itsp215/itsp216

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

True.

True or False? Unlike an access point, IBSS has no centralized control or manageable security or accounting features.

Passive scanning

When a WLAN device listens for beacon frames, it is participating in which phase?

When an IEEE 802.11g wireless LAN consists only of wireless client stations, the network is operating as what type of basic service set?

A. Active ~B. Independent~ C. Passive D. Infrastructure

Wireless LAN devices in an 802.11a peer-to-peer network will connect to which device(s)?

A. An access point B. 802.11g client devices ~C. 802.11a client devices~ D. A wireless switch

In order for a wireless client to become completely part of the basic service set, it must first _______ and then ______

A. Associate, authenticate ~B. Authenticate, associate~ C. Deauthenticate, authenticate D. Disassociate, authenticate

general policy and functional policy

16. Which of the following describe the two main parts of a computer network security policy? (Choose two.)

What address would be considered a Windows Automatic Private IP Address, assigned when no DHCP server is available on the LAN?

169.254.0.1

as a access control method

17. A digital certificate is commonly used for which of the following?

SaaS and on-premises

18. Which of the following describe common placements for an MDM solution? (Choose two.)

acceptable use policy

19. After the successful installation of an MDM solution, the administrator should ensure that all users of mobile devices agree to rules stated in which of the following documents?

What is a valid logical IP address?

192.168.200.1

what is a valid IP address

192.168.200.1

802.11b capable of which of the following data rates?

1Mbps, 5.5Mbps, 11Mbps

FHSS uses which communication method to exchange data?

1mhz-wide subcarriers

802.11e-2005

2 MAC methods needed to meet the QoS requirements for time-sensitive applications over IEEE 802.11 WLANs

D. enterprise mobile app store- helps an organization control and regulate the apps that are used within its environment, including custom- or purpose-built apps

2. Different types of mobile app stores are available based on what apps a user will need to download. Which app store would be the best choice to download a custom-built app designed specifically for an organization?

Interference from existing ______ may cause a problem with an IEEE 802.11 wireless network in a manufacturing company.

2.4 GHz ISM band devices

You are a wireless network engineer contracted to perform a site survey for a company that manufactures widgets. The wireless site survey will require a physical walk-through of the area. One concern in this implementation is interference from existing _______.

2.4 GHz ISM band devices

Wi-Fi certified network devices can operate in what frequency band(s)?

2.4 GHz and 5 GHz

WiFi certified network devices can operate in what frequency band(s)?

2.4 GHz and 5 GHz

HR/DSSS devices operate in which frequencyt rane?

2.4 ghz ISM

IEEE 802.11g WLANs operate in what frequency range?

2.4-2.5ghz

IEEE 802.11g wireless networks can operate in which unlicensed RF band?

2.400-2.500 GHz ISM

Verify user group assignment and verify MDM policy

20. A BYOD device is unable to access a company's intranet website. The user of the device is not experiencing any other network connectivity issues. Which of the following should the administrator perform to troubleshoot this problem? (Choose two.)

an 802.11b channel is how wide in MHz

22 MHz

An 802.11b channel is how wide in MHz?

22MHz

An HR/DSSS channel is how wide?

22mhz

In the 2.4 GHz range, what distance between the center frequencies (in megahertz) is required for two channels to be considered nonoverlapping for HR/DSSS?

25 MHz

In the 2.4 GHz range, what distance between the center frequencies is required to be considered non-overlapping for HR/DSSS?

25 MHz

New Modulation

256-QAM modulation 30 percent increase in speed

How many nonoverlapping channels are available in the unlicensed 2.4 GHz ISM band?

3

B. Geo-location can use different methods to locate a device. One example is time difference of arrival (TDoA), which is a multilateration technology technique. TDoA measures the difference in distance between two stations

3. What technology may use a form of multilateration known as time difference of arrival (TDoA) to measure the difference in distance between two stations from known locations?

Question 1 : How many characters is the maximum limit of a service set identifier (SSID)?

32

Static output Transmit power of a SOHO access point is typically

32 dbm

802.11y-2008

3650 MHz-3700 MHz licensed band in the United States requires content-based protocol (CBP) dynamic STA enablement (DSE) procedures

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?

4

How many unlicensed UNII-1 band channels are available for wireless LANs?

4

C. Mobile device profile

4. Which of the following is a set of parameters or instructions that will provide a device with the ability to connect to a network and follow specific requirements or settings for the connected session?

The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage.

48

The 802.3-2005 clause 33 standard specifies ___ VDC as the nominal voltage.

48 VDC

The nominal voltage supplied to Power over Ethernet (PoE) devices and specified in the IEEE 802.3-2005 Clause 33 amendment.

48 VDC

What is the nominal voltage for PoE?

48 volts of DC or VDC

802.11a-1999

5 GHz frequency space Orthogonal Frequency Division Multiplexing (OFDM) less-crowded 5 GHz U-NII bands U-NII-1, U-NII-2, and U-NII-3 band data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps

802.11a operates in the _______ GHz frquency ranges and uses the ______- frequency bands.

5, UNII

802.11a operates in the __________ GHz frequency range and uses the ___________ frequency bands.

5, UNII

Which frequency randes are used in an IEEE 802.11a-compliant wireless LAN?

5.25 ghz UNII range 5.35 ghz UNII range

A wireless repeater can reduce the data throughput by up to _____ percent.

50

OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate of ___ mbps.

54

According to 802.11a amendment which of the following data rates are mandatory

6, 12, and 24 mbps

Location services are disabled on the device.

6. Which of the following would prevent a network administrator from effectively using a geo-fencing technology product on an Android mobile device?

