCI bridge C. Wireless workgroup bridge D. Ethernet bridge

C

Which WLAN technology can be used to obtain the highest data transfer rate possible?

C - HR-OFDM

802.11a/b/g/n/ac devices use what type of communication?

C - Half Duplex

What technology is used to send WLAN data over a wireless medium using many sub-carrier frequencies?

C - Spread Spectrum

Which 802.11 PHY technology specifies an 80 MHz-wide channel for transmitting and receiving data?

C - VHT-OFDM

At which two layers of the OSI model do wireless LANs operate? (Choose 2.) A. Session B. Network C. Physical D. Application E. Data Link

C, E

A service set identifier (SSID) has a maximum limit of how many characters or octets? A. 8 B. 16 C. 32 D. 128

C. 32

Wireless network cables and devices have impedance (AC resistance) of ____________ ohms. A. 10 B. 25 C. 50 D. 75

C. 50 WLAN cables and devices are rated at 50 ohms impedance. Cable and satellite television is rated at 75 ohms.

WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch

C. 802.11a client devices

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode

C. Active mode

A self-contained intelligent access point is ____________. A. Controller-managed B. Heavyweight C. Autonomous D. Thin

C. Autonomous

Which can cause a loss of signal strength? (Choose two.) A. Antenna B. Amplifier C. Cable D. Connector E. Transmitter

C. Cable D. Connector Cables and connectors can both result in a loss of signal strength. Antennas and amplifiers will add gain or increase signal strength. A transmitter outputs an absolute amount of power.

You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term? A. Dynamic frequency selection B. Transmit power control C. Dynamic rate switching D. Transmit save mode

C. Dynamic rate switching

You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection

C. ERP protection

Highly directional antennas are typically used for ____________ connectivity. A. Short-range B. Omnidirectional C. Long-range D. Dipole

C. Long-range Highly directional antennas are typically used for long-range point-to-point connectivity, such as bridge links. Omnidirectional antennas are used as part of an access point system or to provide point-to-multipoint links.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame? A. Data B. Control C. Management D. Detail

C. Management

Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge-only mode B. Repeater-only mode C. Root access point mode D. Access mode

C. Root access point mode

Access points that are used with wireless LAN controllers and not as standalone devices. Usually have limited functionality and require a wireless LAN controller to operate.

Controller-based access points

What is one difference between autonomus access points and controller-based access points?

Controller-based access points associate to a WLA?N controller, but autonomous access points do not

What is one difference between autonomous access points and controller-based access points?

Controller-based access points associate to a WLAN controller, but autonomous access points do not.

Different from autonomous access points, these access points are used with hardware WLAN controllers but not as stand-alone devices.

Controller-managed access points

Access points used to provide a wireless infrastructure without the use of a hardware wireless LAN controller. This technology uses a software management system for configuration, and decisions are at the network edge rather than being tunneled through the network.

Cooperative access points

Data Privacy

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Advanced Encryption Standard (AES) algorithm

11. The term encapsulation means to _____. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload

D

17. Which layer of the OSI model allows physical addresses to be converted to logical addresses? A. Application B. Session C. Transport D. Network E. Data Link

D

9. Which layer of the OSI model provides an interface to the user? A. Physical B. Network C. Transport D. Application E. Data Link F. Presentation

D

Enterprise-grade IEEE 802.11g client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey

D

In addition to wireless networking, which adapter was designed for flash memory storage and can be used in a digital camera? A. PCI B. PCMCIA C. ISA D. SDIO

D

In computer network terminology, the definition of half duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time

D

Of all the devices listed, Secure Digital Input Output (SDIO) cards are most likely to be installed in which? A. Desktop computer B. Access point C. Notebook computer D. Pocket PC

D

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors? A. Application B. Transport C. Network D. Data Link E. Physical

D

Which wireless adapter may require some disassembly of a notebook computer to install? A. PCI B. PCMCIA C. PC Card D. Mini-PCI

D

You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wireless LAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0

D

Without any regulatory domain taken into consideration, the 2.4 GHz frequency range allows for how many channels using 802.11b/g/n?

D - 14

An HR/DSSS channel is how wide?

D - 22 MHz

OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate pf_________Mbps

D - 54

Stations operating in which two 802.11 amendments are interoperable?

D - 802.11b and 802.11g

Devices compliant with whcih two amendments to the IEEE standard use multiple radio chains and multiple antennas? (Choose two)

D - 802.11n E - 802.11/ac

Bluetooth devices use___________, which can potentially cause interference with WLANs.

D - Frequency-Hopping Spread Spectrum (FHSS)

Which WLAN technology in wireless networking uses the effects of multipath to provide data rates of 600 Mbps in the 2.4 GHz ISM band?

D - MIMO

A protocol used to automatically distribute Internet Protocol (IP) addresses and other TCP/IP information to devices connected to a local area network.

Dynamic Host Configuration Protocol (DHCP)

Given: You are recommending an AP for use in a warehouse environment. Some APs will reuqire diectional antennas and others will use dipole antennas. What feature must be supported by the APs in this installation?

External antennas

What organization is responsible for unlicensed frequency band regulation in the united states?

FCC

Bluetooth devices use ____ which an poentially cause interference with WLANs.

FHSS

True or false, SOHO-grade access points usually have a more extensive feature set than enterprise-grade access points.

False

True or false: A benefit of a wireless LAN controller is distributed administration.

False

True or false: An administrator should always configure an access point from the wireless network.

False

True or false: a benefit of a wireless LAN controller is distributed administration.

False

10. The physical address of a network adapter is the _____. A. MAC address B. Logical address C. Layer 3 address D. Mesh address

A

16. Which protocol is responsible for addressing and routing? A. IP B. TCP C. UDP D. ARP

A

19. Which layer of the OSI model uses physical addresses to deliver data to the destination? A. Physical B. Data Link C. Network D. Transport

A

8. Which topology may use a token passing access method? A. Ring B. Mesh C. Bus D. Star

A

A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the OS C. Hardware to install a PCI card D. Hardware to install a client bridge

A

How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8

A

Six wired clients can connect to a wireless LAN by using which device? A. Workgroup bridge B. PCI bridge C. Mini-PCI adapter D. PCI adapter

A

Which component is required for a successful installation and operation of an 802.11n wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows WZC

A

D

According to the 802.11a amendment, which of the following data rates are mandatory? A. 1, 2, 5.5 and 11 Mbps B. 6, 24, and 54 Mbps C. 6, 9, 12, 18, 24, 36, 48, 54 Mbps D. 6, 12, and 24 Mbps E. 1, 6, 12, and 24 Mbps

Which devices are abbreviated by the initialism STA?

According to the IEEE 802.11 standard all wireless devices, including access points.

A performance condition that occurs when two or more access point radios are providing RF coverage to the same physical area using overlapping frequencies. Simultaneous RF transmissions by two or more of these access point radios in the same physical area can result in corrupted IEEE 802.11 frames due to the frequency overlap. Also called adjacent overlapping channel interference. This definition may vary depending on the source.

Adjacent-channel interference

In wireless LAN technology, the strength or the amount of power of a radio frequency signal.

Amplitude

Two characteristics of RF signals are:

Amplitude Phase

Two characteristics of RF signals are?

Amplitude and Phase

logical

An IP address is a ______ address.

Which two channels could be used so that the access points do not interfere with each other in an 802.11g/n wireless network? (Choose three)

B - Channel 1 and Channel 9 C - Channel 6 and Channel 11 D - Channel 2 and Channel 8

How many access points can be co-located without channel reuse in the same RF area to maximize total system throughput while minimizing RF interference in an 802.11g/n network?

B - Three

Supported by WPA and WPA 2.0, RADIUS utilizes which type of authentication? A) 802.1X/WPA B) 802.1X/EAP C) 802.11X/WPA D) 802.11X/EAP E) 802.11AX/WPA F) 802.11AX/EAP

B) 802.1X/EAP

Enterprise-grade access points commonly include three types of antennas, choose the correct antennas from this list: A) Multi-directional B) Semi-directional C) Omnidirectional D) Mostly directional E) Highly directional F) Half-directional

B) Semi-directional C) Omnidirectional E) Highly directional

A ___ Topology Consist of multiple devices connected by a single shared medium

Bus

A high speed linear topology is defined as a ___?

Bus

After your city implemented a municiapl WIFI network using 802.11g on channels 1, 6, and 11 near your office, your users have been complaining about poor performance on their 802.11b VoWifi phones. The best solution for optimizing your 802.11a/g network to support VoWiFi in this scenario is to _________

Buy new 5 GHz capable VoWiFi phones

2. A high-speed linear topology is defined as a _____? A. Ring B. Mesh C. Bus D. Star

C

Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way? (Choose 2.) A. PCI B. PCMCIA C. USB 2.0 D. PCIe E. Mini-PCI

BC

Wireless bridges must be configured with and . (Choose 2.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy

BC

Which of the following is a benefit of a wireless repeater? (Choose 2.) A. Higher data transfer rate B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput E. Extends cell size

BE

When implementing a wireless LAN, what is the area covered by an AP and usable by a client station called?

Basic Service Area

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _________ frames, and active scanning, where a client sends and receives _________ frames.

Beacon ; Probe

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _______ frames, and active scanning, where a client sends and receives ________ frames.

Beacon; Probe

An operation mode that allows a wireless access point to be set in an operation mode for wireless point-to-point or point-to-multipoint configurations connecting two or more LANs together.

Bridge mode

How many unlicensed UNII-1 band channels are available for wireless LANs?

4

The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage.

48

The 802.3-2005 clause 33 standard specifies ___ VDC as the nominal voltage.

48 VDC

The nominal voltage supplied to Power over Ethernet (PoE) devices and specified in the IEEE 802.3-2005 Clause 33 amendment.

48 VDC

What is the nominal voltage for PoE?

48 volts of DC or VDC

802.11a-1999

5 GHz frequency space Orthogonal Frequency Division Multiplexing (OFDM) less-crowded 5 GHz U-NII bands U-NII-1, U-NII-2, and U-NII-3 band data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps

802.11a operates in the _______ GHz frquency ranges and uses the ______- frequency bands.

5, UNII

Stations operating in which two IEEE 802.11 amendments are interoperable?

802.11b and 802.11g

A, C, D

802.11b is capable of which of the following data rates? (choose 3) A. 1 Mbps B. 6 Mbps C. 5.5 Mbps D. 11 Mbps E. 12 Mbps

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity

A

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint

A

HR/DSSS devices operate in which frequency range?

A - 2.400 GHz ISM

DSSS uses which spreading code in 1 Mbps?

A - Barker

Six wired clients can connect to a wireless LAN by using which device?

A workgroup bridge

Which items describe a service set identifier (SSID)? (Choose two.) A. 32 characters maximum B. 64 characters maximum C. Is case sensitive D. Is not case sensitive

A. 32 characters maximum C. Is case sensitive

A service set identifier (SSID) has a maximum limit of how many characters or octets?

A. 8 B. 16 ~C. 32~ D. 128

A basic service set identifier (BSSID) is the unique identifying MAC address of the ____________. A. AP radio B. AP Ethernet port C. Router D. Client

A. AP radio

View the figures and correctly identify the antenna types illustrated in the figures.

