M03 Chapter 6 Review
The open system authentication process uses how many frames?
Two
IEEE 802.11n protection mode _______ allows backward compatibility to non-802.11n devices.
3
A service set identifier (SSID) has a maximum limit of how many characters or octets?
32
Which items describe a service set identifier (SSID)? (Choose two.)
32 characters maximum Is case sensitive
WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)?
802.11a client devices
A basic service set identifier (BSSID) is the unique identifying MAC address of the ____________.
AP radio
You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?
Active mode
A basic service set (BSS) consists of how many access points?
At least one
In order for a wireless client to become completely part of the basic service set, it must first ____________ and then ____________.
Authenticate, associate
The IEEE 802.11 association process happens after which phase?
Authentication
As a device moves away from an access point, which of the following is true regarding dynamic rate switching?
Data rate decreases
You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?
Dynamic rate switching
You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?
ERP protection
Which of the following is not an advantage of an IBSS network?
Easy to secure
The IEEE 802.11 Shared key authentication method exchanges ____ frames as defined in the IEEE 802.11 standard.
Four
When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set?
Independent
A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?
Mismatched SSID
How many access points are used by a basic service set (BSS)?
One
According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
When a WLAN device listens for beacon frames, it is participating in which phase?
Passive scanning
Which of the following is not an IEEE 802.11 management frame type?
RTS
The process in which a WLAN client connection moves from one access point to another is called ____________.
Roaming
In order to set up an ad hoc network, a user must know which two parameters? (Choose two.)
SSID Channel