CWNA

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Beacon management frames contain which of the following information? (Choose all that apply.) A. Channel information B. Destination IP address C. Basic data rate D. Traffic indication map (TIM) E. Vendor proprietary information F. Time stamp

Channel information Basic data rate Traffic indication map (TIM) Vendor proprietary information Time stamp

Name a potential source of RF interference in the 5 GHz U-NII band. A. Cordless phones B. AM radio C. FM radio D. Microwave ovens E. Bluetooth

Cordless phones

33 When using 802.1X/EAP authentication, what is the most common authentication server used in organizations? You must select 1 answer A. AD DS Domain Controller B. TACACS C. RADIUS D. Controller

Correct Answer is:C A RADIUS server is the most commonly implemented authentication server type in modern WLANs. TACACS or TACACS+ could be used with some architectures, but it is not the most common selection. AD DS Domain Controllers may provide credentials to the RADIUS server for authentication. A controller may be able to act as the authentication server, but in most cases, it does so by implementing RADIUS.

4 You are implementing a VHT-capable AP. When operating in VHT mode, which one of the following channels is not available for use by the AP? You must select 1 answer A. 153 B. 144 C. 11 D. 56

Correct Answer is:C VHT operates only in the 5 GHz band, therefore, 2.4 GHz channels are not available to an AP or client when it is operating in VHT mode. 2.4 GHz channels include channels 1-14.

37 Which one of the following is a kind of 802.11- based interference caused by 802.11 devices? You must select 1 answer A. RFID B. ZigBee C. Bluetooth D. ACI

Correct Answer is:D Adjacent Channel Interference (ACI) can be overlapping ACI or non-overlapping ACI. In either case, it is the results of operations on a different channel wherein the signal causes interference with the interfered channel because of high output power or overlapping frequencies.

A service set identifier is often synonymous with which of the following? A. IBSS B. ESSID C. BSSID D. BSS

ESSID

Which IEEE 802.11 amendment specifies the use of up to eight spatial streams of modulated data bits? A. IEEE 802.11n B. IEEE 802.11g C. IEEE 802.11ac D. IEEE 802.11s E. IEEE 802.11w

IEEE 802.11ac

What signal characteristics are common in spread spectrum and OFDM-based signaling methods? (Choose two.) A. Narrow bandwidth B. Low power C. High power D. Wide bandwidth

Low power and Wide bandwidth

What is the best tool for detecting an RF jamming denial-of-service attack? A. Time-domain analysis software B. Protocol analyzer C. Spectrum analyzer D. Predictive modeling software E. Oscilloscope

Spectrum analyzer

What is the output of a link budget?

System Operating Margin (SOM)

When installing a higher-gain omnidirectional antenna, which of the following occurs? (Choose two.) A. The horizontal coverage increases. B. The horizontal coverage decreases. C. The vertical coverage increases. D. The vertical coverage decreases.

The horizontal coverage increases. and The vertical coverage decreases.

Which capabilities defined by the 802.11n-2009 amendment are no longer defined by the 802.11ac-2013 amendment? (Choose all that apply.) A. Equal modulation B. Unequal modulation C. RIFS D. SIFS E. 40 MHz channels

Unequal modulation RIFS

How many modulation and coding schemes (MCSs) are defined by the 802.11ac-2013 amendment? A. 10 B. 100 C. 7 D. 77 E. 22

10

An 802.11n (HT) network can operate on which frequency bands? (Choose all that apply.) A. 902-928 MHz B. 2.4-2.4835 GHz C. 5.15-5.25 GHz D. 5.47-5.725 GHz

2.4-2.4835 GHz 5.15-5.25 GHz 5.47-5.725 GHz

A bridge transmits at 10 mW. The cable to the antenna produces a loss of 3 dB, and the antenna produces a gain of 20 dBi. What is the EIRP? A. 25 mW B. 27 mW C. 4 mW D. 1,300 mW E. 500 mW

500 mW 10/2=5 5x10x10=500

A WLAN transmitter that emits a 20 mW signal is connected to a cable with 6 dB loss. If the cable is connected to an antenna with 12 dBi gain, what is the EIRP at the antenna element?

80 mW The calculation can be completed with the cumulative nature of dB mat. -6 dB added to +12 dB is equal to +6 dB. Now, 20 mW +6 dB is equal to 80 mW (20 mW * 2 * 2).