Figure 1: Parabolic Dish Figure 2: Grid

A spread-spectrum technology used in IEEE 802.11b and IEEE 802.11b/g with data rates of 5.5 and 11 Mbps set on a specific radio frequency channel.

High rate/direct-sequence spread spectrum (HR/DSSS)

802.11b-1999

High-Rate DSSS (HR-DSSS) 2.4 GHz to 2.4835 GHz ISM band Complementary Code Keying (CCK) Barker code data rates of 1, 2, 5.5, and 11 Mbps

What is an accurate description of peer communication

Horizontal link and Logical Link

Operating system feature that allows for replacement of computer system components and devices without powering down the system.

Hot-plug

In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?

How will PoE be supplied to WiFi client devices?

Given: Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?

IBSS

Given: Several users are required to transfer files among themselves in a conference room. No APs are availbale for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?

IBSS

Manufacturers design hardware used for wireless LANs based on a common set of criteria or rules known as standards. The name of the organization responsible for creating 802.11 WLAN standards is what?

IEEE

The Institute of Electrical and Electronics Engineers, a nonprofit organization responsible for generating a variety of technology standards, including those related to information technology.

IEEE

Which of the following organizations are responsible for standards compliance?

IEEE

Which organization is responsible for creating standards for wireless computer networking?

IEEE

802.11 b/g/n

IEEE 802.11 iterations that support amendment b

802.11 , 802.11b, 802.11g, 802.11n

IEEE 802.11 iterations that use the 2.4 GHz ISM band.

802.11a, 802.11n

IEEE 802.11 iterations that use the 5 GHz UNII bands

Which communication amendments are commonly supported by consumer and SOHO-grade access points?

IEEE 802.11b IEEE 802.11g IEEE 802.11n IEEE 802.11ac

2.4-2.5 GHz

IEEE 802.11g WLANs operate in what frequency range?

A

IEEE 802.11n devices use an enhanced radio technology known as multiple-input multiple-output (MIMO). Which statement correctly describes a benefit of MIMO? A. MIMO uses reflections to allow for increased throughput. B. MIMO rejects reflections to allow for increased throughput. C. MIMO uses a single radio with diversity technology for increased throughput. D. MIMO rejects data rates less than 54 Mbps for increased throughput.

Authentication

IEEE 802.1X authorization framework - Extensible Authentication Protocol (EAP) preshared keys (PSKs)

SOHO-grade access points also provide more advanced security features, such as user-based authentication ___________________ and _____________________.

IEEE 802.1X/EAP VPN pass-through

An amendment to the Ethernet standard for Power over Ethernet (PoE) that addresses supplying both data and DC power over a single Ethernet cable. It allows for a maximum of 15.4 watts of power at the port and is also known as IEEE 802.3-2005 Clause 33.

IEEE 802.3af

IEEE Std 802.11-2007

IEEE consolidated 8 rati! ed amendments along with the original standard IEEE Std 802 .11-1999 (R 20 03) IEEE Std 802 .11a-1999 IEEE Std 802 .11b-1999 IEEE Std 802 .11d-20 01 IEEE Std 802 .11g-20 03 IEEE Std 802 .11h-20 03 IEEE Std 802 .11i-20 04 IEEE Std 802 .11j-20 04 IEEE Std 802 .11e-20 05

Who manages the RF spectrum Globally

IRU-R(International Telecommunication Union-Radiocommunication)

Radio bands that are reserved internationally for the use of radio frequency for industrial, scientific, and medical (ISM) purposes.

ISM

What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?

In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other

What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?

In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other.

A

In the 802.11a amendment, the UNII-3 band can be used for which of the following WLAN applications? A. Indoor and outdoor B. Outdoor only C. Indoor only D. The UNII-3 band cannot be used for WLANs.

In the 802.11i amendment the UNII-3 band can be used for which of the following WLAN applications?

Indoor and Outdoor

An architecture, developed by IBM, which allowed for expansion cards in early models of personal computers.

Industry Standard Architecture (ISA)

802.11s-2011

Access points can therefore act as portal devices to a wireless distribution system (WDS) proposes the use of a protocol for adaptive, autoconfiguring systems that support broadcast, multicast, and unicast traffic over a multihop mesh WDS

How does the book define a consumer-grade access point?

Access points that are usually equipped with an Internet port, several ports for Ethernet connections, and a wireless access point.

Which of the following is correct regarding 802.11e?

Addresses wireless quality of service

Data Link

At which layer of the OSI model are bits compiled into frames?

20. Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF

B

Power sourcing equipment delivers which of the following? A. RF power to the access point B. DC power to the end device C. RF power to an antenna D. DC power to an antenna

B

Radio frequency channels that do not occupy the same part of the radio spectrum. In IEEE 802.11 wireless networking, there must be a separation of five channels or 25 MHz to be considered nonoverlapping.

Nonoverlapping channels

The Capacity of an access point is dependent upon which two factors?

Number of Users Software Applications

The process in which a WLAN client connection moves from one access point to another is called ____________. A. Reauthentication B. Roaming C. Rebuilding D. Roving

B. Roaming

DSSS uses which spreading code at 1mbps

Barker

application, presentation, session, transport, network, data link, physical

OSI levels

Which item has an effect on RF line of sight?

Obstacles

Tube shaped Antenna forms what type of direction of connection?

Omnidirectional

What level of the OSI model Consist of bit level data streams and Computer network Hardware connecting the devices together

Physical Layer

A change in radio frequency power is a relative measure. Examples include loss of RF power due to a cable (dB) and passive gain of an antenna (dBi).

Relative measure of power

TCP is

Reliable

This advanced security feature allows for small- to medium-sized businesses to provide their own advanced authentication features without the need of an external server.

Remote Authentication Dial-In User Service (RADIUS)

An operation mode that allows a wireless access point to be set in an operation mode to extend the wireless RF cell for wireless client devices not within hearing range of a wireless access point.

Repeater mode

Which topology may use a token passing access method?

Ring

ABC Company is comprised of four departments: sales, marketing engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _____________

Role Based Access Control (RBAC)

The default operation mode for enterprise-grade access points.

Root Access Point Mode

This operation mode involves connecting the access point to a distribution system.

Root Access Point Mode

The default mode of most access points; it allows wireless LAN client devices to connect to a wireless network and use computer network resources.

Root access point mode

Which access point mode involves connecting the access point to a distribution system for user access to the LAN?

Root access point mode

Which access point mode involves connecting the access point to a distribution system for user access to the LAN

Root access point mode

Unlicensed National Information Infrastructure (U-NII) is a radio frequency range used by IEEE-802.11a/n devices and for point-to-point or point-to-multipoint connections. The UNII band consists of a lower, middle, and upper band with four frequency ranges and is used for IEEE wireless LANs.

UNII

Physical addresses on a network device are responsible for which of the following?

To identify which device should receive the information

5.725-5.825 GHz

UNII-3 frequency band

ring topology

Topolgy still widely used by ISPs for high-speed, resilient backhaul connections over fiber-optic links

You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter. Which card would work best in this case? A. PCI B. Half Mini-PCIe C. PCMCIA D. ISA

C

Which frequency range are used in an 802.11a compliant WLAN? (Choose two)

C - 5.25 GHz UNII range D - 5.35 GHz UNII range

The layout or physical design and interconnection of a computer network. A topology includes the cabling and devices that are part of the network.

Topology

What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology

WMAN

What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology?

WMAN

Which two channels could be used so that the access points do not interfere with each other in an 802.11b wireless network?

Channel 2, 3, 6, 8, 9, and 11

Neighbor Reports

gives client stations the ability to learn from access points or W LAN controllers about other access points where the client stations might potentially roam

802.11n-2009

greater throughput - High Throughput (HT) use multiple-input, multiple-output (MIMO)

True or false, PoE spends AC voltage and computer data over the same Ethernet cable, enabling a device to receive AC power and computer data simultaneously.

False, DC power

True or false, In a full mesh network all nodes connection together with one path for every node.

False, full mesh needs at least two paths for every node.

15. Which protocol is used to guarantee delivery? A. UDP B. IP C. ARP D. TCP E. HTTP

D

10BaseT and 100BaseT implementations use ______ pair(s) of wire(s) to carry data.

two

Half-duplex is defined as a ______-way communication that occurs in _______ direction at a time.

two one

Without any regulatory domain taken into consideration

the 2.4 ghz frequency range allows for how many channels using 802.11b? ,14

802.11p-2010

upport Intelligent Transportation Systems (ITS) applications Wireless Access in Vehicular Environments (WAVE)

Channel Statistics

use this information for channel management decisions

Replacing an antenna on a wireless access point will also change the __________ and ________________ beamwidths

vertical horizontal

What allow a variety of wireless devices access to any network resources that the device or user may have permissions for.

wireless access points

What allows a variety of wireless client devices to access any network resources that the device or user may have permissions for?

wireless access points

This device can be used to extend a corporate network to a remote location through a secure connection using a WAN or the Internet.

wireless branch router or remote access point, the book uses both terms

802.11d-2001

written for compliance with the regulatory domains Country code informatio - beacons and probe responses

An independent basic service set (IBSS) consists of how many access points?

~A. 0~ B. 1 C. 2 D. 4

Which items describe a service set identifier (SSID)? (Choose two)

~A. 32 character maximum~ B. 64 character maximum ~C. Is case sensitive~ D. Is not case sensitive

A basic service set identifier (BSSID) is the unique identifying MAC address of the ________.

~A. AP radio~ B. AP Ethernet port C. Router D. Client

The IEEE 802.11 association process happens after which phase?

~A. Authentication~ B. Distribution C. Deauthentication D. Re-authentication

As a device moves away from an access point, which of the following is true regarding dynamic rate switching?

~A. Data rate decreases~ B. Output power decreases C. Data rate increases D. Output power increases

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

~A. One ore more~ B. Two or more C. Three or more D. Four or more

In order to set up an ad hoc network, a user must know which two parameters? (choose two)

~A. SSID~ B. BSSID ~C. Channel~ D. Mac address E. Protection Mode

True or false, Centralized data forwarding reduces the amount of infrastructure traffic because the controller-managed access point is able to make more decisions, taking some of the load away from the wireless controller.

False, this describes distributed data forwarding

A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the operating system C. Hardware to install a PCI card D. Hardware to install a client bridge

A. Software to control a wireless NIC

An actual power measurement, not a ratio or a relative value; examples include watt (W), milliwatt (mW), and decibel relative to one milliwatt (dBm).

Absolute measure of power

Occurs when material absorbs an RF signal. None of the signal penetrates through the material.

Absorption

True or false, consumer-grade access points are typically equipped with NAT, DHCP, DNS services, and wireless repeater functionality.

False, wireless repeater functionality is typically not a feature of consumer-grade access points.

IEEE 802.11a uses which PHY technology

OFDM

In what type of WiFi deployment is an antenna mounted using a pole mounting kit, as shown in the exhibit?

Outdoor Bridging

What Layer of the OSI model is responsible for organizing the bit level data for communication of devices on a network and detecting and correcting physical level errors

Data Link

What layer of the OSI reference model is responsible for data framing for a given physical layer technology?

