CWT-100
IEEE 802.11g/n wireless network devices operate in which frequency band?
2.4 GHz ISM band
Non-Wi-Fi devices that use FHSS (frequency-hopping spread spectrum) are capable of causing interference with WLANs in which frequency range?
2.4 to 2.5 GHz ISM FHSS operates in the 2.4 to 2.5 GHz ISM band. Some devices that use FHSS are capable of causing interference with WLANs in this frequency range.
What is the width of an ERP-OFDM channel in the 2.4 GHz ISM band?
20 MHz
An HR/DSSS access point set to 50 mW of output power and channel 1 has a frequency bandwidth of _______.
22 MHz
SSID (Service Set Identifier) has a maximum of ____________ ASCII characters and is ____________.
32, case-sensitive
What is the maximum transmission rate of a USB 3.0 adapter that is capable of IEEE 802.11 WLAN connectivity? a. 6933 Mbps b. 4.8 Gbps c. 600 Mbps d. 480 Mbps e. 54 Mbps
4.8 Gbps A USB 3.0 adapter has a maximum data transfer rate of 4.8 Gbps, which will provide a high enough I/O rate for current IEEE 802.11ac connectivity.
IEEE 802.11a/g networks use OFDM (Orthogonal Frequency-Division Multiplexing) to transmit data. How many total subcarriers are used for transmission with OFDM technology?
52
Which of the following channels in the 2.4 GHz ISM band used for HR/DSSS IEEE 802.11 wireless networking are considered as nonoverlapping channel?
6, 11
Your WLAN supports a maximum data rate of 54 Mbps. Which two of the following IEEE 802.11 standards or amendments are in use on your WLAN?
802.11a and 802.11g
You are a WLAN consultant hired by a hospital to assist with troubleshooting some performance issues with the IEEE 802.11 WLAN in a small office area of the records department. You determine the WLAN is experiencing interference from other devices that also use ISM (Industrial, Scientific, and Medical) RF bands. What IEEE standard or amendment devices are less susceptible to interference from other devices that also use the ISM RF bands and could be used in this office area?
802.11a/n/ac
You are a network administrator evaluating the possibility of deploying an IEEE 802.11 WLAN in an area that contains a large amount of 2.4 GHz ISM interference. Backward compatibility is not needed, as public access is not required and no legacy devices will be used with this wireless network. Devices conforming to which IEEE amendment would be good for this installation?
802.11a/n/ac
Your IEEE 802.11 WLAN operates in the 5 GHz frequency range. Which standard or amendment is in use on your WLAN?
802.11a/n/ac
The azimuth of sector antennas used with IEEE 802.11 wireless networks typically ranges from a. 0 to 360 degrees b. 180 to 360 degrees c. 90 to 180 degrees d. 180 to 270 degrees
90 to 180 degrees Sector antennas can be used to create omnidirectional radiation patterns using semi directional antennas. These antennas are often used for base station connectivity for point-to-multipoint connectivity. Sector antennas have an azimuth that varies from 90° to 180
Which component of a WLAN infrastructure allows a wireless workgroup bridge to connect to an Ethernet segment containing wired devices?
Access Point
Which process will help to improve the throughput of a WLAN for users who are currently experiencing low throughput problems?
Add more access points.
In order to secure a SOHO WLAN access point, it has been decided that you would use 802.11i, WPA2 preshared key (passphrase) as a security solution. The access point and all client devices have been configured with the same passphrase. The passphrase represents which of the following?
Authentication
Which service set uses only one access point for communication?
BSS
You are an office administrator for a small insurance firm with five employees and approximately 1,500 square feet of office space. You were given an assignment to determine the best IEEE 802.11 WLAN solution to be used in this office. Which service set would be an adequate solution?
BSS (basic service set)
Which technology is the solution to hidden node problem in wireless client devices?
CSMA/CA
On which factor do the utilization and performance of an IEEE 802.11 WLAN access point depend?