Wired Equivalent Privacy (WEP)

64-bit static encryption

Onboarding

7. What method defines the process of connecting a device to a wireless network for the first time and allowing a user to register their device in order to gain access to the company and other network resources?

802.11g is backward-compatible with which of the following IEEE wireless LAN standards?

802.11 DSSS 802.11b HR/DSSS

Question 33 : Which of the following standards is used by DSSS modulation technique?

802.11b

Stations operating in which two IEEE 802.11 amendments are interoperable?

802.11b and 802.11g

A, C, D

802.11b is capable of which of the following data rates? (choose 3) A. 1 Mbps B. 6 Mbps C. 5.5 Mbps D. 11 Mbps E. 12 Mbps

Which IEEE 802.11 standard and which wireless access point grade can support Wi-Fi multimedia certifications and QoS?

802.11e Enterprise-grade

You are hired by ABC Company to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ______ or ______ amendments to the 802.11 standard. (Choose 2)

802.11g 802.11n

DSSS and HR/DSSS

802.11g is backward-compatible with which IEEE wireless LAN standards? (choose 2)

You are hired by ABC Comapny to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ________ or ________ amendments to the 802.11 standard.

802.11g, 802.11n

Ratified in 2005, which IEEE 802.11 amendment covers security?

802.11i

WPA was developed as an interim solution for which amendment to the 802.11 standard?

802.11i

Devices compiant with which amendment to the IEEE standard use multiple radio chains and multiple antennas

802.11n

The IEEE ________ amendment specifies fast transition (FT) and the IEEE ________ amendment helps with this functionality.

802.11r 802.11k

Which IEEE 802.11 standard and which wireless access point grade can support fast BSS transition (FT)?

802.11r Enterprise-grade

The IEEE ___________ amendment to the IEEE 802.11 standard included wireless mesh networking in 2011.

802.11s

Which IEEE 802.11 standard and which wireless access point grade can support security management frames?

802.11w Enterprise-grade

This IEEE standard defines VLANs.

802.1Q

Which IEEE standard does PoE fall under?

802.3 Ethernet

Formerly IEEE 802.3af, an amendment to the Ethernet standard for Power over Ethernet (PoE). Addresses supplying both data and DC power over a single Ethernet cable.

802.3-2005 Clause 33

Digital certificates enrollment

9. Which of the following is the most secure way of access control that can be used with mobile devices, computers, and other devices and will ensure that only valid, authorized users will gain access to the corporate network infrastructure?

10. The physical address of a network adapter is the _____. A. MAC address B. Logical address C. Layer 3 address D. Mesh address

A

16. Which protocol is responsible for addressing and routing? A. IP B. TCP C. UDP D. ARP

A

19. Which layer of the OSI model uses physical addresses to deliver data to the destination? A. Physical B. Data Link C. Network D. Transport

A

8. Which topology may use a token passing access method? A. Ring B. Mesh C. Bus D. Star

A

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity

A

A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the OS C. Hardware to install a PCI card D. Hardware to install a client bridge

A

How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8

A

Six wired clients can connect to a wireless LAN by using which device? A. Workgroup bridge B. PCI bridge C. Mini-PCI adapter D. PCI adapter

A

Which component is required for a successful installation and operation of an 802.11n wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows WZC

A

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint

A

HR/DSSS devices operate in which frequency range?

A - 2.400 GHz ISM

DSSS uses which spreading code in 1 Mbps?

A - Barker

Which network access method attempts to avoid collision?

A - CSMA/CA

L2TP commonly uses which encryption method?

A - IPSec

You are a wireless network administrator monitoring the reports for the recently installed wireless intrusion prevention system. You receive an alert notifying you of high level of RF activity detected from an access point operating as a sensor and currently set to channel 6. Which problem could be causing the alert? (Choose two)

A - Interference from a neighboring access point C - RF DoS attack

Which functions does RBAC provide?

A - Restricts access to authorized users and groups

Which process is a VPN solution intended to provide for users connecting to a network?

A - Secure Layer 3 transmissions over a public network infrastructure

Which security methods do 802.11a/b/g access points support? (Choose three)

A - WPA Enterprise B - WEP E - MAC filtering

Both________and______________ are WLAN security methods that support shared key security. (Choose two)

A - WPA2 Personal D - WPA Enterprise

physical

A MAC address is a unique identifier of each device on the computer network and is known as the _____ address.

MAC address spoofing

A way of changing (through software) the assigned Layer 2 MAC address to something other than what it was intended to be. This may allow you to gain access to restricted systems.

Access permissions and Data encryption

A well-planned and executed mobile device security strategy will help to ensure that company policy is implemented and enforced as designed and intended with every technology deployment, regardless of the device platform that is used. Which two of the following should be considered with regard to content distribution

Existing network infrastructure

A wired or wireless network already in place and functioning that may be used as part of an upgrade or a new deployment.

Six wired clients can connect to a wireless LAN by using which device?

A workgroup bridge

Which IEEE ratified amendments were defined in 2012? Choose two. A) 802.3af B) 802.11.af C) 802.11at D) 802.3at E) 802.1at F) 802.1af

A) 802.3af D) 802.3at Note, it is also called PoE+

Which items describe a service set identifier (SSID)? (Choose two.) A. 32 characters maximum B. 64 characters maximum C. Is case sensitive D. Is not case sensitive

A. 32 characters maximum C. Is case sensitive

A service set identifier (SSID) has a maximum limit of how many characters or octets?

A. 8 B. 16 ~C. 32~ D. 128

A spectrum analyzer can be used to view what? A. Radio frequency B. Wireless packets C. Data rates D. Association frames

A. A spectrum analyzer can be used to view radio frequency. Wireless packets, data rates, and association frames can be viewed with a protocol analyzer.