Data Link

Circuitry that carries data between components such as the CPU, memory, and expansion boards or slots within a computer.

Data bus

Which component is required for a successful installation and operation of an 902.11n wireless USB adapter?

Device Driver

Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN

Device Driver

True or False: An administrator should always configure an access point from the wireless network.

False

SOHO access pints are typically configured by using ___ and ___

HTTP/HTTPS

IEEE 802.11a/b/g/n devices use what type of communication?

Half Duplex

Identify the two configuration methods for access points.

GUI CLI

Which protocol is responsible for addressing and routing?

IP

Industrial, Scientific, Medical

ISM

At which of the following layers of the OSI model does WLAN function?

Layer 1 and Layer 2

Which Layer of the OSI model do wireless Ethernet repeaters function?

Layer 2

Which layer of the OSI model is responsible for delivering data to a unique hardware address?

Layer 2

If a user with a wireless client device moves from one radio cell to another and maintains connectivity, ___________ occurs.

Layer 2 transition (roaming)

Layer 3 (Network)

Layer where the IP protocol resides

Sixth layer of the OSI Model

Presentation

LAN

Local Area Network

The IP address of a network adapter is also known as which address.

Logical Address

The IP address of a network card is known as what address

Logical Address

The physical address of a network adapter is the

MAC address

MAN

Metropolitan Area Network

security

The 802.11i amendment to the standard addresses which technology?

Select the statement that correctly describes the Wi-Fi Alliance's primary role in the WLAN industry.

The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.

Device that prepares information to be sent across the air in the form of radio frequency.

Transmitter

What two devices use RF to communicate?

Transmitter Receiver

Fourth layer of the OSI Model

Transport

True or false, It is common for SOHO-grade access points to be able to act as DHCP servers.

True

Logical Link Control (LLC) and Media Access Control (MAC)

Two sublayers of Data Link Layer:

How many access points can be co-located without channel reuse in the same radio frequency area to maximize wtotal system throughput while minimizing RF interference in a n IEEE 802.11g network?

Three

Point to Multipoint links consist of ___ or more connections

Three

5.15-5.25 GHz

UNII-1 frequency band

5.25-5.35 GHz

UNII-2 frequency band

What allows an administrator the ability to separate physical ports into logical networks?

VLAN technology

Which of the following statements is true regarding a wireless LAN controller?

VLANS seperate the network

Identify the strongest passphrase-based secuirty mechanism for 802.11 wireless networks.

WPA2-Personal

In December 2011, a security flaw was reported with _______

WPS

FCC

What organization is responsible for unlicensed frequency band regulation in the United States?

Physical Layer

Which layer of the OSI model uses physical addresses to deliver data to the destination?

B

Which of the following best describes the Wi-Fi Alliance? A. US-based standards organization B. Interoperability testing organization C. Works with the FCC to verify compliance D. Local regulatory body for Europe

D

Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification? A. Security/encryption B. Fast transition C. Management frame protection D. Quality of Service

What is used as a relative measurement of signal strength at the receiving client on an 802.11 wireless LAN?

RSSI

Radio frequency signals from sources other than the transmitter and receiver that are in communication with each other.

Radio frequency noise

The distance that a radio frequency will travel, which is based on the wavelength. The higher the frequency is the shorter the wavelength will be and the result will be shorter range.

Range

The measurable amount of radio frequency signal usable by a receiver.

Receive sensitivity

Ring topolgy

Which topology may use a token passing access method?

A self-forming, self-healing, intelligent network used to route data frames between access points or "nodes" with one or more of the access points connected to a network infrastructure.

Wireless mesh networking

A wireless network management system (WNMS) is a software-based, hardware-based, or cloud-based solution that allows for centralized management and control of a wireless network and may allow work with wired networks.

Wireless network management system

Point-to-multipoint

_________ WANs are often called "clouds".

Encapsulation

__________ allows for Application layer data communication between two stations using lower layers as a support system.

Cloud-managed access points are able to function on their own should connectivity with the controller be temporarily lost, the description of this technology includes the term:

adaptive access point

The term encapsulation means to

add later header and trailer information to a payload

Which are relative measures of RF power? (Choose two.)

dBi and dB

Which of the following formulas can be used to derive dBi values from dBd values?

dBi=dBd+2.14

A decibel referenced to one milliwatt (mW), and an absolute measure of radio frequency power.

dBm

Hybrid Wireless Mesh Protocol (HWMP)

default path selection metric

802.11ad-2012

defines Very High Throughput (VHT) enhancements Galois/Counter Mode Protocol (GCMP)

802.11v-2011

defines methods of retrieving information from client stations Wireless Network Management (WNM)

802.11aq

delivery of network service information prior to the association of stations on an 802.11 network allow advertisement of services to stations prior to the stations' actual association to the network

When RF passes or bends around an obstacle such as a building or column, the behavior is:

diffraction

If one connects access points that are not directly plugged into a port on the WLAN controller, they are using a feature known as ______________________

distributed access point connectivity

802.11i-2004

encryption protection from modification identity verification

Identify the two ways that power sourcing equipment deliver power to the device.

endpoint injector midspan injector

802.11z-2010

establish and standardize a Direct Link Setup (DLS) mechanism

Wireless Network Management (WNM)

exchange location information, provide support for the multiple BSSID capability, and offer a new WNM-Sleep mode

True or false: A benefit of a wireless LAN controller is distributed administration.

false

True or false: An administrator should always configure an access point from the wireless network.

false

802.11ai

fast initial link setup (FILS) secure link setup in less than 100 ms

Controller-managed access points are centrally managed from the _____________ _______________ ______________.

hardware WLAN controller

As seen in a two-dimensional (X/Y) view, the amplitude of an RF signal is:

height

802.11k-2008

radio resource measurement (RRM) Transmit Power Control (TPC) Client Statistics Channel Statistics Neighbor Reports

Transmit Power Control (TPC)

reduce interference

When an RF signal bounces off a smooth nonabsorptive surface, the behavior is:

reflection

dBi is a(n) ___________ measurement of gain introduced by ___________?

relative; an antenna

OFDM

IEEE 802.11a uses which PHY technology?

Static output transmit power of a SOHO access point is typically:

15 dbm

A self contained Intelligent access point is

Autonomous

The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage. A. 32 B. 57 C. 48 D. 12

C

Which of the following is not an advantage of an IBSS network?

Easy to secure

The data layer of the OSI model is divided into which two sublayers

LLC/MAC

WAN

Wide Area Network

physical and data link

At which two layers of the OSI model do wireless LANs operate?

Which of the following channels are considered non-overlapping in the 2.4 GHz band?

1 and 6

Which two channels are considered nonoverlapping in the 2.4 GHz band?

1 and 6

Which two channels are considered non-overlapping in the 2.4 GHz band

1, 6

How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band

11

How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band?

11

What is the maximum data rate of HR/DSSS 802.11b devices?

11mbps

How many channels are available for wireless LAN use in the unlicensed 2.4 GHz ISM band?

14

How many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?

14

What is the typical RF transmit power of a SOHO-grade access point?

15 dBm or 32 mW

What is a valid logical IP address?

192.168.200.1

what is a valid IP address

192.168.200.1

802.11b capable of which of the following data rates?

1Mbps, 5.5Mbps, 11Mbps

FHSS uses which communication method to exchange data?

1mhz-wide subcarriers

Which IEEE standard does PoE fall under?

802.3 Ethernet

Formerly IEEE 802.3af, an amendment to the Ethernet standard for Power over Ethernet (PoE). Addresses supplying both data and DC power over a single Ethernet cable.

802.3-2005 Clause 33

How many data bits does serial communication transmit at a time?

1

What is the relationship between Decibel Relative to a Milliwatt (dBm) and milliwatt (mW)?

0 dBm = 1 mW

802.11e-2005

2 MAC methods needed to meet the QoS requirements for time-sensitive applications over IEEE 802.11 WLANs

Wi-Fi certified network devices can operate in what frequency band(s)?

2.4 GHz and 5 GHz

WiFi certified network devices can operate in what frequency band(s)?

2.4 GHz and 5 GHz

HR/DSSS devices operate in which frequencyt rane?

2.4 ghz ISM

IEEE 802.11g WLANs operate in what frequency range?

2.4-2.5ghz

IEEE 802.11g wireless networks can operate in which unlicensed RF band?

2.400-2.500 GHz ISM

an 802.11b channel is how wide in MHz

22 MHz

An 802.11b channel is how wide in MHz?

22MHz

An HR/DSSS channel is how wide?

22mhz

In the 2.4 GHz range, what distance between the center frequencies (in megahertz) is required for two channels to be considered nonoverlapping for HR/DSSS?

25 MHz

In the 2.4 GHz range, what distance between the center frequencies is required to be considered non-overlapping for HR/DSSS?

25 MHz

New Modulation

256-QAM modulation 30 percent increase in speed

How many nonoverlapping channels are available in the unlicensed 2.4 GHz ISM band?

3

Static output Transmit power of a SOHO access point is typically

32 dbm

802.11y-2008

3650 MHz-3700 MHz licensed band in the United States requires content-based protocol (CBP) dynamic STA enablement (DSE) procedures

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?

4

802.11a operates in the __________ GHz frequency range and uses the ___________ frequency bands.

5, UNII

Which frequency randes are used in an IEEE 802.11a-compliant wireless LAN?

5.25 ghz UNII range 5.35 ghz UNII range

A wireless repeater can reduce the data throughput by up to _____ percent.

50

OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate of ___ mbps.

54

According to 802.11a amendment which of the following data rates are mandatory

6, 12, and 24 mbps

Wired Equivalent Privacy (WEP)

64-bit static encryption

802.11g is backward-compatible with which of the following IEEE wireless LAN standards?

802.11 DSSS 802.11b HR/DSSS

Which IEEE 802.11 standard and which wireless access point grade can support Wi-Fi multimedia certifications and QoS?

802.11e Enterprise-grade

You are hired by ABC Company to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ______ or ______ amendments to the 802.11 standard. (Choose 2)

802.11g 802.11n

DSSS and HR/DSSS

802.11g is backward-compatible with which IEEE wireless LAN standards? (choose 2)

You are hired by ABC Comapny to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ________ or ________ amendments to the 802.11 standard.

802.11g, 802.11n

Ratified in 2005, which IEEE 802.11 amendment covers security?

802.11i

WPA was developed as an interim solution for which amendment to the 802.11 standard?

802.11i

Devices compiant with which amendment to the IEEE standard use multiple radio chains and multiple antennas

802.11n

The IEEE ________ amendment specifies fast transition (FT) and the IEEE ________ amendment helps with this functionality.

802.11r 802.11k

Which IEEE 802.11 standard and which wireless access point grade can support fast BSS transition (FT)?

802.11r Enterprise-grade

The IEEE ___________ amendment to the IEEE 802.11 standard included wireless mesh networking in 2011.

802.11s

Which IEEE 802.11 standard and which wireless access point grade can support security management frames?

802.11w Enterprise-grade

This IEEE standard defines VLANs.

802.1Q

Which network access method attempts to avoid collision?

A - CSMA/CA

FM radio stations use what type of RF communication?