Number of devices associated
You are a WLAN support technician and have a desktop computer that needs to be connected to the wireless network. Which device would be a solution for this situation?
PCI
Client devices that support Wi-Fi Protected Setup must support which feature?
PIN
You are a consultant hired to provide occasional computer network support to a small accounting office. You are asked to install and configure security for a new WLAN access point. You choose to use the Wi-Fi Protected Setup configuration. What are required features of the Wi-Fi Protected Setup certification?
PIN Push button configuration
Which of the following is an optional cipher method based on the IEEE 802.11i security amendment to the IEEE standard?
RC4
At which of the following layers of the OSI model does IEEE 802.11 WLAN technology operate?
Data Link & Physical
The wireless bandwidth requirements are determined during which part of the WLAN site survey process?
Gathering of information
You are performing a WLAN site survey in an environment that uses many microwave ovens. These ovens could cause interference with which IEEE 802.11 WLAN technologies?
HR/DSSS & ERP-OFDM
A spreading code is used with which IEEE 802.11 WLAN technology?
HR/DSSS (High rate--direct sequence spread spectrum) DSSS
A grid dish antenna typically falls under which category?
Highly directional
Unlicensed RF bands used in IEEE wireless networking include which two bands?
ISM UNII
In which IEEE 802.11 operation mode is wireless data traffic passed through the access point?
Infrastructure
You are a computer network technician called in to help determine the best solution for a small WLAN installation. The office has 10 users with desktop and notebook computers, which are a combination of IEEE 802.11b and IEEE 802.11g devices, and a few legacy IEEE 802.11b print servers, which cannot be upgraded. The customer requires centralized management of the WLAN. Of the solutions listed, which would best satisfy the needs of the customer?
Install an IEEE 802.11n/ac BSS and allow for protection mechanisms.
What can be a reason for low received signal strength at a receiver such as an IEEE 802.11 WLAN client device?
RF obstructions
Which tool would be best utilized to locate non-Wi-Fi sources of interference during a WLAN site survey process?
RF spectrum analyzer
At which layer of the OSI model does VPN (Virtual Private Networking) operate?
Layer 3 Virtual private networking is the capability to create private communications over a public network infrastructure such as the Internet. It commonly operates at Layer 3 of the OSI model.
Which of the following is usually involved in load balancing in an IEEE 802.11 WLAN?
Limiting the number of client device associations to an access point
Which of the following indicates that an IEEE 802.11 network experiences a hidden node problem? a. Enabled ERP protection b. Excessive RSSI values c. Presence of excessive retransmissions d. Presence of encrypted management frames
Presence of excessive retransmissions A hidden node is the result of wireless client devices connected to an access point and not able to "hear" each other prior to starting a transmission. High retransmissions count indicates that an IEEE 802.11 network experiences a hidden node problem.
Which tool used with the RF WLAN site survey process would help to specifically identify existing IEEE 802.11 wireless networks in a proposed location for a new IEEE 802.11 WLAN deployment?
Protocol analyzer
IEEE 802.11 WLANs use which of the following for RF communication?
Low power, wide bandwidth
A wireless bridge can be used to connect two or more LANs together. Which of the following are benefits of using a wireless bridge over a leased line from a service provider?
Lower total cost of ownership More flexible
The unique physical address of a WLAN client network adapter is also known as what?
MAC
While troubleshooting a problem on an IEEE 802.11 WLAN, you notice the two antennas on a single-input, single-output access point are at a 90-degree angle to each other. What potential effect would this have on the access point?
Reduce the advantage of antenna diversity.
IEEE 802.11n/ac MIMO technology uses which of the following RF behaviors to increase performance and throughput?
Reflection
Which RF behavior would cause diffraction?
The RF signal passes around an obstruction and changes direction.