802.11ac VHT radios are backward compatible with which IEEE 802.11 radios? A. 802.11 legacy (FHSS) radios B. 802.11g (ERP) radios C. 802.11 legacy (DSSS) radios D. 802.11b (HR-DSSS) radios E. 802.11a (OFDM) radios F. 2.4 GHz 802.11n (HT) radios G. 5 GHz 802.11n (HT) radios H. None of the above

802.11a (OFDM) radios and 5 GHz 802.11n (HT) radios

What are some of the methods used to reduce MAC layer overhead, as defined by the 802.11n-2009 amendment? (Choose all that apply.) A. A-MSDU B. A-MPDU C. MCS D. PPDU E. MSDU

A-MSDU A-MPDU

Rebekah McAdams was hired to perform a wireless packet analysis of your network. While performing the analysis, she noticed that many of the data frames were preceded by an RTS frame followed by a CTS frame. What could cause this to occur? (Choose all that apply.) A. Because of high RF noise levels, some of the stations have automatically enabled RTS/CTS. B. An AP was manually configured with a low RTS/CTS threshold. C. A nearby cell phone is causing some of the nodes to enable a protection mechanism. D. Legacy 802.11b clients are connected to an 802.11g AP.

An AP was manually configured with a low RTS/CTS threshold. and Legacy 802.11b clients are connected to an 802.11g AP.

dBi is an expression of what type of measurement? A. Access point gain B. Received power C. Transmitted power D. Antenna gain E. Effective output

Antenna gain

What must a powered device (PD) do to be considered PoE compliant (IEEE 802.3-2015, Clause 33)? (Choose all that apply.) A. Be able to accept power in either of two ways (through the data lines or unused pairs). B. Reply with a classification signature. C. Reply with a 35-ohm detection signature. D. Reply with a 25-ohm detection signature. E. Receive 30 watts of power from the power sourcing equipment

Be able to accept power in either of two ways (through the data lines or unused pairs). Reply with a 25-ohm detection signature.

Which of these solutions would be considered strong WLAN security? A. SSID cloaking B. MAC filtering C. WEP D. Shared Key authentication E. CCMP/AES F. TKIP

CCMP/AES

What can be delivered over-the-air to WLAN mobile devices, such as tablets and smartphones, when a mobile device management (MDM) solution is deployed? A. Configuration settings B. Applications C. Certificates D. Web clips E. All of the above

Configuration settings Applications Certificates Web clips

11 What metric or parameter is not likely to be used by a client STA when selecting a BSS to which it will connect? You must select 1 answer A. Retry rate B. RSSI C. Beacon frame signal strength D. Supported data rates

Correct Answer is:A A client STA will use metrics like RSSI and dBm signal strength related to the AP Beacon frames as well as supported data rates listed in the Beacon frames to select a qualified target BSS. The STA will not typically analyze such detailed metrics as retry rates or airtime utilization.

31 What protocol should be used for Web-based administration interfaces in order to increase security? You must select 1 answer A. HTTPS B. HTML C. HTTP D. SNMPv3

Correct Answer is:A Instead of HTTP, HTTPS should be used. HTTPS provides encryption for the link and HTTP does not. HTML is the programming language or markup language used to create web pages and SNMPv3 is a network management protocol not an administration access protocol.

36 What is the most common metric given for maximum unidirectional delay in VoIP communications? You must select 1 answer A. 150 ms B. 300 ms C. 50 ms D. 10 ms

Correct Answer is:A Most vendors recommend a unidirectional delay of 150 ms or less for VoIP communications.

8 When a controller-based WLAN is in use and roaming is desired with 802.1X/EAP, what solution may be used to implement fast and secure roaming? You must select 1 answer A. OKC B. DFS C. TPC D. WMM

Correct Answer is:A Opportunistic Key Caching (OKC) is a propular roaming methods that is not specified in the 802.11 standard. If an 802.11 standard method is desired, Fast BSS Transition (FT) should be used. DFS and TPC are used to accommodate radar detection and interference avoidance in some 5 GHz channels. WMM is a QoS certification by the Wi-Fi Alliance.

32 What encryption algorithm is used by WPA2- Enterprise in secure WLANs using no deprecated 802.11 solutions? You must select 1 answer A. AES B. RC4 C. DES D. 3DES

Correct Answer is:A The Advanced Encryption Standard (AES) is used by WPA2-Enterprise and WPA2-Personal when implemented with nondeprecated 802.11 solutions. RC4 is used by WEP and TKIP and is deprecated for use with 802.11 devices. DES and 3DES have never been used or referenced within the 802.11 standard.

42 After performing corrective actions, according to the CWNP troubleshooting methodology, what action should be taken next? You must select 1 answer A. Verify the solution B. Document the results C. Discover the scale of the problem D. Define possible causes

Correct Answer is:A The CWNP methodology follows the sequence: Identify the problem, Discover the scale of the problem, Define possible causes, Narrow to the most likely cause, Create a plan of action or escalate the problem, Perform corrective actions, Verify the solution, Document the results.

16 When an 802.11 STA received a frame not intended for it, what field indicates the length of time required to complete the frame transaction after the current frame being received? You must select 1 answer A. Duration/ID B. Length C. Type D. Retry

Correct Answer is:A The Duration/ID field is used by non-target STAs to set their Network Allocation Vector (NAV) timer. The duration value is that required to complete the transaction after the current frame. For example, for a data frame, it includes the SIFS and Ack duration required to complete the transaction. The Length field is in the PHY PLCP header and not in the MAC header and it specifies the length of the current frame. The retry field is used to indicate whether the current frame is a first attempt or some retry attempt. The Type field is used to indicate whether the frame is a control, management, or data frame.