A basic service set identifier (BSSID) is the unique identifying MAC address of the ____________. A. AP radio B. AP Ethernet port C. Router D. Client

A. AP radio

Powered amplifiers provide an increase in signal strength by using ____________ gain. A. Active B. Passive C. Positive D. Maximum

A. Active Active gain requires an external power source to provide an increase in signal strength. An amplifier is an example of a device that uses active gain. Antennas provide an increase in strength by using passive gain.

RF coverage of access points depends on which factor?

Access point output power

Which of the following does not contribute to wired infrastructure problems?

Access points

802.11s-2011

Access points can therefore act as portal devices to a wireless distribution system (WDS) proposes the use of a protocol for adaptive, autoconfiguring systems that support broadcast, multicast, and unicast traffic over a multihop mesh WDS

How does the book define a consumer-grade access point?

Access points that are usually equipped with an Internet port, several ports for Ethernet connections, and a wireless access point.

D

According to the 802.11a amendment, which of the following data rates are mandatory? A. 1, 2, 5.5 and 11 Mbps B. 6, 24, and 54 Mbps C. 6, 9, 12, 18, 24, 36, 48, 54 Mbps D. 6, 12, and 24 Mbps E. 1, 6, 12, and 24 Mbps

Which devices are abbreviated by the initialism STA?

According to the IEEE 802.11 standard all wireless devices, including access points.

An increase in signal strength from devices such as amplifiers. Devices that provide active gain require an external power source.

Active gain

Part of the original IEEE 802.11 standard defining power save features for wireless LAN client devices. In this mode, no power save features are enabled, and the wireless LAN client device does not suspend to a low-power or doze state.

Active mode

Question 17 : You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager, who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?

Active mode

Part of the discovery phase of a wireless LAN. Allows for probe request and probe response frames to be sent and received. Takes place prior to IEEE 802.11 authentication.

Active scanning

A type of manual wireless LAN site survey that requires an association to an access point.

Active site survey

Another term for independent basic service set (IBSS), a wireless network in which no access points are used and only device-to-device communication takes place. This type of network is also called peer-to-peer.

Ad hoc

A wireless client device is showing a low receive signal strength value. What option could improve this situation?

Add another access point

The throughput of a wireless LAN client device can be increased by performing which task?

Adding access points

What can solve a hidden node problem caused by an obstacle or obstruction on an IEEE 802.11g wireless network?

Adding another access point

Which of the following is correct regarding 802.11e?

Addresses wireless quality of service

An incorrect passphrase set on a client device will result in a different preshared key that is generated for a device using WPA 2.0 as a security solution. What will be the result of a mismatched passphrase between the client device and an access point?

Association is established and terminated and no valid IP address

Data Link

At which layer of the OSI model are bits compiled into frames?

physical and data link

At which two layers of the OSI model do wireless LANs operate?

In order for a wireless client to become completely part of the basic service set, it must first _______ and then _______

Authenticate, associate

A way to validate or confirm the identity or credentials of a user, client, or device. Can be user based or hardware based.

Authentication

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN. What is this process of identity validation called?

Authentication

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN?

Authentication

Captive portal

Authentication web page for a wireless hotspot or other type of wireless LAN application. The web page is a redirection and might ask users to enter authentication information and to agree to terms and conditions of use of the wireless network.

The wireless client service/utility that is integrated in Windows 7 as a replacement for the Wireless Zero Configuration (WZC) service included in Windows XP.

AutoConfig service

Newer technology used with IEEE 802.11 wireless LAN client devices to extend battery life by using a trigger frame for wireless devices to receive data buffered from an access point during a low-power or doze state.

Automatic Power Save Delivery (APSD)

13. Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network

B

14. At which layer of the OSI model are bits compiled into frames? A. Physical B. Data Link C. Network D. Transport E. Application

B

18. The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP

B

20. Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF

B

3. The lower three layers of the OSI model are _____, _____, and _____. A. Data link, Physical, Transport B. Physical, Data Link, Network C. Session, Physical, Application D. Application, Presentation, Session

B

A _____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation? A. Notebook B. Desktop C. Tablet D. Barcode scanner

B

A wireless workgroup bridge will allow you to do which of the following? A. Connect two wireless LAN NICs together. B. Connect a wired LAN to an AP. C. Connect a PCI card to a WLAN. D. Connect two client bridges.

B

Most manufacturers recommend installing a wireless IEEE 802.11n USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process

B

Power sourcing equipment delivers which of the following? A. RF power to the access point B. DC power to the end device C. RF power to an antenna D. DC power to an antenna

B

Static output transmit power of a SOHO access point is typically: A. 32 dBm B. 15 dBm C. 23 mW D. 15 mW

B

The IP address of a network adapter is also known as which address? A. MAC address B. Logical address C. Layer 4 address

B

USB was designed as a replacement for which two legacy communication connections? A. Serial and PCI B. Serial and parallel C. Parallel and ISA D. Parallel and EISA

B

Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility

B

Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN? A. Mini-PCI card B. Device driver C. Third-party utility D. Enterprise utility

B

Which layer of the OSI model is responsible for addressing and routing? A. Physical B. Network C. Transport D. Application

B

Which layer of the OSI model is responsible for delivering data to a unique hardware address? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

B

Which of the following statements is true regarding a wireless LAN controller? A. Virtual local area networks (VLANs) involve physical separation of ports. B. Virtual local area networks (VLANs) involve a logical separation of ports. C. Virtual local area network (VLAN) is another name for a repeater. D. Virtual local area networks (VLANs) require Power over Ethernet (PoE).