You are troubleshooting an IEEE 802.11 wireless client device that cannot connect to the wireless network. You notice the client utility shows good signal strength but will not connect to the network. After opening a command prompt and typing the ipconfig command, you notice the IP address is 169.254.12.50. You suspect the IP address is not valid and could be causing the problem. What potential problem could cause this IP address?
The WPA/WPA2 passphrase is incorrect on the client device.
The Wi-Fi Alliance is an organization that offers WLAN certifications. What statement is true with respect to the Wi-Fi Alliance?
The Wi-Fi Protected Access 2.0 certification is compliant with the IEEE 802.11i amendment.
The capacity of an IEEE 802.11a/n/ac WLAN can be affected by which characteristic?
Software applications in use
Which steps accurately describe the generic IEEE 802.1X/EAP authentication process?
Supplicant to authenticator to authentication server
Intended as a fix for IEEE 802.11 security weaknesses, which of the following was designed as a firmware upgrade?
TKIP (temporal key integrity protocol)
Which statement is true regarding IEEE 802.11-compliant autonomous wireless access points? a. They can be managed independently. b. They require a WLAN controller to operate. c. They allow a limited number of users to connect. d. They are used only in enterprise installations.
They can be managed independently.
What will improve as a result of enabling load balancing on an IEEE 802.11 wireless network?
Throughput
Which is an example of an external WLAN adapter?
USB 2.0
L2TP (Layer 2 Tunneling Protocol) is used in which type of security solution?
VPN
Which WLAN security solution would be best for users remotely connecting to a corporate network from a wireless hotspot?
VPN
Which Wi-Fi Alliance certification was designed as a proactive certification for the IEEE 802.11e amendment (QoS) to the 802.11 standard?
WMM
Advanced IEEE 802.11 WLAN security solutions are addressed in which post-amendment Wi-Fi Alliance interoperability certification?
WPA 2
Which of the following methods provides the strongest IEEE 802.11 security?
WPA2-PSK
What software settings on an IEEE 802.11 WLAN access point could help with the hidden node problem caused by an obstruction?
RTS/CTS
Which process is required when a device transitions to a new WLAN access point?
Reassociating
Which of the following statements is true regarding IEEE 802.11 WLAN security certifications?
Wi-Fi Protected Access is a certification for security allowing a secure wireless network exchange of information.
Which behavior of RF would have the most significant effect in a warehouse that stores one-gallon cans and five-gallon buckets of paint?
absorption
When a wireless access point is in infrastructure mode, the access point will:
allow devices to IEEE 802.11 authenticate and associate.
Third-party manufacturers' client software utilities for IEEE 802.11 WLAN adapters:
allow for additional configuration.
Which access points are commonly connected to and managed by WLAN controllers?
controller managed
The RF output of an IEEE 802.11 WLAN access point is usually measured in which unit?
dBm dBm is the power level compared to 1 milliwatt. This is based on a logarithmic function. The output power from an access point is measured in either dBm or mW. These are both absolute measures of power.
Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network?
data link
Which antenna technology will help lessen the effects of multipath?
diversity
Early wireless networking technology was typically installed to serve which purpose? A. large scale enterprise networks B. wireless hotspot installations C. VoIP handsets D. Extension of an existing wired network
extension of an existing wired network
what is a common use for a public guest access wireless hotspot
hotels
An 802.11n WLAN will support which protection mechanism? a. ssid b. erp c. ht d. ess
ht HT (high-throughput) protection mechanism is supported by the IEEE 802.11n networks. The IEEE 802.11n amendment identifies several different modes for HT protection mechanisms. These mechanisms known as HT protection modes.
The overall performance expectations of a WLAN are considered which part of a site survey?
information gathering
In an IEEE 802.11g/n WLAN, coverage can be affected by ____________ and ____________.
propagation aspect of obstacles RF range in use
The main purpose of RF regulatory bodies is to:
provide management of RF such as maximum power and frequency.