40 What is the primary difference between throughput testing and load testing? You must select 1 answer A. Throughput testing is often a single machine test and load testing includes a simulated production load. B. Throughput testing provides no value while load testing does provide value. C. Throughput testing is not supported on WLANs, but load testing is. D. Load testing is not supported on WLANs, but throughput testing is.

Correct Answer is:A The biggest difference between throughput testing and load testing is that throughput testing is often based on a single machine communicating, while load testing can simulate multiple machines to be closer to real-world production performance levels.

52 What is a relative unit of measurement that allows comparison of the amplitude between two signals? You must select 1 answer A. dB B. RSSI C. dBm D. mW

Correct Answer is:A The decibel (dB) is a relative unit of measurement. For example, an antenna may add 6 dB of gain, but without knowing the input power (that to which the antenna gain is relative) you have no way to determine the actual power (absolute power) of the signal leaving the antenna. dBm and mW are absolute power metrics with dBm being logarithmic and mW being linear. RSSI is an arbitrary value defined in the 802.11 standard for received signal strength reporting.

14 What is used to synchronize the receiver for reception of an 802.11 PPDU? You must select 1 answer A. Preamble B. PLCP header C. MAC header D. FCS

Correct Answer is:A The preamble, which can include training fields, is used to synchronize the receiver for reception of the PPDU. The PPDU includes the PLCP header and the MPDU (MAC layer payload). The MPDU will have a MAC header and, possibly a data payload, and an FCS.

41 When using wireless design software for post-implementation validation, what is performed that is not performed in predictive modeling design scenarios? You must select 1 answer A. Capture of signals within the physical space B. Calibration or scaling of the floor plan C. Drawing walls and other materials D. Indicating AP locations

Correct Answer is:A When performing the validation survey, real signals will be captured in the physical space that houses the WLAN. This can also be done in full pre-deployment site surveys, but it is not performed when only performing a predictive modeling design.

39 You have implemented a real-time video conferencing system on your WLAN. What two factors will be most important to the quality of communications in this system? You must select 1 answer A. Throughput and reliability B. Latency and jitter C. Authentication and encryption D. Latency and encryption

Correct Answer is:A While all of the listed factors are important considerations, for a video conferencing, real-time system, throughput and reliability will be most important. Unlike VoIP, video conferencing systems are not impacted as much by jitter, though it is still a factor for the audio stream. Much higher levels of throughput are required than VoIP due to the existing video stream in the communications.

54 When an RF link in a bridging implementation spans more than 7 miles, what must be considered that need not typically be considered otherwise? You must select 1 answer A. Earth bulge B. FSPL C. SNR D. Output power

Correct Answer is:A You must always consider FSPL, SNR and output power in bridge links. When a link spans more than 7 miles, you must also consider earth bulge.

27 You are implementing an MDM solution. For what might this be used? You must select 1 answer A. High availability for controllers B. BYOD C. VPN endpoint D. Automatic channel selection

Correct Answer is:B A mobile device management (MDM) solution is used to manage mobile devices, which may include enterprise-owned devices as well as personal devices used through BYOD.

47 What is a common solution to hidden node problems in WLANs? You must select 1 answer A. Reducing the client output power B. Enabling RTS/CTS C. Reducing the client antenna gain D. Increasing the AP fragmentation threshold

Correct Answer is:B By enabling RTS/CTS, you decrease hidden node problems. A very small RTS frame must get through to the AP in order to start the transaction (which includes RTS/SIFS/CTS/SIFS/DATA FRAME/SIFS/ACK).

51 What occurs naturally as an RF wave travels through space between antennas? You must select 1 answer A. VSWR B. FSPL C. Amplification D. Phase altering

Correct Answer is:B Free space path loss (FSPL) is the natural weakening of the RF signal amplitude as it travels through space and the wavefront spreads to cover an every larger area.

22 What high availability solution uses one controller as a backup for several other controllers in case a controller fails? You must select 1 answer A. RAID5 B. N+1 C. Striping D. Clustering

Correct Answer is:B N+1 allows multiple controllers (N) to have a single backup controller (1). The primary controllers operate as long as they are functional, but it one fails, the +1 controller takes over for that failed controller. This option is offered by several controller vendors.

38 What is an important consideration when determining the impact of a non-Wi-Fi interferer on the 802.11 channels nearby? You must select 1 answer A. Protocols used by the interferer B. Frequencies used by the interferer C. Coding rate used by the interferer D. Age of the interfering device

Correct Answer is:B Of those listed, frequencies used by the interferer is the only important consideration. Additionally, air time utilization is a key measurement. These two facts related to the non-Wi-Fi interferer are most important in determining the degradation that will be caused by it.