B

You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 2.0 C. Half Mini-PCIe D. PCMCIA

B

What is the maximum data rate of HR/DSSS 802.11b device?

B - 11 Mbps

OFDM uses which communication channel width to exchange data?

B - 20 MHz-wide channel

The 802.1X standard identifies that authenticator as another term for the ____________in wireless networking

B - Access Point

A newly configured wireless intrusion prevention system will ___________

B - Automatically monitor the network for potential attacks

The security amendment to the 802.11 standard requires___________

B - CCMP

You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation you could provide?

B - Carefully plan a strategy using WEP and VLANs

Which two channels could be used so that the access points do not interfere with each other in an 802.11g/n wireless network? (Choose three)

B - Channel 1 and Channel 9 C - Channel 6 and Channel 11 D - Channel 2 and Channel 8

Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?

B - PIN

Which security feature provides one of the strongest security methods for home based wireless networks?

B - Passphrase

A weakness with MAC address filtering is that it allows an intruder to ______________.

B - Spoof an address

How many access points can be co-located without channel reuse in the same RF area to maximize total system throughput while minimizing RF interference in an 802.11g/n network?

B - Three

Supported by WPA and WPA 2.0, RADIUS utilizes which type of authentication? A) 802.1X/WPA B) 802.1X/EAP C) 802.11X/WPA D) 802.11X/EAP E) 802.11AX/WPA F) 802.11AX/EAP

B) 802.1X/EAP

Enterprise-grade access points commonly include three types of antennas, choose the correct antennas from this list: A) Multi-directional B) Semi-directional C) Omnidirectional D) Mostly directional E) Highly directional F) Half-directional

B) Semi-directional C) Omnidirectional E) Highly directional

802.11a access points support which antenna technology to help reduce the effects of multipath? A. Adjustable gain B. Antenna diversity C. Adjustable polarization D. Antenna multiplexing

B. Antenna diversity 802.11a access points can use antenna diversity. Gain and polarization are considered RF concepts.

A basic service set (BSS) consists of how many access points? A. Zero B. At least one C. At least two D. At least four

B. At least one

In order for a wireless client to become completely part of the basic service set, it must first ____________ and ____________ then. A. Associate, authenticate B. Authenticate, associate C. Deauthenticate, authenticate D. Disassociate, authenticate

B. Authenticate, associate

A wireless workgroup bridge will allow you to do which of the following? A. Connect two WLAN NICs together B. Connect a wired LAN to an access point C. Connect a PCI card to a WLAN D. Connect two client bridges

B. Connect a wired LAN to an access point

Which is required in order to successfully install an IEEE 802.11ac WLAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility

B. Device driver

An azimuth chart shows which RF radiation pattern? A. Vertical B. Horizontal C. Positive D. Negative

B. Horizontal The horizontal RF radiation pattern of an antenna is displayed using an azimuth chart. The vertical radiation pattern is displayed using an elevation chart.

When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set? A. Active B. Independent C. Passive D. Infrastructure

B. Independent

The process in which a WLAN client connection moves from one access point to another is called ____________. A. Reauthentication B. Roaming C. Rebuilding D. Roving

B. Roaming

Wireless bridges must be configured with and . (Choose 2.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy

BC

Which of the following is a benefit of a wireless repeater? (Choose 2.) A. Higher data transfer rate B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput E. Extends cell size

BE

DSSS uses which spreading code at 1mbps

Barker

When implementing a wireless LAN, what is the area covered by an AP and usable by a client station called?

Basic Service Area

The area of radio frequency coverage surrounding an access point or other wireless infrastructure device and the associated wireless LAN client devices.

Basic service area (BSA)

One access point connected to a distribution system.

Basic service set (BSS)

The MAC address or physical address of a wireless access point radio card. Should not to be confused with service set identifier (SSID).

Basic service set identifier (BSSI)

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _________ frames, and active scanning, where a client sends and receives _________ frames.

Beacon ; Probe

Which of the following frames is used in the passive scanning mechanism?

Beacon management frame

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _______ frames, and active scanning, where a client sends and receives ________ frames.

Beacon; Probe

Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge only mode B. Repeater only mode C. Root access point mode D. Access mode

C

Which client device will allow a user to connect several Ethernet devices on a common segment to an access point? A. PCMCIA B. PCI bridge C. Wireless workgroup bridge D. Ethernet bridge

C

You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter. Which card would work best in this case? A. PCI B. Half Mini-PCIe C. PCMCIA D. ISA

C

Which frequency range are used in an 802.11a compliant WLAN? (Choose two)

C - 5.25 GHz UNII range D - 5.35 GHz UNII range

The length of a WEP key is typically _____________ or __________

C - 64-bit, 128-bit

RADIUS requires users on a wireless network to perform what functions?

C - Enter a username and password that will be centrally administered

Which WLAN technology can be used to obtain the highest data transfer rate possible?

C - HR-OFDM

802.11a/b/g/n/ac devices use what type of communication?

C - Half Duplex

What type of wireless network device is PIN based security most commonly used with?

C - SOHO brands that support WPS

What technology is used to send WLAN data over a wireless medium using many sub-carrier frequencies?

C - Spread Spectrum

Which 802.11 PHY technology specifies an 80 MHz-wide channel for transmitting and receiving data?

C - VHT-OFDM

In computer network terminology, the definition of half-duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time

D. Two-way communication one way at a time

You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term? A. Dynamic frequency selection B. Transmit power control C. Dynamic rate switching D. Transmit save mode

C. Dynamic rate switching

Which weather element would commonly have an effect on a WLAN system? A. Rain B. Snow C. Wind D. Hail

C. Wind Of the answers listed, wind would have the biggest impact on a WLAN system. Rain, snow, and hail do not affect wireless transmission unless the weather is severe. In this case, the collection of the elements may have an impact on the WLAN signal transmitted or received.