A - High power, narrow bandwidth

physical

A MAC address is a unique identifier of each device on the computer network and is known as the _____ address.

dynamic frequency selection (DFS)

A P will allow client stations to associate based on the supported channel AP can quiet a channel to test for the presence of radar AP may test a channel for the presence of radar before using the channel AP can detect radar on the current channel and other channels AP can cease operations af ter radar detection to avoid interference interference is detected, the AP may choose a different channel to transmit

Bus

A high-speed linear topology is defined as a ______.

A method used in the design of wireless networks so that overlapping cells are on different or nonoverlapping channels and minimize interference.

Channel planning

Which IEEE ratified amendments were defined in 2012? Choose two. A) 802.3af B) 802.11.af C) 802.11at D) 802.3at E) 802.1at F) 802.1af

A) 802.3af D) 802.3at Note, it is also called PoE+

12. Which of the following is an accurate description of peer communication (Choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network

A,C

An independent basic service set (IBSS) consists of how many access points? A. 0 B. 1 C. 2 D. 4

A. 0

How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8

A. 1

Powered amplifiers provide an increase in signal strength by using ____________ gain. A. Active B. Passive C. Positive D. Maximum

A. Active Active gain requires an external power source to provide an increase in signal strength. An amplifier is an example of a device that uses active gain. Antennas provide an increase in strength by using passive gain.

When an IEEE 802.11g wireless LAN consists only of wireless client stations, the network is operating as what type of basic service set?

A. Active ~B. Independent~ C. Passive D. Infrastructure

Wireless LAN devices in an 802.11a peer-to-peer network will connect to which device(s)?

A. An access point B. 802.11g client devices ~C. 802.11a client devices~ D. A wireless switch

In order for a wireless client to become completely part of the basic service set, it must first _______ and then ______

A. Associate, authenticate ~B. Authenticate, associate~ C. Deauthenticate, authenticate D. Disassociate, authenticate

You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?

A. Association B. Authentication ~C. ERP protection~ D. HT protection

The IEEE 802.11 association process happens after which phase? A. Authentication B. Distribution C. Deauthentication D. Reauthentication

A. Authentication

WLAN controllers may contain which of the following features? (Choose three.) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing

A. Centralized administration B. Captive portal D. Built-in RADIUS services

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

A. Data B. Control ~C. Management~ D. Detail

As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases

A. Data rate decreases

Which component is required for a successful installation and operation of an 802.11ac wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows AutoConfig

A. Device driver

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

A. Different RF channel ~B. Mismatched SSID~ C. Different BSSID D. Mismatches association

A controller-managed access point connected to a port on the WLAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity

A. Direct connectivity

You are a sales engineer connected to an IEEE 802.11a access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

A. Dynamic frequency selection B. Transmit power control ~C. Dynamic rate switching~ D. Transmit Save Mode

Access points work at which layers of the OSI model? (Choose two.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

A. Layer 1 B. Layer 2

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint

A. Midspan

An IEEE 802.11g access point requires a minimum of how many antennas to move data? A. One B. Two C. Four D. Six

A. One 802.11g access points require only one antenna to function. Systems that support antenna diversity will require two antennas to correctly operate.

The open system authentication process uses how many frames?

A. One ~B. Two~ C. Three D. Four

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets? A. One or more B. Two or more C. Three or more D. Four or more

A. One or more

Horizontal beamwidth is ____________ to the earth's surface. A. Parallel B. Perpendicular C. Positive D. Negative

A. Parallel Horizontal beamwidth is parallel to the earth's surface. This is based on how the E-field propagates away from the antenna element. Vertical beamwidth is perpendicular to the earth's surface.

RF line of sight is required for which type of IEEE 802.11 WLAN installation? (Choose two.) A. Point-to-point B. Scattered C. Point-to-multipoint D. Reflected E. Refracted

A. Point-to-point C. Point-to-multipoint Point-to-point and point-to-multipoint both require RF line of sight to be able to effectively communicate. Scattering, reflection, and refraction are all behaviors of RF.

You are a network engineer troubleshooting a WLAN weak signal complaint. While moving a handheld WLAN device, you notice that the signal strength increases when the device is moved from a horizontal to a vertical position. This is because the ____________is changing. A. Polarization B. Wavelength C. Frequency D. Diffusion

A. Polarization Changing the orientation of a device or antenna will change the polarization and affect the received signal strength. The signal strength may either increase or decrease depending on how the polarization is changed from the original position. Wavelength, frequency, and phase are characteristics of RF.

When a wireless LAN device listens for beacon frames, it is participating in which phase?

A. Power save B. Passive Scanning C. Active scanning ~D. Authentication~

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager, who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?

A. Power save mode D. Association Mode ~C. Active mode~ D. Passive mode

The process in which a wireless LAN client connection moves from one access point to another is called _________.

A. Re-authentication ~B. Roaming~ C. Rebuilding D. Roving

In order to set up an ad hoc network, a user must know which two parameters? (Choose two.) A. SSID B. BSSID C. Channel D. MAC address E. Protection mode

A. SSID C. Channel

A patch antenna is an example of which type of antenna? A. Semidirectional B. Omnidirectional C. Highly directional D. Dipole-directional

A. Semidirectional A patch antenna provides semidirectional coverage. The amount of coverage depends on the design and gain of the antenna. Parabolic dishes are highly directional.

Enterprise access points may contain which of the following features? (Choose three.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment

A. WPA 2.0 support B. RADIUS server D. Repeater mode

A basic service set (BSS) consists of how many access points?

A. Zero ~B. At least one~ C. At least two D. At least four

Access points work at which layers of the OSI model? (Choose 2.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

AB

Which of the following are midspan PoE devices? (Choose 2.) A. Single-port injectors B. Multiport injectors C. Endpoint injectors D. Endspan injectors

AB

Enterprise access points may contain which of the following features? (Choose 3.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment

ABD

Wireless LAN controllers may contain which of the following features? (Choose 3) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing

ABD

SOHO access points are typically configured by using and _____. (Choose 2.) A. HTTP B. FTP C. HTTPS D. CLI E. SMTP

AC

SOHO access points commonly support which of the following features? (Choose 3.) A. WPA 2.0 support B. CLI configuration C. Static output power D. Wi-Fi certifications

ACD

Which one of the following adjustments can most benefit a high density environment?

APs with lower output power

What symptom would indicate the presence of a hidden node in a WiFi network?

An increase in retransmisions

Which explanations of antenna usage are the most accurate?

An omni-directional antenna is well suited to provide wireless coverage in most homes A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions

Which explanations of antenna usage are the most accurate?

An omni-directional antenna is well-suited to provide wireless coverage in most homes. A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions.

Seventh layer of the OSI Model

Application

Which layer of the OSI model provides an interface to the user?

Application

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN. What is this process of identity validation called?

Authentication

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN?

Authentication

A self-contained intelligent access point is:

Autonomous

A self-contained intelligent access point that can function as an independent wireless network device.

Autonomous access point

A self-contained unit with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the devices have permission to use.

Autonomous access point

As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing _______ access points, and they could consider ________ to ease the management burden.

Autonomous; a WLAN controller-based architecture

As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing __________ access points, and they could consider _____________ to ease the management burden.

Autonomous; a WLAN controller-based architecture

13. Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network

B

14. At which layer of the OSI model are bits compiled into frames? A. Physical B. Data Link C. Network D. Transport E. Application

B

18. The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP

B

3. The lower three layers of the OSI model are _____, _____, and _____. A. Data link, Physical, Transport B. Physical, Data Link, Network C. Session, Physical, Application D. Application, Presentation, Session

B

A _____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation? A. Notebook B. Desktop C. Tablet D. Barcode scanner

B

A wireless workgroup bridge will allow you to do which of the following? A. Connect two wireless LAN NICs together. B. Connect a wired LAN to an AP. C. Connect a PCI card to a WLAN. D. Connect two client bridges.

B

Most manufacturers recommend installing a wireless IEEE 802.11n USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process

B

Static output transmit power of a SOHO access point is typically: A. 32 dBm B. 15 dBm C. 23 mW D. 15 mW

B

The IP address of a network adapter is also known as which address? A. MAC address B. Logical address C. Layer 4 address

B

USB was designed as a replacement for which two legacy communication connections? A. Serial and PCI B. Serial and parallel C. Parallel and ISA D. Parallel and EISA

B

Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility

B

Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN? A. Mini-PCI card B. Device driver C. Third-party utility D. Enterprise utility

B

Which layer of the OSI model is responsible for addressing and routing? A. Physical B. Network C. Transport D. Application

B

Which layer of the OSI model is responsible for delivering data to a unique hardware address? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

B

Which of the following statements is true regarding a wireless LAN controller? A. Virtual local area networks (VLANs) involve physical separation of ports. B. Virtual local area networks (VLANs) involve a logical separation of ports. C. Virtual local area network (VLAN) is another name for a repeater. D. Virtual local area networks (VLANs) require Power over Ethernet (PoE).

B

You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 2.0 C. Half Mini-PCIe D. PCMCIA

B

What is the maximum data rate of HR/DSSS 802.11b device?

B - 11 Mbps

OFDM uses which communication channel width to exchange data?

B - 20 MHz-wide channel

Which of these statements is true? Choose two. A) All SOHO-grade access points have adjustable RF output power B) Some SOHO-grade access points have adjustable RF output power C) Some consumer-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power E) All consumer-grade access points have adjustable RF output power

B) Some SOHO-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power

Operational Modes of an 802.11g

B-Only Mode - ata rates of 11, 5.5, 2, and 1 Mbps support for DSSS, HR-DSSS, and ERP-DSSS/CCK technology G-Only Mode - data rates of 6-54 Mbps ERP-DSSS/CCK, HR-DSSS, and DSSS is disabled B/G Mode - throughput from 20 Mbps down to as little as 8 Mbps both ERP-DSSS/CCK and ERP-OFDM is enabled

The curvature of the earth will have an impact on the WLAN signal after how many miles? A. 2 B. 7 C. 10 D. 25

B. 7 The curvature of the earth or earth bulge will have an impact on a WLAN signal after seven miles. If the signal needs to travel farther than seven miles, the antenna will have to be installed in a higher location.

802.11a access points support which antenna technology to help reduce the effects of multipath? A. Adjustable gain B. Antenna diversity C. Adjustable polarization D. Antenna multiplexing

B. Antenna diversity 802.11a access points can use antenna diversity. Gain and polarization are considered RF concepts.

A basic service set (BSS) consists of how many access points? A. Zero B. At least one C. At least two D. At least four

B. At least one

In order for a wireless client to become completely part of the basic service set, it must first ____________ and ____________ then. A. Associate, authenticate B. Authenticate, associate C. Deauthenticate, authenticate D. Disassociate, authenticate

B. Authenticate, associate

A wireless workgroup bridge will allow you to do which of the following? A. Connect two WLAN NICs together B. Connect a wired LAN to an access point C. Connect a PCI card to a WLAN D. Connect two client bridges

B. Connect a wired LAN to an access point

Which is required in order to successfully install an IEEE 802.11ac WLAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility

B. Device driver

An azimuth chart shows which RF radiation pattern? A. Vertical B. Horizontal C. Positive D. Negative

B. Horizontal The horizontal RF radiation pattern of an antenna is displayed using an azimuth chart. The vertical radiation pattern is displayed using an elevation chart.