13 When an 800 nanosecond delay is inserted between symbols, what is certainly in use? You must select 1 answer A. DIFS B. Long guard interval C. SIFS D. Short guard interval

Correct Answer is:B The 802.11n amendment, now part of 802.11-2016, introduced the use of a short guard interval (SGI) that is 400 ns long. The original 800 ns guard interval is now the long GI. The guard interval is used between symbols and not between frames. Interframe spaces are used between frames.

28 The documentation from your WLAN vendor indicates that the time clocks on all devices must be synchronized. What service may be used on the network to perform this action? You must select 1 answer A. DNS B. NTP C. RADIUS D. LDAP

Correct Answer is:B The Network Time Protocol (NTP) is used to synchronize the clocks on network devices. A time server can be configured, which acquires its time from an Internet time clock, and used to set the time for all internal devices. DNS is used for host name resolution. RADIUS is used for authentication. LDAP is used to access network directory services.

46 What will decrease in an environment when the noise floor increases? You must select 1 answer A. Signal strength B. SNR C. Transmit power D. Antenna gain

Correct Answer is:B The signal-to-noise ratio (SNR) will decrease when a higher noise floor is present. That is, if the signal strength is -70 dBm and the noise floor is -98 dBm, the SNR is 28 dB. If the noise floor increases to -93 dBm, the SNR will decrease to 23 dB.

20 When implementing PoE, what role is played by a wireless AP? You must select 1 answer A. PSE B. PD C. Midspan injector D. Power splitter

Correct Answer is:B The wireless AP will be a PoE client known as a powered device (PD) in the 802.3 standard. Power sourcing equipment (PSE) includes PoE capable switches and midspan injectors. A power splitter or PoE splitter is a newer device that allows you to split PoE power and Ethernet signals at the powered location so that a non-PoE device can be powered and have Ethernet connectivity, such as a wall power video camera with an Ethernet port.

19 A temporary mobile office is being deployed. In addition to the local WLAN, what will be required to provide Internet access at the site among the listed options? You must select 1 answer A. Ethernet switches and IP routers B. Wireless backhaul C. RADIUS server D. LDAP server

Correct Answer is:B To provide Internet access, some link, such as a wireless backhaul link, will be required for Internet connectivity. Typically, such temporary mobile sites do not deploy infrastructure gear such as Ethernet switchs and IP routers.

3 When an 802.11 amendment is ratified, what happens to the standard? You must select 1 answer A. The amendment specifications are optional and never become part of a rollup update. B. The standard includes the specifications of the amendment even though they are not included in a rollup update initially. C. Device manufacturers must wait until the next rollup to include the amendment specifications in chipsets and drivers. D. Amendments are created to resolve errors in the standard and introduce no new features.

Correct Answer is:B When an 802.11 amendment is ratified, it immediately becomes part of the standard. At some eventual point it will be included in a rollup of the standard, but its specifications are available immediately for implementation by device manufacturers if they desire.

44 You are troubleshooting a performance problem experienced by several STA's in an area approximately five square meters in size. You want to see if a non-Wi-Fi interferer is in the space. What tool should you use? You must select 1 answer A. WLAN scanner B. WLAN protocol analyzer C. Spectrum analyzer D. Throughput tester

Correct Answer is:C A spectrum analyzer must be used to determine if a non-Wi-Fi interferer is in the area with certainty. A protocol analyzer may show retries, but the retries can be caused by other problems. A WLAN scanner will not help in this situation and neither will a throughput tester (with the possible exception of verifying that a device cannot achieve expected throughput in that area.

48 You have determined that an AP is not getting sufficient PoE power because it will not power up. You have verified that the CAT6 cable is only 30 meters in length and is connected to a switch port with PoE enabled. What should you check next? You must select 1 answer A. Verify that the CAT6 cable is blue and not yellow B. Verify that the midspan injector is powered on C. Verify that the power budget in the switch as sufficient remaining power for the AP D. Verify that the AP has the "use PoE" hardware switch set to "on"

Correct Answer is:C AP's that use PoE do not have hardware switchces to enable it. PoE is automatically detected on the Ethernet cable. In this scenario, because the cable is not too long, you should verify the power budget is available in the switch. A midspan injector is used when a PoE switch is not available.

26 You must enable a feature on APs that allows for higher data rate clients to receive more time for frame reception from the APs than lower data rate clients. What is this feature? You must select 1 answer A. Load Balancing B. Band Steering C. AirTime Fairness D. RTS/CTS

Correct Answer is:C AirTime fairness is a downlink feature of some APs that allows higher data rate clients to receive more airtime for frame reception than lower data rate clients.

10How can a transmitting client STA determine whether a data frame transmitted to the AP was delivered or not? You must select 1 answer A. If the AP transmits any other frames, the STA can assume it received the transmitted frame. B. If no collision was detected, the data frame was delivered. C. If a matching Ack frame is received, the data frame was delivered. D. Frames are always delivered on the WM, so the STA can assume delivery.