Data Integrity

CCMP uses a much stronger MIC - Message Integrity Check (MIC) in the trailer of all 802.11 frames is a 32-bit CRC known as the frame check sequence (FCS)

In Europe radio Frequencies are managed by

CEPT

The access method that an IEEE 802.11a wireless network would use to get control of the wireless medium in order to transmit data is called what?

CSMA/CA

Which network access method attempts to avoid collisions?

CSMA/CA

With respect to IEEE 802.11 wireless networking, the capacity is how many wireless client devices or users that an access point can service effectively, offering the best performance.

Capacity

Which two channels could be used so that the access points do not interfere with each other in an 802.11b wireless network?

Channel 2, 3, 6, 8, 9, and 11

Given: In Single-Channel Architecture (SCA) systems multiple access points can use the same BSSID. This feature allows for the creation of a network-wide virtual access point that can be applied across multiple physical access points operating on the same channel.

Client stations do not have to make roaming decisions

Data Privacy

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Advanced Encryption Standard (AES) algorithm

The area or cell of radio frequency that surrounds a wireless access point.

Coverage

11. The term encapsulation means to _____. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload

D

15. Which protocol is used to guarantee delivery? A. UDP B. IP C. ARP D. TCP E. HTTP

D

17. Which layer of the OSI model allows physical addresses to be converted to logical addresses? A. Application B. Session C. Transport D. Network E. Data Link

D

9. Which layer of the OSI model provides an interface to the user? A. Physical B. Network C. Transport D. Application E. Data Link F. Presentation

D

Enterprise-grade IEEE 802.11g client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey

D

In addition to wireless networking, which adapter was designed for flash memory storage and can be used in a digital camera? A. PCI B. PCMCIA C. ISA D. SDIO

D

In computer network terminology, the definition of half duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time

D

Of all the devices listed, Secure Digital Input Output (SDIO) cards are most likely to be installed in which? A. Desktop computer B. Access point C. Notebook computer D. Pocket PC

D

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors? A. Application B. Transport C. Network D. Data Link E. Physical

D

Which wireless adapter may require some disassembly of a notebook computer to install? A. PCI B. PCMCIA C. PC Card D. Mini-PCI

D

Horizontal beamwidth is ____________ to the earth's surface. A. Parallel B. Perpendicular C. Positive D. Negative

A. Parallel Horizontal beamwidth is parallel to the earth's surface. This is based on how the E-field propagates away from the antenna element. Vertical beamwidth is perpendicular to the earth's surface.

RF line of sight is required for which type of IEEE 802.11 WLAN installation? (Choose two.) A. Point-to-point B. Scattered C. Point-to-multipoint D. Reflected E. Refracted

A. Point-to-point C. Point-to-multipoint Point-to-point and point-to-multipoint both require RF line of sight to be able to effectively communicate. Scattering, reflection, and refraction are all behaviors of RF.

Enterprise access points may contain which of the following features? (Choose three.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment

A. WPA 2.0 support B. RADIUS server D. Repeater mode

A basic service set (BSS) consists of how many access points?

A. Zero ~B. At least one~ C. At least two D. At least four

Access points work at which layers of the OSI model? (Choose 2.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

AB

Which of the following are midspan PoE devices? (Choose 2.) A. Single-port injectors B. Multiport injectors C. Endpoint injectors D. Endspan injectors

AB

Enterprise access points may contain which of the following features? (Choose 3.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment

ABD

Wireless LAN controllers may contain which of the following features? (Choose 3) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing

ABD

SOHO access points are typically configured by using and _____. (Choose 2.) A. HTTP B. FTP C. HTTPS D. CLI E. SMTP

AC

SOHO access points commonly support which of the following features? (Choose 3.) A. WPA 2.0 support B. CLI configuration C. Static output power D. Wi-Fi certifications

ACD

A basic service set identifier (BSSID) is the unique identifying MAC address of the _______.

AP Radio

Which one of the following adjustments can most benefit a high density environment?

APs with lower output power

An actual power measurement, not a ratio or a relative value; examples include watt (W), milliwatt (mW), and decibel relative to one milliwatt (dBm).

Absolute measure of power

Occurs when material absorbs an RF signal. None of the signal penetrates through the material.

Absorption

Warehouse inventory such as paint and other liquids in large quantities can cause which RF behavior?

Absorption

In wireless networking, combining digital computer data with high frequency alternating current (AC) in order to prepare it to be transmitted across the wireless medium.

Modulation

Technology introduced in the IEEE 802.11n amendment to describe various HT-OFDM data rates depending on the wireless LAN technology in use such as 20/40 MHz wide radio frequency channels or short guard interval.

Modulation and coding scheme (MCS)

Layer 3 of the OSI model; this layer is where the Internet Protocol (IP) protocol resides and is responsible for the addressing and routing of computer data.

Network layer

Interference that is not related to IEEE 802.11 wireless LANs. It can be caused by devices that operate in the 2.4 GHz ISM band or the 5 GHz UNII band, such as microwave ovens, cordless phones, and ground radar.

Non-Wi-Fi interference

Radio frequency channels that do not occupy the same part of the radio spectrum. In IEEE 802.11 wireless networking, there must be a separation of five channels or 25 MHz to be considered nonoverlapping.

Nonoverlapping channels

A data frame that contains no frame body and therefore has no data. It is used by a wireless station to inform an access point of a change in power save status.

Null function frame

The Capacity of an access point is dependent upon which two factors?