When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set? A. Active B. Independent C. Passive D. Infrastructure

B. Independent

Which of the following are benefits of a wireless repeater? (Choose two.) A. Higher data transfer rate. B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput. E. Extends cell size.

B. Larger cell size allows more devices to access the medium. E. Extends cell size.

What device is used to shunt transient current to ground in the event of an indirect lightning strike? A. Lightning striker B. Lightning arrestor C. Lightning prevention D. Lightning breaker

B. Lightning arrestor A lightning arrestor is used to protect a WLAN system from an indirect lightning strike. A lightning arrestor will direct transient or induced electrical current to earth ground as a result of a lightning strike.

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association

B. Mismatched SSID

Antennas provide an increase in RF coverage by using ____________ gain. A. Active B. Passive C. Positive D. Maximum

B. Passive Antennas provide an increase in RF coverage by means of passive gain. Passive gain occurs when isotropic RF energy is focused into a specific radiation pattern. Active gain requires the use of an external power source.

When a WLAN device listens for beacon frames, it is participating in which phase? A. Power save B. Passive scanning C. Active scanning D. Authentication

B. Passive scanning

Wireless bridges must be configured with ____________and____________. (Choose two.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy

B. The same SSID C. The same RF channel

The open system authentication process uses how many frames? A. One B. Two C. Three D. Four

B. Two

IEEE 802.11a/b/g access points require ____________ antennas on each radio for diversity functionality. A. One B. Two C. Three D. Six

B. Two An IEEE 802.11a or IEEE 802.11b/g access point will require two antennas for diversity. Although there are two antennas, a single input/single output access point will have only one radio. The access point provides additional intelligence to determine which antenna to use. Other WLAN technologies, such as IEEE 802.11ac MIMO, may use multiple antennas.

Which WLAN adapter can be installed in a computer without the need to disassemble the computer in any way? A. PCI B. USB 3.0 C. PCIe D. Mini-PCI

B. USB 3.0

You want to connect a desktop computer to an IEEE 802.11ac wireless network. Which WLAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 3.0 C. Half Mini-PCIe D. PCMCIA

B. USB 3.0

Most manufacturers recommend installing a wireless IEEE 802.11ac USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process

B. When instructed by the setup utility

Which layer of the OSI model uses physical addresses to deliver data to the destination?

Physical

Which weather element would commonly have an effect on a WLAN system? A. Rain B. Snow C. Wind D. Hail

C. Wind Of the answers listed, wind would have the biggest impact on a WLAN system. Rain, snow, and hail do not affect wireless transmission unless the weather is severe. In this case, the collection of the elements may have an impact on the WLAN signal transmitted or received.

Data Integrity

CCMP uses a much stronger MIC - Message Integrity Check (MIC) in the trailer of all 802.11 frames is a 32-bit CRC known as the frame check sequence (FCS)

In Europe radio Frequencies are managed by

CEPT

Which network access method attempts to avoid collisions?

CSMA/CA

With respect to IEEE 802.11 wireless networking, the capacity is how many wireless client devices or users that an access point can service effectively, offering the best performance.

Capacity

Protocol using mechanisms that attempt to avoid collisions. This protocol is required with IEEE 802.11 wireless networking because the wireless devices have no way of detecting a collision. Instead, devices will use a method that may involve reserving the wireless medium for a specified period of time, attempting to avoid collisions.

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)

A method used with IEEE 802.3 Ethernet networking; it is a contention-based media access control method that Ethernet devices use to share the medium. This method allows for only one device to transmit at any one time. If a collision is detected, the transmitting devices will need to back off for a random period of time and retransmit.

Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

Area of RF coverage extending from an antenna in wireless infrastructure and wireless client devices.

Cell

Wireless LAN Controllers commonly have what abilities?

Centralized Administration Captive Portal Built-In RADIUS services

Configuration of many devices such as wireless access points from one central device, software application, or location.

Centralized administration

Wireless LAN controllers may contain which of the following features? (Choose 3)

Centralized administration, captive portal, and built in RADIUS services

Tunneling of all traffic to a controller from the access point for handling, usually using proprietary methods.

Centralized data forwarding

Radio frequency range assignment varying in frequency based on the use of the device.

Channel

When supported by the manufacturer, a classification signature determines the maximum amount of DC power a device requires, thereby allowing the power sourcing equipment to better manage the amount of DC power delivered to a specific physical port.

Classification signature

The physical carrier sensing performed constantly by all stations that are not currently transmitting or receiving data. CCA is used to determine whether the medium is available for RF transmissions.

Clear channel assessment (CCA)

After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a Wi-Fi network? (Choose 2)

Client Utility Device Driver

After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a WiFi network?

Client Utility, Device Driver

The transmit power control (TPC)

Client can associate with an A P based on their transmit power AP can specify the transmit power of any or all stations A P can change transmission power on stations

Given: In Single-Channel Architecture (SCA) systems multiple access points can use the same BSSID. This feature allows for the creation of a network-wide virtual access point that can be applied across multiple physical access points operating on the same channel.

Client stations do not have to make roaming decisions

CWNP terminology defines co-channel interference as a performance condition that occurs when two or more independently coordinated access point radios are providing RF coverage to the same physical area using the same IEEE 802.11 channel. Additional RF medium contention overhead occurs for all radios using this channel in this physical area, resulting in throughput degradation and latency.

Co-channel interference

In wireless networking, multiple devices or access points in the same RF space and usually on different channels.

Co-location

Operating system feature that allows extensive and detailed configuration of a device such as a wireless access point or wireless LAN controller by using specific commands set by the device manufacturer.

Command-line interface (CLI)

Originally designed as a mass storage device format used in portable electronic devices; now used for a variety of devices and technologies, including Ethernet networks, Bluetooth, digital cameras, RFID, and Wi-Fi networks.

Compact Flash

A wireless workgroup bridge will allow you to do which of the following?

Connect a wired LAN to an AP

A WLAN bridge is best-suited for which scenario?

Connecting a portable classroom to a school network

bus topology

Consists of multiple devices connected along a single shared medium with two defined endpoints:

The lower three layers of the OSI model are?

Physical Data Link Network

IP addresses are logical addresses on which layer of the OSI model? A) Transport B) Data-Link C) Internet D) Network E) Session

D) Network Note, the Internet Layer is from the TCP/IP Model

Omnidirectional antennas have a horizontal beamwidth ____________ of degrees. A. 90 B. 180 C. 270 D. 360

D. 360 Omnidirectional antennas have a horizontal beamwidth of 360°. The vertical beamwidth will vary depending on the design and the gain of the antenna.

A point-to-point wireless link requires what percent of the Fresnel zone to be clear in order to be considered to have an acceptable RF line of sight? A. 0 B. 20 C. 40 D. 60

D. 60 It is recommended that at least 60 percent of the Fresnel zone be free of obstruction in order to have acceptable RF line of sight. Up to 40 percent of the zone can be blocked by obstructions without affecting the signal.

Enterprise-grade IEEE 802.11n/ac client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey

D. Site survey

In computer network terminology, the definition of half-duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time

D. Two-way communication one way at a time

You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0

D. Wireless USB 2.0

Power sourcing equipment delivers which of the following?

DC power to the end device

power sourcing equipment delivers which of the following?

DC power to the end device

___ allows for application layer data communication between two stations using lower layers as a support system.

Data Encapsulation

At which layer of the OSI model are bits compiled into frames?

Data Link

Second layer of the OSI Model

Data Link

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors.

Data Link

What unit of measurement is used to measure the power difference between two RF signals?

Decibel

A ____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation?

Desktop

Software that allows components such as network adapters, keyboards, mice, video cards, and all other attached devices to communicate with a computer operating system.

Device driver

Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter

Device driver

Effect that occurs when an RF signal passes an obstacle, such as a building. The RF wave changes direction by bending around the obstacle.

Diffraction

When RF passes or bends around an obstacle like building or column, the behavior is ?

Diffraction

Effect that occurs when the RF signal naturally widens as it leaves an antenna element, resulting in attenuation of the radio frequency signal. Diffusion is the underlying cause of free space path loss.

Diffusion

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following?

Direct connectivity

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate Device is considered to have which of the following?

Direct connectivity

A spread-spectrum technology used in IEEE 802.11 and IEEE 802.11b/g with data rates of 1 and 2 Mbps set on a specific radio frequency channel.

Direct-sequence spread spectrum (DSSS)

A method that allows wireless client devices to compete for the time to transmit frames across the medium. In wireless networking this medium is the air.

Distributed coordinated function (DCF)

Method in which traffic is handled by the edge device such as an access point, eliminating the need to send data through the infrastructure to a wireless LAN controller for processing.

Distributed data forwarding

ABC Company would like to provide WiFi coverage to the are highlighted on the floorplan in the exhibit. If mounted at location-A, what type of antenna would provide a coverage pattern similar to the highlighted area?

Diversity Patch

802.11g standard uses what two physical layer Technologies

ERP-OFDM

The 802.11g standard uses which two physical layer technologies

ERP-OFDM

ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is suing WEP security with a 128-bit key. You have been asked to provide feedback about the strngth of their security. You tell ABC Company that ________.

Each currently-used security mechanism is weak, and the network is insecure

In a typical office building, WiFi clients are likely to experience poor WiFi coverage in what locations?

Elevators, Stairwells

ABC Corporation has decided to deploy their first WiFi netowrk in their corporate headquarters. ABC prepared for adding a WiFi network by installing PoE-capable Ethernet switches in their wiring closets. What type of PoE implementation is this?

Endpoint

A wireless LAN controller or an Ethernet switch that delivers DC voltage directly to connected devices to supply both DC voltage and computer data.

Endpoint device

____________________ delivers DC power directly over the same wire pairs that carry data over the unused wire pairs.

Endpoint injector

VPN solutions are often used in conjunction with WIFi networks for what purpose?

Endpoint secuirty for traveling users connected to unsecure WiFi hot-spots

A wireless infrastructure device with an extensive feature set; it is connected to a distribution system, allowing wireless LAN devices to access computer network resources. Contains at least two network interfaces, 10/100/1000 BaseT/Tx Ethernet (usually) and RF (wireless).

Enterprise access point

List the three interfaces typically available on a wireless branch router/remote access point.

Ethernet port(s) Internet port to connection to the WAN or an Internet connection Wireless port to allow IEEE 802.11 computers and devices to connect to a network through a wireless connection

The "next generation" of a PC card. Lower in cost, smaller in size, and higher in performance.

Express Card

802.11g-2003

Extended Rate Physical (ERP) transmit in the 2.4 GHz to 2.4835 GHz ISM ERP-OFDM - Extended Rate Physical OFDM Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps ERP-DSSS/CCK - used with support for the data rates of 1, 2, 5.5, and 11 Mbps

UNII-3

The _______ band may be used indoors or outdoors but was most commonly used outdoors.

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band

Four

Caused by diffusion, it is the weakening of a radio frequency signal as it travels through open air with no obstructions.

Free space path loss

The number of complete cycles of an alternating current (AC) signal that will occur in a period of one second.