An IEEE 802.11a/n/ac WLAN access point can be set to RF channels that will avoid interference from which sources?
radar
An antenna is a device that focuses RF energy into specific radiation patterns. The gain of an antenna represents which type of power measurement?
relative
Hiding the SSID (service set identifier) means to:
remove it from beacons
Which of the following section provide an overview of whom the policy will apply to, the use of the wireless spectrum, the acceptable use policy, and the importance of compliance.
scope
What task is an important part of determining coverage requirements for the installation of an IEEE 802.11 wireless network?
site survey planning
Accuracy of a predictive modeling wireless site survey depends on:
the information that is input by a wireless surveyor.
PIN-based security is:
used for home and other small installations.
With respect to antennas used in IEEE 802.11 WLAN technology, the elevation is: a. vertical coverage of an antenna radiation pattern. b. circular coverage of an antenna radiation pattern. c. horizontal coverage of an antenna radiation pattern. d. complete coverage of an antenna radiation pattern.
vertical coverage of an antenna radiation pattern. Elevation is the vertical coverage of an antenna radiation pattern determined by the design of an antenna and viewed from the side. The vertical beamwidth of antenna (elevation) varies depending on the antenna's gain.
Which of the following can be defined as the distance of one complete 360-degree cycle of an AC (Alternating Current) signal in IEEE 802.11 WLAN RF technology?
wavelength
What maximum amount of power per port is allocated in the IEEE 802.3-2012 Clause 33 (802.3af) Power over Ethernet amendment?
15.4 Watts
With respect to IEEE 802.11 wireless networking and for antennas, what is the angle at which beamwidth is measured?
-3 dB point
DCF (Distributed Coordinated Function) mode is used in IEEE 802.11 wireless networking. This access method uses a contention period for devices competing to send data on the network. The following steps are involved: Detect RF energy. Announce how much time is required for the frame exchange. Back off and retry if the medium is busy. Wait for a predetermined period of time between frames. What is the order of the steps that the DCF mode uses to transmit a wireless frame?
1, 2, 4, 3
The IEEE 802.11g amendment to the standard supports which data rates?
1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
IEEE 802.11b networks can operate at what data rate?
11 mbps
How many channels are available for use with IEEE 802.11 wireless networking in the 2.4 GHz band without taking any regulatory domain into consideration?
14
You need to upgrade the firmware on a WLAN access point. Other than a software file downloaded from the manufacturer's website, what else will be needed to perform this function?
A TFTP server running on a computer
Which device will produce active gain?
Amplifier
Which statements are true regarding the co-location of HR/DSSS and ERP-OFDM systems?
Both operate in the 2.4 GHz ISM band. & Both have three non-overlapping channels.
Most enterprise-grade IEEE 802.11 wireless access points can operate in which modes? a. CLI b. Bridge c. GUI d. Root
Bridge & Root Root access point mode is typically the default operation mode in which an enterprise-grade access point operates. Root access point mode involves connecting the access point to a DS (Distribution System). Wireless Bridge Mode configuration allows an access point to be set in bridge mode for wireless point-to-point or point-to-multipoint configurations connecting two or more LANs.
What does an IEEE organization create?
Computer networking standards
Which intrusion activity cannot be detected by a wireless intrusion protection system? a. RF denial-of-service (DoS) b. Hijacking c. MAC spoofing d. Eavesdropping
Eavesdropping
A WLAN controller is an example of which type of PoE (Power over Ethernet) device?
Endpoint device
During the manual WLAN RF site survey process, what purpose does a protocol analyzer serve?
Find other IEEE 802.11 WLANs in the area.
What information is essential to have as part of the RF WLAN site survey planning process and questioning regarding the business use of a WLAN? a. Interference sources b. Wiring closets c. Ethernet switch capacity d. Floor plans
Floor plans
When an IEEE 802.11 WLAN device sends a probe request in an attempt to join a wireless network, it is participating in which phase?