Number of Users Software Applications

What factor usually determines whether a wireless LAN site survey is required?

Number of access points

What can have a negative effect on the capacity of an IEEE 802.11g wireless LAN access point?

Number of associated users

What is a main factor in determining the number of access points required for an IEEE 802.11n wireless LAN deployment?

Number of client devices

Which of the following is a main factor in determining the number of access points required for an IEEE 802.11n wireless LAN deployment?

Number of client devices

Output power of the access point

Number of users associated

IEEE 802.11a uses which PHY technology

OFDM

application, presentation, session, transport, network, data link, physical

OSI levels

Which item has an effect on RF line of sight?

Obstacles

Which wireless LAN deployment scenario uses mostly omnidirectional antennas mounted directly to an access point?

Office building

Enterprise office area wireless LAN deployments commonly use _______ antennas for most installations.

Omnidirectional

Tube shaped Antenna forms what type of direction of connection?

Omnidirectional

What would be the best antenna choice for a general office that requires complete coverage throughout the entire location?

Omnidirectional

Which would be the best antenna choice for a general office that requires complete coverage throughout the entire location?

Omnidirectional

An antenna connected to an access point and commonly used indoors to provide 360-degree horizontal coverage. It can also be used with outdoor installations for point-to-multipoint connections.

Omnidirectional antenna

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

One or more

Question 11 : Which of the following is the default authentication method used by the 802.11 devices?

Open System authentication

An automatic authentication process defined by the IEEE 802.11 standard to give wireless LAN client devices the capability to connect to an access point. It consists of two wireless frames.

Open system authentication

In wireless networking, modifying or changing a system to make it work more efficiently and to increase overall system performance.

Optimizing

IEEE 802.11

Original IEEE 802.11 Standard published in June 1997 - IEEE Std 802.11-1997 revised in 1999 reaffirmed in 2003 - IEEE Std 802.11-1999 (R2003) On March 8, 2007 - IEEE Std 802.11-2007 March 29, 2012 - IEEE Std 802.11-2012

A technology designed to transmit many signals simultaneously over one transmission path in a shared medium; it is used in wireless networking with IEEE 802.11a/g/n networks.

Orthogonal frequency division multiplexing (OFDM)

9, 18, 36, 48, 54 Mbps

Orthogonal frequency division multiplexing data rates supported but not required

6,12,24 Mbps

Orthogonal frequency division multiplexing required data rates

In what type of WiFi deployment is an antenna mounted using a pole mounting kit, as shown in the exhibit?

Outdoor Bridging

A newer term for the PCMCIA adapter. The PC Card has been replaced with ExpressCard technology.

PC Card

Personal Computer Memory Card International Association, a standards organization that defines and promotes PC card technology. Also used as the name of the card.

PCMCIA

You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter which card would work best in this case?

PCMCIA

Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way?

PCMCIA/USB 2.0

Identifies the Physical layer (Layer 1) of the OSI model, which consists of bit-level data streams and computer network hardware connecting the devices together.

PHY

Directional Dish Bowl shaped

Parabolic Dish

A highly directional (high-gain) antenna typically used outdoors for long-range point-to-point links.

Parabolic dish antenna

The result of focusing isotopic energy into a specific radiation pattern. Using an antenna to achieve passive gain results in an increase or change in RF coverage.

Passive gain

Question 15 : When a wireless LAN device listens for beacon frames, it is participating in which phase?

Passive scanning

The process in which IEEE 802.11 wireless LAN client devices "listen" to the RF medium for beacons that advertise the presence of an IEEE 802.11 wireless network.

Passive scanning

A type of manual wireless LAN site survey that monitors all access points in an RF coverage area. No association to an access point is required.

Passive site survey

An antenna providing semidirectional coverage and a more specific radiation pattern than an omnidirectional antenna (but less specific than a highly directional antenna). This antenna can be used either indoors or outdoors.

Patch/panel antenna

Which Wi-Fi vertical market applications are regulated by a government or industry group for security compliance? (Choose 2)

Patient records in hospitals Consumer payment information in retail stores

Which WiFi vertical market applications are regulated by a government or industry group for security compliance?

Patient records in hospitals, Consumer payment information in retail stores

Another term for independent basic service set (IBSS), a wireless network in which no access points are used and only device-to-device communication takes place. This type of network is also called ad hoc.

Peer-to-peer

802.11ae-2012

QoS management quality-of-service management frame (QMF) service can be enabled

The WiFi Multimedia (WMM) certification, which is illustrated in the exhibit, pertains to which topic?

Quality of Service

Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification?

Quality of Service

Temporal Key Integrity Protocol (TKIP)

RC-4 stream cipher algorithm - enhancement of WEP encryption

B

Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network

What Layer of the OSI model is responsible for organizing the bit level data for communication of devices on a network and detecting and correcting physical level errors

Data Link

What layer of the OSI reference model is responsible for data framing for a given physical layer technology?

Data Link

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors.

Data Link

Circuitry that carries data between components such as the CPU, memory, and expansion boards or slots within a computer.

Data bus

Question 6 : As a device moves away from an access point, which of the following is true regarding dynamic rate switching?

Data rate decreases

An area that lacks RF coverage and can be caused by obstructions or weak RF signals.

Dead spot

The process of losing an IEEE 802.11 authentication from a system. In IEEE 802.11 wireless LAN technology, logging off or roaming from a basic service set will deauthenticate. It is a notification, not a request, and can be sent from either an access point or an associated wireless device.

Deauthentication

What unit of measurement is used to measure the power difference between two RF signals?

Decibel

A ____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation?

Desktop

Which component is required for a successful installation and operation of an 902.11n wireless USB adapter?