Correct Answer is:C Collisions cannot be detected on the wireless medium (WM), therefore, 802.11 networks use acknowledgement frames (Ack frames and Block Ack frames) to notify the transmitter of proper reception. If an Ack or Block Ack frame is received, the STA can trust that the frame was transmitted and received by the AP successfully.

17 What kind of 802.11 device is most likely to have multiple LAN switch ports, a WAN/Internet port, and dual-band 802.11 radios? You must select 1 answer A. Enterprise AP B. WLAN bridge C. Home WLAN router D. Mesh AP

Correct Answer is:C Home WLAN routers typically includes four or more LAN switch ports, an Internet or WAN port, and dual-band 802.11 radios. Enterprise APs will have dual-band radios and one or two Ethernet ports, but no Internet or WAN port (effectively a router interface). A WLAN bridge typically has the same interfaces as an Enterprise AP and a mesh AP does as well.

24 In an 802.11 2.4 GHz system, what 20 MHz channels are considered non-overlapping? You must select 1 answer A. 1 and 5 B. 3 and 6 C. 4 and 9 D. 2 and 5

Correct Answer is:C In the 2.4 GHz band, channel centers are 5 MHz apart. To be considered non-overlapping, they need 25 MHz of space between them. Therefore, the commonly used channels are 1, 6 and 11 as they are available in all regulatory domains. However, any two channels 25 MHz apart can be referenced as non-overlapping channels, such as 4 and 9.

45 What is an advantage of a centralized WLAN monitoring solution that is not available in most laptop-based protocol analyzers? You must select 1 answer A. Frame capture and decoding B. Expert views C. Data aggregation from multiple real-time sources for automated reporting and analysis D. Traffic statistics for the BSA

Correct Answer is:C Of those listed, data aggregation for multiple sources is the least common feature of laptop-based analyzers that is found in centralized monitoring solutions. The aggregated data can be used to proactively address future problems and troubleshoot existing issues on the WLAN.

43 What is the first step in the CWNP troubleshooting methodology? You must select 1 answer A. Document the results B. Verify the solution C. Identify the problem D. Define possible causes

Correct Answer is:C The CWNP methodology follows the sequence: Identify the problem, Discover the scale of the problem, Define possible causes, Narrow to the most likely cause, Create a plan of action or escalate the problem, Perform corrective actions, Verify the solution, Document the results.

7 An 802.11-based network includes two laptops, one mobile phone, and one tablet. No AP is involved in the communications. What WLAN use case is described? You must select 1 answer A. BSS B. IBSS C. ESS D. WWAN

Correct Answer is:C The Distribution System (DS) is the interconnecting system that allows for the creation of an ESS on a LAN or across LANs. The Wireless Medium (WM) is the term used in the standard for the RF channel. A station (STA) is a wireless access unit, either a client or an AP in most cases. Dynamic Frequency Selection (DFS) is used to ensure that the WLAN does not interfere with important radar systems. The differences between the DS, DSS, DSM and distribution service are sometimes confusing. The distribution service (no acronym as it would conflict with distribution system) is the service within a STA that allows for MAC communications within the distribution system. The distribution system service (DSS) allows for communications among devices on the WM, including between BSSs, and within a BSS. The distribution system medium (DSM) is the connection between the APs in the network, such as Ethernet or a mesh network.

6 Which IEEE 802.11 Physical Layer (PHY) supports frequency use below 1 GHz and is optimal for low data rate long range communications? You must select 1 answer A. VHT B. HT C. S1G D. DMG

Correct Answer is:C The Sub-1 GHz (S1G) PHY operates below 1 GHz and is optimal for low data rate and longer range communications. VHT operates only in the 5 GHz band as a PHY. The HT PHY operates in either the 2.4 GHz or 5 GHz bands. The DMG PHY operates in the 60 GHz band and is intended for high data rate short range communications.

15 What new feature introduced with 802.11ac was designed to improve power management in the 5 GHz band? You must select 1 answer A. 8 stream MIMO B. 256-QAM C. VHT TXOP D. Consistent use of A-MPDU

Correct Answer is:C The VHT TXOP feature, which uses the partial AID in the PLCP header to determine if an incoming frame is for the listening STA, improves power management because the listening STA can sleep earlier in the frame transmission. Adding more streams increases power consumption. While 256-QAM may have a side benefit of reducing power consumption (due to shorter transmission times at higher data rates), it was not designed to improve power management. The standardized, full-time use of A-MPDU does not have a significant impact on power management either.

23 When centralized data forwarding is used in a controller-based architecture, what device creates the 802.3 Ethernet frames, removing all 802.11- specific information, and properly tags them with QoS markings to be forwarded onto the final destination? You must select 1 answer A. AP B. Client C. Controller D. IP router

Correct Answer is:C The controller receives the 802.11 frames in a tunnel from the AP and then removes all 802.11-specific information before creating and sending a QoS-tagged Ethernet frame.