Frequency

What is the term defining the amount of times a cycle of an RF signal will oscillate in one second

Frequency

What is the term defining the number of times a cycle of an RF signal will oscillate in one second?

Frequency

What two factors are used to calculate the wavelength of an RF wave? (Choose 2)

Frequency Speed of light

What two factors are used to calculate the wavelength of an RF wave?

Frequency, Speed of light

Formally known as the Mini-PCIe card, it became known as the Full Mini-PCIe card with the introduction of the Half Mini-PCIe card form factor.

Full Mini-PCIe

An increase in signal strength of an RF signal, caused by an increase in amplitude. See also active gain, passive gain.

Gain

802.11ak

General Link (GLK) bridged networks

Directional antenna See through

Grid

What two types of antennas are used in point to point connections

Grid and Parabola

Which wirelessLAN technologycan be used to obtain the highest data transfer rate possible?

HT-OFDM

SOHO access points are typically configured by using and . (Choose 2.)

HTTP and HTTPS

The Half Mini-PCIe card is half the length of the Mini-PCIe card. The length is the only difference between the two.

Half Mini-PCIe

Two-way communication that occurs in only one direction at a time.

Half-duplex

The amplitude of an RF signal is:

Height

Which of the following is the amplitude of an RF signal?

Height

FM radio stations use what type of RF communication?

High power, Narrow bandwidth

Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main buildings network for web browsing. The main building has an existing 802.11g WiFi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main buildings network?

Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs

Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main building's network for web browsing. The main building has an existing 802.11g Wi-Fi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main building's network?

Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs.

Two or more RF signals interacting with each other and causing a degradation of performance.

Interference

In radio frequency terminology, energy broadcast equally in all directions in a 360 degree spherical manner.

Isotropic

A theoretical concept used in reference and calculations. Assumes that RF energy is broadcast equally in all directions in a spherical manner. An isotropic radiator is an imaginary, perfect antenna.

Isotropic radiator

Two sublayers of Data Link layer

LLC/MAC

Which of the following is a benefit of a wireless repeater?

Larger cell size allows more devices to access the medium

Which of the following is a benefit of a wireless repeater?

Larger cell size allows more devices to access the medium and extends cell size

Where is the use of a Wireless Internet Service Provider (WISP) most appropriate?

Last mile wireless data delivery to homes and businesses

Which Layer of the OSI model do wired Ethernet repeaters function?

Layer 1

Access points work at which layers of the OSI model?

Layer 1 and 2

Access points work at which layers of the OSI model?

Layer 1 and Layer 2

The ability of a transmitter and receiver to "see" each other (visual line of sight) or to transmit RF energy (RF line of sight). RF line of sight is the area of coverage around the visual line of sight.

Line of sight

A decrease in radio frequency power or energy, resulting in lower overall throughput in a wireless network.

Loss

PMD(Physical Medium Dependant)

Lower physical sublayer responsible for transmitting the data onto the wireless medium.

The physical address of a network card is called what

MAC address

The sublayer of the Data Link layer (Layer2) of the OSI model that handles the media access control.

MAC sublayer

IEEE 802.11n devices use an enhanced radio technology known as multiple input multiple output (MIMO) Which statement correctly describes a benefit of MIMO?

MIMO uses reflections to allow for increased throughput.

What statement accurately descibes an advantage of manual RF site surveys over predictive site surverys?

Manual site surverys are useful for locating and identifying sources of RF interference while predictive site surveys are not capable of this task

This operation mode for enterprise-grade access points connects access points together wirelessly without the use of a wired infrastructure.

Mesh Mode

Which of the following devices is an in-line device that will inject DC voltage into Ethernet cable?

Midspan

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable?

Midspan

Usually a single port or multiple port injector; any device that injects DC power into Ethernet cable over the unused pairs of wires to allow both DC power and computer data to the end (powered) IEEE 802.3af device.

Midspan device

_____________________ injects DC power into the Ethernet cable over the unused wire pairs or over the data pairs, depending on the version of the standard in use.

Midspan injector

A measure of radio frequency power that is equal to 1/1000 watt.

Milliwatt (mW)

Variation of the PCI standard designed for laptops and other small-footprint computer systems.

Mini-PCI

Which wireless adapter may require some disassembly of a notebook computer tp install?

Mini-PCI

Identify three of the four PCI card types, as they're generally listed i.e. not worrying about the stupid IA, IB, types

Mini-PCI Mini-PCIe Full Mini-PCIe Half Mini-PCIe

Identify the wireless radio interface type depicted in the illustration.

Mini-PCIe

Replacement for the Mini-PCI card based on PCI Express. Available in three types: Type I, Type II, and Type III. Now called the Full Mini-PCIe card after the introduction of the Half Mini-PCIe.

Mini-PCIe

Technology introduced in the IEEE 802.11n amendment to describe various HT-OFDM data rates depending on the wireless LAN technology in use such as 20/40 MHz wide radio frequency channels or short guard interval.

Modulation and coding scheme (MCS)

What is a wireless bridge?

The ability to connect two or more wired LANs together wirelessly using IEEE 802.11

As an RF signal propagates, it reflects off an object. The reflected signal and the signal following a direct path arrive at the receiver at different points in time. What is the term used to describe this RF behavior?

Multipath

Simple antenna diversity mitigates the adverse effects caused by which common Wi-Fi problem?

Multipath

Simple antenna diversity mitigates the adverse effects caused by which common WiFi problem?

Multipath

Which Wi-Fi technology simultaneously uses multiple radio chains to transmit or receive data?

Multiple Input, Multiple Output (MIMO)

Which WiFi technology simultaneously uses multiple radio chains to transmit or receive data?

Multiple Input, Multiple Output (MIMO)

A technology using multiple radio chains and multiple antennas, allowing for high throughput up to 600 Mbps in IEEE 802.11 wireless networks.

Multiple input/multiple output (MIMO)

As a general rule, where is the most appropriate location to install a dipole antenna?

Near the center of the coverage area

Third layer of the OSI Model

Network

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Network

Which layer of the OSI model is responsible for addressing and routing?

Network

In order to assess your customer's WiFi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting?

Network Administrator, Facilities manager

The way in which devices connected to a common infrastructure communicate and transmit data across a network medium from one device to another, as in CSMA/CD and CSMA/CA.

Network access method

Layer 3 of the OSI model; this layer is where the Internet Protocol (IP) protocol resides and is responsible for the addressing and routing of computer data.

Network layer

IEEE 802.11

Original IEEE 802.11 Standard published in June 1997 - IEEE Std 802.11-1997 revised in 1999 reaffirmed in 2003 - IEEE Std 802.11-1999 (R2003) On March 8, 2007 - IEEE Std 802.11-2007 March 29, 2012 - IEEE Std 802.11-2012

A technology designed to transmit many signals simultaneously over one transmission path in a shared medium; it is used in wireless networking with IEEE 802.11a/g/n networks.

Orthogonal frequency division multiplexing (OFDM)

9, 18, 36, 48, 54 Mbps

Orthogonal frequency division multiplexing data rates supported but not required

6,12,24 Mbps

Orthogonal frequency division multiplexing required data rates

A newer term for the PCMCIA adapter. The PC Card has been replaced with ExpressCard technology.

PC Card

Personal Computer Memory Card International Association, a standards organization that defines and promotes PC card technology. Also used as the name of the card.

PCMCIA

You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter which card would work best in this case?

PCMCIA

Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way?

PCMCIA/USB 2.0

Identifies the Physical layer (Layer 1) of the OSI model, which consists of bit-level data streams and computer network hardware connecting the devices together.

PHY

Directional Dish Bowl shaped

Parabolic Dish

Which WiFi vertical market applications are regulated by a government or industry group for security compliance?

Patient records in hospitals, Consumer payment information in retail stores

A standard for computer interface cards developed by Intel. Cards are inserted into an available slot (interface) in a desktop computer, allowing for the attachment of peripheral devices.

Peripheral Component Interconnect (PCI)

PAN

Personal Area Network

Which two of the following options are available for Wi-Fi protected Access 2 (WPA 2.0)?

Personal Mode Enterprise mode

A particular point in the time of a cycle; measured from some arbitrary zero and expressed as an angle and measured in degrees.

Phase

First layer of the OSI Model

Physical

B

Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network

At which two layers of the OSI model do wireless LANs operate?

Physical/Data Link

Which scenario represents an improper installiation for an AP with low-gain omnidirectional antennas?

Place above the doorway, at one end of a long hallway

Of all the devices listed Secure Digital Input Output (SDIO) cards are most likely to be installed in which?

Pocket PC

A Layer 3 VPN solution that uses the Microsoft 128-bit Point-to-Point Encryption (MPPE) protocol and provides both tunneling and encryption capabilities.

Point-to-Point Tunneling Protocol (PPTP)

three

Point-to-multipoint links consist of __________ or more connections.

semidirectional and highly directional antennas

Point-to-point links typically use which antenna types?

In order to extend network access from Building 1 to Building 2, ABC Company has implemented a WiFi solution. What type of WiFi solution is shown in the figure?

Point-to-point, Semidirectional, Bridge

_________________ is an extension to the IEEE 802.3 Ethernet standard that allows direct current voltage to be supplied over Ethernet cable to wireless access points.

Power over Ethernet

A method for supplying DC voltage and computer data together over a single Ethernet cable.

Power over Ethernet (PoE)

A device that will supply DC voltage and computer data to wired computer network devices such as wireless access points, video cameras, and VoIP phones. PSE can be either an endpoint or a midspan device.

Power sourcing equipment (PSE)

Access point, VoIP phone, camera, or other computer network device that receives Power over Ethernet from the power source equipment.

Powered device (PD)

Given: You are performing a site survey software that simulates RF behavior in a defined environment. It uses a floor plan and materials information for its calculations. What kind of site survey is performed using this method?

Predictive

A software-based site survey tool sold by your company allows your customers to determine access point coverage and optimum placement within a facility without visiting the facility. What is the term that most accurately describes this type of site survey?

Predictive Modeling

A set of rules that defines data communication between devices. TCP/IP is a common protocol set used in computer networking.

Protocol

Media Access Control (MAC)

The bit-level communication is accomplished through _____ addressing.

802.11aa-2012

QoS enhancements to the 802.11 Media Access Control (MAC) improved management, increased link reliability, and increased application performance

802.11ae-2012

QoS management quality-of-service management frame (QMF) service can be enabled

The WiFi Multimedia (WMM) certification, which is illustrated in the exhibit, pertains to which topic?

Quality of Service

Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification?

Quality of Service

Temporal Key Integrity Protocol (TKIP)

RC-4 stream cipher algorithm - enhancement of WEP encryption

RF coverage is also known as the __________

RF cell or basic service area (BSA)

Unobstructed radio communication between a radio transmitter and receiver.

RF line of sight

Frequency Hopping Spread Spectrum (FHSS)

RF signal is considered spread spectrum when the bandwidth is wider than what is required to carry the data Clause 14 devices

An arbitrary number assigned by the radio chipset or device manufacturer. There is no standard for this value, and it will not be comparable between devices from different manufacturers.

Received signal strength indicator (RSSI)

In wireless networking, a wireless device that collects propagated RF energy from the air via an antenna. It demodulates and recovers any data included in the signal.