IEEE 802.11 active scanning
In order for a WLAN client device to pass data traffic, it must first ____________, and then ____________.
IEEE 802.11 authenticate, IEEE 802.11 associate
You are a computer support technician contracted to help determine the best IEEE 802.11 WLAN solution for a small office installation. The office is located in a multitenant building on the fifth floor of an eight-story building. Another business in an adjoining office is using an IEEE 802.11b WLAN operating on channels 1 and 6. The customer wants maximum throughput and does not need backward compatibility to IEEE 802.11b. Of the following, which is the best solution for this installation?
Install an IEEE 802.11n/ac MIMO WLAN, disable ERP protection, and set the access point to channel 11.
What is the function of a wireless repeater? a. it extends the ethernet segment length b. It connects access points to a common infrastructure. c. It extends the basic service area. d. It connects two WLANs together.
It extends the basic service area. explanation: A wireless repeater will extend the RF cell on an access point, thereby extending the BSA (basic service area).
Which statement is true regarding WPA 2.0?
It is a Wi-Fi Alliance certification addressing security.
What is true about the security configuration for port-based authentication in the client utility of a WLAN adapter?
It is user-configurable.
Which of the following statements is true about a wireless client device when it is in active mode?
It will not enter a doze state to conserve battery power.
Using a software-assisted manual WLAN site survey program consists of which task?
Performing a manual walkthrough of the environment
What defines the start and end of two different overlapping sine waves?
Phase
A third-party client utility such as the Microsoft's Windows WLAN AutoConfig service can be used with ____________.
SOHO implementations Enterprise implementations
What parameter must match on all WLAN devices that wish to be part of the same wireless BSS (Basic Service Set)?
SSID
IEEE 802.11 WLAN access points that are part of ESS (extended service set) must have the same _______.
SSID (service set identifier)
Which of the following are considered as MDM (Mobile Device Management) solutions?
Saas (software as a service) On-premises
You are called in to troubleshoot a WLAN problem in a small office for an accounting firm. None of the employees can access the Internet; however, they do show a connection to the SOHO wireless router. Users were able to access the Internet prior to your being called in. You start by testing one user's workstation and issue a ping command to the wireless router. You do get a ping response, but you cannot ping across the router to a valid IP address on the Internet. Which could be a possible problem based on the symptoms you experienced?
The wireless router is not receiving a DHCP address from the ISP.
Controller-managed access points require which capability to operate?
WLAN controller Controller-managed access points are used with hardware WLAN controllers. They are centrally managed from the hardware WLAN controller.
You are performing a manual WLAN RF site survey in a location that has several long hallways with small offices on both sides. Your objective is to minimize the number of WLAN access points while maximizing coverage. Which antenna would be a good choice based on these conditions?
Yagi
Which of the following statements is true about the propagation of RF energy through a vertically polarized omnidirectional antenna? a. it propagates horizontally in all directions b. it is in a spherical pattern c. it depends on the antenna gain d. it is in the shape of half a donut
it propagates horizontally in all directions When an omnidirectional antenna is vertically polarized (perpendicular to the earth's surface), the horizontal radiation pattern is 360° and will propagate RF energy in every direction horizontally.
What effect will half-duplex communication have on a WLAN?
less throughput
What is the cause of slow performance of an IEEE 802.11 WLAN client device?
low received signal strength
The device driver for a USB WLAN adapter is either installed _________ or _________.
manually automatically
When an antenna focuses emitted isotropic RF energy into a specific radiation pattern, it is known as ________ gain.
passive
Which layer connectivity is required to provide successful communications for IEEE 802.11 wireless networks?
physical
You are a technical support engineer for an IEEE 802.11 wireless network in a small office complex. You are called in to check with a user who has been complaining that the wireless network is running slowly. As you change the orientation of the user's notebook computer, you notice the signal strength varies. Change in which of the following results in this variation in signal strength?
polarity