Device Driver

Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN

Device Driver

Method in which traffic is handled by the edge device such as an access point, eliminating the need to send data through the infrastructure to a wireless LAN controller for processing.

Distributed data forwarding

An infrastructure, wired or wireless, connecting to an access point that allows data to be sent from wireless devices to resources on a network.

Distribution system (DS)

ABC Company would like to provide WiFi coverage to the are highlighted on the floorplan in the exhibit. If mounted at location-A, what type of antenna would provide a coverage pattern similar to the highlighted area?

Diversity Patch

A wireless LAN controller or an Ethernet switch that delivers DC voltage directly to connected devices to supply both DC voltage and computer data.

Endpoint device

____________________ delivers DC power directly over the same wire pairs that carry data over the unused wire pairs.

Endpoint injector

VPN solutions are often used in conjunction with WIFi networks for what purpose?

Endpoint secuirty for traveling users connected to unsecure WiFi hot-spots

Virtual Private Network (VPN) solutions are often used in conjunction with Wi-Fi networks for what purpose?

Endpoint security for travelling users connected to unsecure Wi-Fi hot-spots

A wireless infrastructure device with an extensive feature set; it is connected to a distribution system, allowing wireless LAN devices to access computer network resources. Contains at least two network interfaces, 10/100/1000 BaseT/Tx Ethernet (usually) and RF (wireless).

Enterprise access point

List the three interfaces typically available on a wireless branch router/remote access point.

Ethernet port(s) Internet port to connection to the WAN or an Internet connection Wireless port to allow IEEE 802.11 computers and devices to connect to a network through a wireless connection

Business requirements

Expectations within a certain type of business model such as manufacturing, enterprise, retail, or education.

The "next generation" of a PC card. Lower in cost, smaller in size, and higher in performance.

Express Card

802.11g-2003

Extended Rate Physical (ERP) transmit in the 2.4 GHz to 2.4835 GHz ISM ERP-OFDM - Extended Rate Physical OFDM Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps ERP-DSSS/CCK - used with support for the data rates of 1, 2, 5.5, and 11 Mbps

Protection mechanism used with IEEE 802.11g wireless LAN systems to allow backward compatibility and coexistence between ERP, DSSS, and HR/DSSS wireless devices.

Extended rate physical (ERP) protection

One or more interconnected basic service sets connected to a common distribution system.

Extended service set

Another term for service set identifier (SSID), used by manufacturers to identify the name of a wireless network.

Extended service set identifier (ESSID)

Given: You are recommending an AP for use in a warehouse environment. Some APs will require directional antennas and others will use dipole antennas. What feature must be supported by the APs in this installation?

External antennas

Given: You are recommending an AP for use in a warehouse environment. Some APs will reuqire diectional antennas and others will use dipole antennas. What feature must be supported by the APs in this installation?

External antennas

What organization is responsible for unlicensed frequency band regulation in the united states?

FCC

Bluetooth devices use ____ which an poentially cause interference with WLANs.

FHSS

Data rate and throughput are different terms for the same concept. (True/False)

False

It is unimportant to have knowledge existing network infrastructure forma wired and wireless perspective when deploying a new wireless network. (True/False)

False

Multipath is the result of absorption. (True/False)

False

True or False: An administrator should always configure an access point from the wireless network.

False

True or false, SOHO-grade access points usually have a more extensive feature set than enterprise-grade access points.

False

True or false: A benefit of a wireless LAN controller is distributed administration.

False

True or false: An administrator should always configure an access point from the wireless network.

False

True or false: a benefit of a wireless LAN controller is distributed administration.

False

True or false, PoE spends AC voltage and computer data over the same Ethernet cable, enabling a device to receive AC power and computer data simultaneously.

False, DC power

True or false, In a full mesh network all nodes connection together with one path for every node.

False, full mesh needs at least two paths for every node.

True or false, Centralized data forwarding reduces the amount of infrastructure traffic because the controller-managed access point is able to make more decisions, taking some of the load away from the wireless controller.

False, this describes distributed data forwarding

True or false, consumer-grade access points are typically equipped with NAT, DHCP, DNS services, and wireless repeater functionality.

False, wireless repeater functionality is typically not a feature of consumer-grade access points.

802.11ak

General Link (GLK) bridged networks

HT protection mode that allows only high throughput (HT) functionality. IEEE 802.11a/b/g stations on the same channel are not allowed to connect. These devices will not communicate with a Greenfield access point, and transmissions will collide, resulting in errors.

Greenfield mode (mode 0)

Directional antenna See through

Grid

What two types of antennas are used in point to point connections

Grid and Parabola

A metal rod driven into the earth 8 feet or more and used to direct electrical currents to earth ground that are caused by lightning strikes.

Grounding rod

HT protection mode used in IEEE 802.11n networks only if HT stations are associated in the BSS and at least one 20 MHz HT station is associated.

HT 20 MHz protection mode (mode 2)

HT protection mode used in IEEE 802.11n networks if one or more non-HT (IEEE 802.11a/b/g) stations are associated in the BSS. This is the most common mode used with IEEE 802.11n wireless networks to date.

HT mixed mode (mode 3)

HT protection mode used in IEEE 802.11n networks if there are non-HT stations (IEEE 802.11a/b/g) or access points using the primary or secondary channels.

HT nonmember protection mode (mode 1)

Which wirelessLAN technologycan be used to obtain the highest data transfer rate possible?

HT-OFDM

SOHO access points are typically configured by using and . (Choose 2.)

HTTP and HTTPS

SOHO access pints are typically configured by using ___ and ___

HTTP/HTTPS

IEEE 802.11a/b/g/n devices use what type of communication?