Receiver

What two devices use RF to communicate? (Choose two.)

Receiver Transmitter

What type of protection does a lightning arrestor provide to a Wi-Fi system?

Redirection of transient current due to nearby lightning strikes

What type of protection does a lightning arrestor provide to a WiFi system?

Redirection of transient current due to nearby lightning strikes

A feature that allows for fault-tolerant deployments and uninterrupted access in the event of access point or wireless LAN controller or other network device failure.

Redundancy

An effect that occurs when an RF signal bounces off a smooth, nonabsorptive surface such as a tabletop and results in the original signal changing direction.

Reflection

When an RF signal bounces off a smooth non-absorptive surface the behavior is called:

Reflection

An effect that occurs when an RF signal passes between mediums of different densities. The signal may change speed and also bend.

Refraction

When an RF signal passes between mediums of diff. densities and may change speed and bend, the behavior is

Refraction

802.11af-2014

TV white space (TVWS)

In addition to wireless networking which adapter was designed for flash memory storage and can be used in a Digital camera?

SDIO

Small office, home office; in wireless LAN terms, SOHO defines a smaller network with fewer client devices than in a large or enterprise deployment.

SOHO

Wi-Fi protected setup was designed for which o f the following wireless applications?

SOHO

The logical name of a WLAN is

SSID

An effect that occurs when an RF signal strikes an uneven surface. Wavefronts of the signal will reflect off the uneven surface in several directions.

Scattering

Semi-Directional Antenna

Sector Antenna

Designed as a flash memory storage device with storage capacities from 8 MB to 4 GB. Now allows for connection of other devices such as cameras, global positioning system (GPS) units, FM radios, TV tuners, Ethernet networks, and Wi-Fi networks.

Secure Digital Input Output (SDIO)

The 802.11i amendment to the standard addresses which of the following technologies?

Security

Point to Point links typically use which antenna types?

Semidirectional and Highly Directional

USB was designed as a replacement for which two legacy communication connections?

Serial and Parallel

Fifth layer of the OSI Model

Session

The purpose of ___ is to allow application layer data communication between two stations

Session Layer

Layer 5 of the OSI model, which opens, closes, and manages sessions between end-user application processes.

Session layer

In what situation is an RF site survey LEAST needed?

Telecommuters using a single "remote AP" at home

The RF noise value in dBm minus the received signal strength in dBm. The minimum recommended value for wireless networking is 20dB to 25dB or higher.

Signal-to-noise ratio (SNR)

The most basic wireless antenna technology used in a wireless LAN system. One antenna is used at the transmitter to transmit data and one antenna is used at the receiver to receive the data.

Single input/single output (SISO)

What are some examples of midspan PoE devices?

Single port injectors/Multiport injectors

Which of the following are midspan PoE devices? (Choose 2.)

Single-port and multiport injectors

Enterprise-Grade IEEE 802.11g client utilities typically contain which advance feature?

Site survey

The capacity of an access point is dependent on which factors? (Choose two.)

Software applications Number of users

device Driver can be used in wireless networking which is an example of a device driver

Software to control a wireless NIC

The radio spectrum is the radio frequency (RF) portion of the electromagnetic spectrum.

Spectrum

What tool is best suited for locating and identifying sources of RF interference, such as microwave ovens?

Spectrum analyzer

UNII-2

The _______ band is for indoor or outdoor uses.

UNII-1

The _______ band is intended for indoor use only.

What echnolofy is used to send WLAN data over a wireless medium using subcarrier frequencies?

Spread-Spectrum

In wireless networking, technology that provides redundancy of the digital data as it traverses through the air by combining a set code with the digital data prior to the transmission.

Spreading code

A single-channel architecture management technique in which each floor or area of a building is assigned a channel to use. Spanning and blanketing are other terms used to identify managed areas based on channels.

Stacking

A separate signal carried on a main radio frequency transmission.

Subcarrier

Which protocol is used to guarantee delivery?

TCP

How many non-overlapping channels are available in the unlicensed 2.4 GHz ISM band?

THREE

What is the most likely cause of low throughput on a hotel's guest network?

The 1.5 Mbps internet connection is creating a bottleneck for the WiFi users

ERP-OFDM and DSSS

The 802.11g standard uses which two Physical layer technologies?

B

The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP

power, range, speed

The IEEE 802.11 wireless networking standard define what some call the _____, ______, and ____ of the radio frequency and WLAN technology.

2.4-2.5, DSSS (HR/DSSS), 5.5, 11

The IEEE 802.11b amendment to the 802.11 standard works in the _______GHz ISM band. This amendment, released in 1999, specifies high rate _____ for ____ and ___ Mbps

802.11e

The IEEE _____ amendment defines enhancements for QoS in wireless LANs and introduced the hybrid coordination function

Logical address

The IP address of a network adapter is also known as which address?

ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy Wi-Fi client devices in the 2.4 GHz ISM band?

The Wi-Fi client devices will experience performance degradation due to co-channel interference.

Select the statement that correctly describes the WiFi Alliance's primary role in the WLAN industry.

The WiFi Alliance tests and certifies product interoperability based upon standards created by the IEEE

ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy WiFi client devices in the 2.4 GHz ISM ban?

The WiFi client devices will experience performance degradation due to co-channel interference

54Mbps, OFDM

The data rates for IEEE 802.11a are up to _____ using____.

Which statement best defines SNR?

The difference between the noise floor and a signal's strength

After successfully connecting to the WiFi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that ask for your name, room number, and a secret key. What has most likely happened?

The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network

physical, data link, network

The lower three layers of the OSI model are ______, _____, and __________.

MAC address

The physical address of a network adapter is the __________.

Given: In ABC Company's branch office, there are three 802.11n access points serviing 20 WiFi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the builiding during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time.

The picnic tables are located at the edge of the effective range of WiFi coverage

IEEE 802.11n

The release of this document opened the doors for manufacturers of IEEE 802.11 wireless LAN equipment, giving them the opportunity to move forward with new technology that allows for better performance, higher throughput, and several other benefits.

Wireless bridges must be configured with ____ and _____,

The same SSID The same RF channel

Wireless bridges must be configured with _______ and _______.

The same SSID and RF channel

D

The term encapsulation means to ____________. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in WiFi networks because ___________.

The wireless transmission medium is half-duplex, thus shared by all users

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in Wi-Fi networks because ___________.

The wireless transmission medium is half-duplex, thus shared by all users.

CompactFlash (CF) cards are available in two types. What is the main difference between the two types?

Thickness

802.11k

This IEEE 802.11 amendment addresses radio resource management.

802.11w

This IEEE 802.11 amendment designed to mitigate DoS or Hijacking attacks.

802.11r

This IEEE 802.11 amendment specifies fast secure roaming or fast transition technology for VoIP with wireless LAN technology

802.11 g

This amendment addresses extended data rates with OFDM technology.

802.11 y

This amendment allows for the use of high-powered wireless LAN equipment to operate in the 3.65-3.7 GHz band.

Layer 7 Application

This layer has protocols such as FTP, HTTP, and POP3.

Layer 5 Session

This layer opens, closes, and manages sessions between end-user application processes.

Layer 6 Presentation

This layer provides delivery and formatting of information for processing and display.

The actual rate at which information is transferred, taking into consideration factors such as overhead, interference, and contention between devices.

Throughput

Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP. What do you tell them is a benefit of using multiple antennas?

Transmit and receive diversity that addresses multipath problems.

Layer 4 of the OSI model, which consists of both connectionless UDP and connection-oriented TCP protocols and provides end-to-end communication services for applications between devices on a computer network.

Transport layer

True of false: Full-duplex allows two-way communication to occur between devices simultaneously

True

True or false, A cell is the area of RF coverage of the transmitter

True

True or false, Firewalls can be hardware-based, software-based, or a combination of the two.

True

True or false, direct access point connectivity is defined as a direct connection to ports on the switch and is typically used with device connection layer hardware wireless controllers.

True

True or false, A wireless branch router/remote access point can build a Layer 3 VPN tunnel between devices allowing the router on each side will act as a VPN endpoint.

True, they can also be configured as a VPN pass-through device

Physical Layer Convergence Protocol (PLCP) and Physical Medium Dependent (PMD)

Two sublayers of PHY physical layer:

In computer Network Terminology, the definition of half duplex is closest to which of the following?

Two-way communication one way at a time

In computer network terminology, the definition of half duplex is closest to which of the following?

Two-way communication one way at a time

Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for dektop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adpater would provide WiFi connectivity to these desktop computers?

USB 2.0

Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for desktop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adapter would provide Wi-Fi connectivity to these desktop computers?

USB 2.0

Universal Serial Bus version 2, which incorporates several changes to USB, including connector types. Data rates allow for a maximum speed of 480 Mbps.

USB 2.0

You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer?

USB 2.0

UDP is

Unreliable

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling WiFi equipment. While evaluating the manufacturer's sepcifications for a specific WiFi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?

User Identity validation

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling Wi-Fi equipment. While evaluating the manufacturer's specifications for a specific Wi-Fi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?

User identity validation

Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concersn about wireless hot-spot usage. To address these concerns, what advice should you give to your traveling users with regard to wireless hot-spot usage?

Verify that personal firewall and antivirus software are both enabled before connecting, Always use company-provided VPN client software after connecting to the WiFi network

802.11ac-2013

Very High Throughput (VHT) enhancements below 6 GHz 5 GHz frequency bands Wider Channels New Modulation More Spatial Streams Improved MIMO and Beamforming

A logical separation of ports to define broadcast domains in a Layer 2 network, independent of their physical location.

Virtual local area networks (VLANs)

Which of the following statements is true regarding a wireless LAN controller?

Virtual local area networks involve a logical separation of ports

Technology that allows for private communications over a public network infrastructure such as the Internet. A VPN creates a secure tunnel for the user and the connected endpoint.

Virtual private network (VPN)

The ability of the transmitter and receiver to see each other.

Visual line of sight

You support a wireless network for an office of five employees. The installation consists of one access point three notebook computers, and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fi WPA 2.0 certified you want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment?

WPA 2.0 personal/WPS

Enterprise access points may contain which of the following features?

WPA 2.0 support RADIUS server Repeater Mode

Enterprise access points may contain which of the following features? (Choose 3.)

WPA 2.0 support, RADIUS server, and repeater mode

SOHO access points commonly support which of the following features? (Choose 3.)

WPA 2.0 support, static output power, and wifi certifications

802.11i

WPA was developed as an interim solution for which amendment to the 802.11 standard?

The Wi-Fi Alliance certifications include several standards for security and QoS listed in the chapter, name them.

WPA/WPA 2.0 for security WMM and WMM-PS for QoS

SOHO access points commonly support which of the following features?

WPA2.0 support/Static output power/Wi-Fi certifications

The basic unit of measurement for radio frequency power.

Watt (W)

Which are absolute measurements of RF Power

Watt and mW

The distance of one complete cycle or one oscillation of an AC signal. Wavelength is typically identified by the Greek symbol lambda.

Wavelength

The range of a 2.4 GHz signal is mostly dependent on which RF characteristic?

Wavelength

direct sequence spread spectrum

What does DSSS stand for?

orthogonal frequency division multiplexing

What does OFDM stand for?