35 When using a protocol analyzer, what should you look at to see the duration value for a particular data frame in the capture? You must select 1 answer A. Expert views B. Traffic flows C. Packet decode D. Traffic statistics

Correct Answer is:C The packet decode must be used to view and evaluate specific field values, such as the Duration/ID field. The expert views show summary information useful for particular analysis situations. Traffic flows are used to view sequential exchanges in a communication. Traffic statistics provide metrics on the amount of traffic and type of traffic traversing the network.

2 What is true about WPA in 802.11 wireless networks? You must select 1 answer A. WPA implements AES encryption in the same way that WEP does. B. WPA is based on CCMP/AES and is non-deprecated in the 802.11-2016 standard. C. When WPA is used, 802.11n and 802.11ac devices fall back to 54 Mbps as the highest data rate. D. WPA is based on TKIP/RC4 and is non-deprecated in the 802.11-2016 standard.

Correct Answer is:C WPA is based on TKIP/RC4 and is deprecated in the 802.11-2016 standard. When used, the standard requires that 802.11n and 802.11ac devices not use the HT or VHT PHY format and they must, therefore, fall back to 54 Mbps as the highest data rate (OFDM and ERP).

53 An AP transmits with an output power level of 25 mW and uses a 3 dBi antenna. What is the EIRP? You must select 1 answer A. 3 dBm B. 5 dBm C. 10 dBm D. 17 dBm

Correct Answer is:D 17 dBm is equal to 50 mW. 25 mW * 2 is 50 mW. When you add 3 dBi of antenna gain, you double the output power from the antenna, which is where EIRP is measured.

21 You have several 802.11n AP's that require only 802.3af PoE power. What is the minimum power that is expected to be available for the PD in this scenario assuming proper cable lengths are used? You must select 1 answer A. 30 W B. 15.4 W C. 25.5 W D. 12.95 W

Correct Answer is:D 802.3af offers 12.95 watts of power at the PD, even though it can place up to 15.4 watts of power on the cable. Due to attenuation, the received power is less than the transmitted power. 802.3at offers 25.5 watts at the PD and places up to 30 watts onto the cable.

34 What solution can detect and mitigate rogue devices discovered on the WLAN? You must select 1 answer A. LDAP server B. RTLS server C. Host-based IDS D. WIPS

Correct Answer is:D A Wireless Intrusion Prevention System (WIPS) can be used to both detect and mitigate rogues on the WLAN. LDAP servers are servers that support the LDAP protocol for network directory access. RTLS servers are used with real-time location systems (RTLS) to locate devices on the network. Host-based IDS solutions are used on devices and are not used to detect and mitigate (contain) rogue devices.

9 What can a client device use to determine whether a BSS supports WMM QoS capabilities? You must select 1 answer A. Control frame analysis of existing associated STAs B. Data frame analysis of existing associated STAs C. QoS Query frames D. Beacon frame information

Correct Answer is:D A client can gather significant information from Beacon frames to determine if the transmitting AP is operating a desired BSS. This information includes security parameters, supported data rates, WMM QoS information, and more.

50 An RF wave is weaker after traveling through some material in its path, what is the term used to describe what happened as the RF wave passed through the material? You must select 1 answer A. Reflection B. Refraction C. Scattering D. Absorption

Correct Answer is:D Absorption occurs when an RF wave travels through a material that converts the RF wave energy to heat as it passes through. Some of the RF wave energy is lost and some of it passes through the material. For example, a wall may absorb 4 dB of signal strength so that a signal entering the wall at -46 dBm exits the wall at -42 dBm even though only a few inches of distance are travelled.

Exam starts here 1 What statement about the beamwidth of an RF antenna is true? You must select 1 answer A. The horizontal and vertical beamwidth are measured where the main lobe loses 6 dB of power. B. Beamwidth has no impact on the propagation pattern. C. Horizontal beamwidth is displayed on the Elevation chart. D. As the gain of the antenna increases, the beamwidth decreases in either the horizontal or vertical direction or both.

Correct Answer is:D Beamwidth is measured at the points where the main lobe decreases in power by 3 dB. The horizontal beamwidth is typically shown on the Azimuth chart and the vertical beamwidth is shown on the Elevation chart. When the gain of an antenna increases, the beamwidth decreases. When the beamwidth increases, the gain decreases.

29 What statement is true about the Ethernet cables used for AP connectivity? You must select 1 answer A. If you use CAT6 cabling, you can install 250 meter cable runs instead of the 100 meter limit of CAT5e. B. PoE can operate across CAT5e cables, but CAT3 cables are sufficient for providing 802.3at PoE power. C. The minimum required Ethernet cable type for 802.11ac APs is CAT3. D. CAT6 Ethernet cables provide superior performance to CAT5 Ethernet cables.

Correct Answer is:D CAT6 cables still constrain the length to 100 meters; however, they provide superior performance than lower categories of cable. All PoE should run across CAT5 at a minimum.

12 What original authentication method of the 802.11-1997 standard is still included in the standard and non-deprecated? You must select 1 answer A. CCMP B. WEP C. Shared Key Authentication D. Open System Authentication

Correct Answer is:D CCMP was not in the original standard. WEP and Shared Key Authentication were in the original standard, but they are both deprecated. Only Open System Authentication, from the original standard, is non-deprecated and still in use today.

25 If the center frequency of channel 2 is 2417 MHz, what is the center frequency of channel 5? You must select 1 answer A. 2485 B. 2412 C. 2420 D. 2432

Correct Answer is:D Given that the channels are 5 MHz apart in 2.4 GHz, simply add 15 MHz to the known center frequency of channel 2 and you arrive at 2.432 GHz or 2432 MHz for channel 5.

49 You are troubleshooting a problem with a USB adapter on a laptop. When you insert the adapter, after having installed the drivers, it is not detected by the operating system and no wireless networks are shown. The adapter has been tested on another machine where it works properly. What is a practical next action to take in this scenario? You must select 1 answer A. Reinstall the operating system on the problem laptop B. Delete the driver from the problem laptop and use the adapter without a driver C. Install a third-party supplicant to use the adapter in the problem laptop D. Check the driver version in use on the working computer and ensure the same driver version is used on the problem laptop

Correct Answer is:D In cases like this, the driver can be the problem. If the version used on the problem laptop is different from that used on the working laptop, you should install the working version to see if it resolves the problem. Faulty drivers can cause problems ranging from not detecting the adapter to the adapter working, but only in one band even through it is a dual-band adapter.

18 What Wi-Fi Alliance certification/standard can be used by hotspots to allow client devices to connect automatically if the hotspot supports a subscription service to which the client is subscribed? You must select 1 answer A. Voice-Enterprise B. WMM C. WPA2 D. Passpoint

Correct Answer is:D Passpoint certification and Hotspot 2.0 are Wi-Fi Alliance certifications and standards respectively that allow for this functionality. Voice-Enterprise is a certification that validates VoIP operations across 802.11 networks that involve multiple APs. WMM is a QoS-related certification and WPA2 is a security certification.

30 What configuration option is sometimes thought to be a security solution for WLANs, but is easily circumvented by attackers? You must select 1 answer A. CCMP B. WPA2 C. EAP-TLS D. SSID hiding

Correct Answer is:D SSID hiding is a weak option from a security perspective. The SSID can be easily located with tools available for download from the Internet and the SSID is in frames other than the Beacon frame. It should not be relied upon for any level of security.

5 What statement is true regarding the use of the ERP PHY in 802.11 networks? You must select 1 answer A. ERP operates in either 2.4 GHz or 5 GHz and supports a maximum data rate of 54 Mbps. B. ERP is identical to OFDM PHY, except it operates in the 5 GHz band whereas OFDM operates in the 2.4 GHz band. C. ERP uses 256-QAM modulation to achieve the maximum data rate of 54 Mbps. D. ERP operates only in the 2.4 GHz band and supports a maximum data rate of 54 Mbps.

Correct Answer is:D The Extended Rate PHY (ERP) operates in the 2.4 GHz band with no 5 GHz band support. It implements OFDM modulation that was first used in the OFDM PHY. The maximum data rate of the ERP PHY is 54 Mbps in the standard.

You have been hired by the ABC Corporation to conduct an indoor site survey. What information will be in the final site survey report? (Choose two.) A. Security analysis B. Coverage analysis C. Spectrum analysis D. Routing analysis E. Switching analysis

Coverage analysis and Spectrum analysis

At which layers of the OSI model does 802.11 technology operate?

Data Link and Physical

Which of these attacks can be detected by a wireless intrusion detection system (WIDS)? (Choose all that apply.) A. Deauthentication spoofing B. MAC spoofing C. Rogue ad hoc network D. Association flood E. Rogue AP

Deauthentication spoofing MAC spoofing Rogue ad hoc network Association flood Rogue AP

What are some possible effects of voltage standing wave ratio (VSWR)? (Choose all that apply.) A. Increased amplitude B. Decreased signal strength C. Transmitter failure D. Erratic amplitude E. Out-of-phase signals

Decreased signal strength Transmitter failure Erratic amplitude

Which security standard defines port-based access control? A. IEEE 802.11x B. IEEE 802.3b C. IEEE 802.11i D. IEEE 802.1X E. IEEE 802.11s

IEEE 802.1X

What term describes an RF transmission system up to but not including the antenna?

Intentional Radiator The Intentional Radiator (IR) includes everything in the transmission system except the antenna. The power output of the IR would be measured at the point where it enters the antenna element.