B

Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF

Network (layer3)

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Network (layer 3)

Which layer of the OSI model allows physical addressing and routing?

Network Layer

Which layer of the OSI model is responsible for addressing and routing?

Data Link

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors?

Application Layer

Which layer of the OSI model provides an interface to the user?

MIMO

_____is a big part of what makes IEEE 802.11n such an amazing technology

A and C

Which of the following is an accurate description of peer communication (choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network

D

Which of the following is correct regarding 802.11e? A. Only operates in the 5 GHz frequency range B. Only operates at 1, 2, 5.5, and 11 Mbps C. Addresses wireless security D. Addresses wireless quality of service

E

Which of the following organizations is responsible for standards compliance? A. FCC B. ETSI C. IEEE D. WPA2 E. Wi-Fi Alliance

TCP

Which protocol is used to guarantee delivery?

personal mode w/passphrase and enterprise mode using 802.1X/EAP

Which two options are available for Wi-Fi Protected Access 2 (WPA 2.0)?

An organization formed to promote IEEE standards for wireless LAN technology and manufacturer interoperability testing.

Wi-Fi Alliance

SOHO

Wi-Fi Protected Setup was designed for which wireless application?

How do Wi-Fi routers differ from Wi-Fi access points?

Wi-Fi routers are comprised of both a router and an access point within the same hardware.

As an alternative to using leased lines to connect two offices on the same campus, your customer wants to implement a WiFi solution. When asked by your customer, what advantages do you cite regarding use of a WiFi infrastructure instead of a leased line?

WiFi implementations have a lower total cost of ownership than leased lines, WiFi implementations offer more flexibility and easier expansion than leased lines.

How do WiFi routers differ from WiFi access points?

WiFi routers are comprised of both a router and an access point within the same hardware

This operation mode for enterprise-grade access points can connect two or more LANs.

Wireless Bridge Mode

Mesh Mode has made this obsolete.

Wireless Distribution System (WDS)

ABC Manufactoring currently has 35 access points throughout their main facility, and each Friday afternoon two adminitrators walk the premises with specturm and protocol analyzers to detect unauthroized devices and network activity. You have noted several problems with this approach. To address the inefficiencies with this approach and to provide the most robust preventative security, you have set aside a portion of the department's budget to install a ______.

Wireless Intrusion Prevention System (WIPS)

A ________ will help determine and have the potential to mitigate certain levels of wireless intrusions or attacks on the network.

Wireless Intrusion Prevention Systems (WIPS)

What can help detect a rogue access point?

Wireless Intrusion Prevention Systems (WIPS)

Your customer has asked you to recommend a Wi-Fi solution that includes the following features: • Role Based Access Control • Stateful Firewall • Quality of Service What device type can perform all of these functions?

Wireless LAN Controller

Your customer has asked you to recommend a WiFi solution that includes the following features: 1. Role Based Access Control 2. Stateful Firewall 3. Quality of Service

Wireless LAN Controller

A device that usually consists of an Internet port, small Ethernet switch, and wireless access point. It allows SOHO and residential users to connect devices to the network and access the Internet. Also known as wireless broadband router or wireless residential gateway.

Wireless LAN router

This operation mode for enterprise-grade access points can act to extend the RF cell.

Wireless Repeater Mode

You have a notebook computer and wish to connect to an IEEE 802.11n wireless network the computer does not have a built in wireless LAN card or a pc card interface you do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution?

Wireless USB 2.0

A wireless networking device used to extend a corporate network to a remote location such as a home, conference room, or branch office through a secure connection using a wide area network or the Internet. It may contain Ethernet switch capabilities and a wireless access point.

Wireless branch router

A device used to connect two or more local area networks together using radio frequency. It can be configured in either point-to-point or point-to-multipoint configurations.

Wireless bridge

A device used in wireless LAN technology allowing centralized administration and control of access points, including radio management, security, VLANs, and redundancy.

Wireless controller

A system that connects basic service sets together, making an extended service set using RF instead of physical cabling such as Ethernet.

Wireless distribution system (WDS)

ABC Company has recently deployed a WiFi network in their corporate facility. After deployment, the considered a solution for monitoring and enforcing their wireless secuirty policy. What type of system can perform this task?

Wireless intrusion Prevention System (WIPS)

A software and/or hardware solution designed to monitor wireless networking RF signals using sensors or access points and to record events to a centralized database. It has the capability to react and prevent intrusion.

Wireless intrusion prevention system (WIPS)

A network that connects wireless devices within the immediate area of individual people. This type of network allows a user to connect various devices wirelessly to their own personal area network, including but not limited to computer keyboards, mice, and headsets. Bluetooth is a common technology used with WPANs.

Wireless personal network (WPAN)

semidirectional or highly directional

Wireless point-to-point links typically call for ________antennas.

As part of a pre-deployment manual RF site survey, your manager has assigned to you the task of documenting security and interference details about exisiting WLANs in the building. What is the best tool for locating and collecting information about existing APs in the building?

Wireless protocol analyzer

A device used to extend a radio frequency cell, it allows users located beyond the connection distance of a wireless access point to connect to a wireless LAN by repeating the signal to an access point.

Wireless repeater

A wireless client device that allows several Ethernet devices on an Ethernet segment to associate and connect to a wireless infrastructure through an access point. Also known as a wireless client bridge.

Wireless workgroup bridge

Which client device will allow a user to connect several Ethernet devices on a common segment to an access point?

Wireless workgroup bridge

Directional Antenna Tree shaped

Yagi

Why is it better to configure access points from the wired side of the network?

You are not sending secure information over the internet.

B and C

You support a wireless network for an office of five employees. The installation consists of one access point, three notebook computers, and two desktop computers. The access point and computers i the office have wireless adapters that are Wi-Fi WPA 2.0 Certified. You want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment? (choose 2) A. WEP B. WPA 2.0 personal C. WPS D. WMM E. WPA 2.0 enterprise

Hybrid coordination function

_____ defines traffic classes and assigns a priority to the information to be transmitted.

Point Coordination Function (PCF)

access point briefly takes control of the medium and polls the clients

mesh point portal (MPP)

acts as a gateway to one or more external networks

Hybrid Coordination Function (HCF)

additional coordination function that is applied in an 802.11e QoS wireless network

Self-contained units with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the device have permission to use.

autonomous access points

robust security network (RSN)

better hide the data flying through the air while at the same time placing a bigger guard at the front door

Separating the intelligence from the access point and placing it into the wireless controller can cause ______________ with the higher data rates of IEEE 802.11n and 801.11ac

bottlenecks

Identify three popular types of autonomous access points:

consumer SOHO enterprise

Distributed Coordination Function (DCF)

contention-based method determining who gets to transmit on the wireless medium next

Wider Channels

capability of 80 MHz and 160 MHz channels

A mesh point (MP)

capable of using a mandatory mesh routing protocol called Hybrid Wireless Mesh Protocol (HWMP)

A common feature in hardware WLAN controllers and cloud-managed systems that is used to obtain payment information, a simple agreement to terms and conditions for a hotspot or account credentials.

captive web portal

WLAN controller solutions consist of two common types of architectures, name them.

centralized (split-MAC) distributed

In WLAN controllers and cloud-managed controller-less solutions, this gives an administrator complete control over the wireless network from a single physical location.

centralized administration

Decibel (dB) is a relative expression representing a change in radio frequency power.

dB

Which two are relative measurements of RF Power?

dB dBi are relative measurements of RF power

A decibel referenced to a dipole antenna, representing the passive gain of a dipole antenna and a relative expression of radio frequency power.

dBd

A decibel referenced against an isotropic radiator, representing the passive gain of an antenna as an increase in power and a relative expression of radio frequency power.

dBi

What is the gain of an antenna measured in?

dBi

Which grade of access points allow the user to change the transmit power?

enterprise and some SOHO

Hybrid Coordination Function Controlled Channel Access (HCCA)

extension of PCF gives the access point the ability to provide for "prioritization of stations." certain client stations will be given a chance to transmit before others

Enhanced Distributed Channel Access (EDCA)

extension to DCF prioritization of frames based on upper-layer protocols

802.11r-2008

fast basic service set transition (FT) fast secure roaming troublesome when using a WPA-Enterprise or WPA2- Enterprise security solution bypassing 802.1X authentication when roaming to a new access point

When a wireless device is connected to an access point, it is known to be in _____________ mode.

infrastructure mode

When a wireless device is connected to an access point, it is said to be in ____________.

infrastructure mode

Which of the following best describes the Wi-Fi alliance?

interoperability testing organization

802.11u-2011

interworking issues between an IEEE 802.11 access network and any external network to which it is connected Wireless Interworking with External Networks (WIEN) basis for the Wi-Fi Alliance's Hotspot 2.0 specification and its Passpoint certification

In infrastructure mode, what happens to wireless data traffic that passes through an access point?

it is passed through to it's intended destination, crazy huh

Which are absolute measures of RF power? (Choose two.)

mW and Watt

802.11h-2003

mechanisms for dynamic frequency selection (DFS) and transmit power control (TPC) capability for 802.11 radios to transmit in a new frequency band called U-NII-2 Extended with 11 more channels

Robust Security Network (RSN)

method of establishing authentication, negotiating security associations, and dynamically generating encryption keys for client stations and access points

Improved MIMO and Beamforming

multi-user MIMO (MU-MIMO) technology simplified beamforming method called null data packet (NDP) beamforming

More Spatial Streams

ould be built to transmit and receive up to eight spatial streams

According to the PoE amendments, what is the term for an apparatus that delivers power?

power sourcing equipment (PSE)

According to the PoE amendments, what is the term for an apparatus that receives power?

powered device (PD)

mesh access point (MAP)

provides both mesh functionalities and AP functionalities simultaneously

Broadcast/Multicast Integrity Protocol (BIP)

provides data integrity and replay protection using AES-128 in Cipher-Based Message Authentication Code (CMAC) mode

dBi is a(n) ____________ measurement of gain introduced by _____________?

relative; an antenna

802.11w-2009

robust management frames delivering management frames in a secure manner, therefore preventing the management frames from being able to be spoofed provides protection for unicast, broadcast, and multicast management frames Broadcast/Multicast Integrity Protocol (BIP)

802.11ah

se of Wi-Fi in frequencies below 1 GHz sensor networks along with backhaul for sensor networks and with extended range Wi-Fi Internet-of-Things (IoT) or Machine-to-Machine (M2M)

Client Statistics

signal-to-noise ratio, signal strength, and data rates can all be reported information such as frame transmissions, retries, and errors may all be reported

IEEE Std 802.11-2012

single document containing all the amendments that had been published at that time

What are the two types of midspan devices?

single-port and multiport injectors

Direct Sequence Spread Spectrum (DSSS)

spread spectrum technology that uses ! xed channels Clause 16 device

802.11aj

support for operating in the Chinese Milli-Meter Wave (CMMW) frequency bands 59- 64 GHz


Kaugnay na mga set ng pag-aaral

Which of the following best explains the difference between commodity money and fiat​ money?

View Set

NCLEX Style Practice Questions: MI Management

View Set

Unit 1 Test Review Elements and Compounds

View Set

Unit 3 Contreception & Infertility + Genetics

View Set