What term best describes the bulk of the data generated on the Internet being created by sensors, monitors, and machines? A. Wearables B. Cloud-enabled networking (CEN) C. Cloud-based networking (CBN) D. Software as a service (SaaS) E. Internet of Things (IoT)

Internet of Things (IoT)

What is another name for an 802.11 data frame that is also known as a PSDU? A. PPDU B. MSDU C. MPDU D. BPDU

MPDU

WLAN vendors have begun to offer the capability for guest users to log in to a guest WLAN with preexisting social media credentials, such as Facebook or Twitter usernames and passwords. Which authorization framework can be used for social media logins to WLAN guest networks? A. Kerberos B. RADIUS C. 802.1X/EAP D. OAuth E. TACACS

OAuth

Which technology subdivides a channel, allowing parallel transmissions of smaller frames to multiple users to occur simultaneously? (Choose all that apply.) A. OFDMA B. OFDM C. Channel blocking D. Sub-channelization E. RTS/CTS

OFDMA

What kind of MIMO antennas are typically used for WLAN deployments when the antennas are placed central to the target coverage area?

Omni-directional Omni-directional antennas radiate out in all directions around the antennas and are usually placed central to the coverage area. Patch and panel antennas are typically placed at the edge of the coverage area and do come in MIMO configurations. Grid antennas are typically SISO highly directional antennas.

Which of these terms can best be used to compare the relationship between two radio waves that share the same frequency? A. Multipath B. Multiplexing C. Phase D. Spread spectrum

Phase

What is the number one cause of layer 2 retransmissions? A. Low SNR B. Hidden node C. Adjacent cell interference D. RF interference

RF interference

What are some potential causes of layer 2 retransmissions? (Choose all that apply.) A. RF interference B. Low signal-to-noise ratio (SNR) C. Dual-frequency transmissions D. Fade margin E. Multiplexing

RF interference and Low signal-to-noise ratio (SNR)

You have been hired by the US-based XYZ Company to conduct a wireless site survey. Which government agencies need to be informed before a tower that exceeds 200 feet above ground level is installed? (Choose all that apply.) A. RF regulatory authority B. Local municipality C. Fire department D. Tax authority E. Aviation authority

RF regulatory authority Local municipality Aviation authority

Which of these measurements are taken for indoor coverage analysis? (Choose all that apply.) A. Received signal strength B. Signal-to-noise ratio C. Noise level D. Path loss E. Packet loss

Received signal strength Signal-to-noise ratio Noise level Packet loss

What term best describes how Wi-Fi can be used to identify customer behavior and shopping trends? A. Radio analytics B. Customer analytics C. Retail analytics D. 802.11 analytics

Retail analytics

The hidden node problem occurs when one client station's transmissions are not heard by some of the other client stations in the coverage area of a basic service set (BSS). What are some of the consequences of the hidden node problem? (Choose all that apply.) A. Retransmissions B. Intersymbol interference (ISI) C. Collisions D. Increased throughput E. Decreased throughput

Retransmissions Collisions Decreased throughput

Which of the following measures the difference between the power of the primary RF signal compared against the sum of the power of the RF interference and background noise? A. Noise ratio B. SNR C. SINR D. BER E. DFS

SINR Signal-to-interference-plus-noise (SINR)

What metric ultimately determines the data rate that can be achieved between an AP and a STA?

SNR

When an RF wave encounters obstacles smaller than the wavelength and reflective in nature, what is likely to occur?

Scattering

Which CSMA/CA conditions must be met before an 802.11 radio can transmit? (Choose all that apply.) A. The NAV timer must be equal to zero. B. The random back off timer must have expired. C. The CCA must be idle. D. The proper interframe space must have occurred. E. The access point must be in PCF mode.

The NAV timer must be equal to zero. The random back off timer must have expired. The CCA must be idle. The proper interframe space must have occurred.

Why are some WLAN client devices able to receive signals at given data rates that are weaker than other client devices can receive?

The receive sensitivity is better on some devices than others. The receive sensitivity varies from one device to another. When the receive sensitivity is improved, the device can receive weaker signals than can be received by devices with poorer receive sensitivity.

What is the term used when measuring return loss caused by mismatched impedance in RF cables and connectors?

VSWR

Which WLAN device uses dynamic layer 2 routing protocols? A. WLAN switch B. WLAN controller C. WLAN router D. WLAN mesh access point

WLAN mesh access point

Which Wi-Fi Alliance certification defines the mechanism for conserving battery life that is critical for handheld devices such as bar code scanners and VoWiFi phones? A. WPA2-Enterprise B. WPA2-Personal C. WMM-PS D. WMM-SA E. CWG-RF

WMM-PS


Ensembles d'études connexes

Real Estate, Chapter 3, Section 2 (Transfer by Deed), Pop Quiz Questions 2.1

View Set

Fundamentals PrepU Chapter 16: Documenting

View Set

Spanish Quizlet- Tori Cappuzzello and Ethan Cochran

View Set

Non-Traditional Mortgages (Oregon CE 2021)

View Set