Half Duplex

The Half Mini-PCIe card is half the length of the Mini-PCIe card. The length is the only difference between the two.

Half Mini-PCIe

Two-way communication that occurs in only one direction at a time.

Half-duplex

Implementations that may have existing non-wireless LAN devices that will potentially interfere with a 2.4 GHz wireless LAN deployment most likely fall under what business model?

Healthcare

The amplitude of an RF signal is:

Height

Which of the following is the amplitude of an RF signal?

Height

- Increase Output Power of Client Devices - Move Client Devices Closer Together - Add More Access Points

Hidden Node Distance solutions:

- Remove the obstacle - Add access points

Hidden Node Obstacle solutions:

Technology

Hidden Node _______________ problems occur when access points experience excessive collisions because of different spread spectrum or Physical layer communication technologies that are sharing the same RF medium.

In wireless networking, the hidden node problem is the result of wireless client devices associated to an access point and not able to "hear" each other prior to starting an RF transmission. Hidden node results in excessive collisions at the access point.

Hidden node

Obstacle

Hidden node ___________ is caused by two or more client devices connecting to an access point in which access point-to-client device RF communication is clear, but client device-to-client device RF communication is blocked.

FM radio stations use what type of RF communication?

High power, Narrow bandwidth

A spread-spectrum technology used in IEEE 802.11b and IEEE 802.11b/g with data rates of 5.5 and 11 Mbps set on a specific radio frequency channel.

High rate/direct-sequence spread spectrum (HR/DSSS)

Protection mechanism that allows IEEE 802.11n devices to be backward compatible and coexist with IEEE 802.11a/b/g devices. There are four HT protection modes.

High throughput (HT) protection

802.11b-1999

High-Rate DSSS (HR-DSSS) 2.4 GHz to 2.4835 GHz ISM band Complementary Code Keying (CCK) Barker code data rates of 1, 2, 5.5, and 11 Mbps

What is an accurate description of peer communication

Horizontal link and Logical Link

Operating system feature that allows for replacement of computer system components and devices without powering down the system.

Hot-plug

In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?

How will PoE be supplied to WiFi client devices?

In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?

How will Power over Ethernet (PoE) be supplied to Wi-Fi client devices?

Given: Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?

IBSS

A wireless LAN will be deployed in a hospital. Which criterion would be addressed when discussing a potential RF jamming attack?

Physical security

A wireless LAN site survey and design includes defining and security requirements to help protect against RF jamming and protect the integrity of information.

Physical, Data

At which two layers of the OSI model do wireless LANs operate?

Physical/Data Link

Which scenario represents an improper installiation for an AP with low-gain omnidirectional antennas?

Place above the doorway, at one end of a long hallway

Which scenario represents an improper installation for an AP with low-gain omnidirectional antennas?

Placed above the doorway, at one end of a long hallway

Of all the devices listed Secure Digital Input Output (SDIO) cards are most likely to be installed in which?

Pocket PC

A Layer 3 VPN solution that uses the Microsoft 128-bit Point-to-Point Encryption (MPPE) protocol and provides both tunneling and encryption capabilities.

Point-to-Point Tunneling Protocol (PPTP)

three

Point-to-multipoint links consist of __________ or more connections.

semidirectional and highly directional antennas

Point-to-point links typically use which antenna types?

In order to extend network access from Building 1 to Building 2, ABC Company has implemented a WiFi solution. What type of WiFi solution is shown in the figure?

Point-to-point, Semidirectional, Bridge

Which communication amendments are commonly supported by consumer and SOHO-grade access points?

IEEE 802.11b IEEE 802.11g IEEE 802.11n IEEE 802.11ac

An amendment to the IEEE 802.11 standard that specifies operation in the 2.4 GHz ISM band for data rates of up to 54 Mbps and the OFDM Physical layer specification with Extended Rate Physical (ERP). IEEE 802.11g provides backward compatibility to IEEE 802.11b.

IEEE 802.11g

2.4-2.5 GHz

IEEE 802.11g WLANs operate in what frequency range?

An amendment to the IEEE 802.11 standard that specifies operation in the 2.4 GHz ISM band and the 5 GHz UNII band with data rates of up to 600 Mbps. IEEE 802.11n provides backward compatibility to IEEE 802.11a/b/g.

IEEE 802.11n

A

IEEE 802.11n devices use an enhanced radio technology known as multiple-input multiple-output (MIMO). Which statement correctly describes a benefit of MIMO? A. MIMO uses reflections to allow for increased throughput. B. MIMO rejects reflections to allow for increased throughput. C. MIMO uses a single radio with diversity technology for increased throughput. D. MIMO rejects data rates less than 54 Mbps for increased throughput.

Authentication

IEEE 802.1X authorization framework - Extensible Authentication Protocol (EAP) preshared keys (PSKs)

SOHO-grade access points also provide more advanced security features, such as user-based authentication ___________________ and _____________________.

IEEE 802.1X/EAP VPN pass-through

The area of usable RF coverage between a transmitter and receiver in outdoor wireless LAN communications. The area must be clear of obstacles by at least 60 percent. The size is calculated using distance between endpoints and the frequency in use.

Fresnel zone

Formally known as the Mini-PCIe card, it became known as the Full Mini-PCIe card with the introduction of the Half Mini-PCIe card form factor.

Full Mini-PCIe

Identify the two configuration methods for access points.

GUI CLI

An increase in signal strength of an RF signal, caused by an increase in amplitude. See also active gain, passive gain.

Gain

The first step of a wireless LAN site survey is typically _______.

Gathering business requirements

An amendment to the Ethernet standard for Power over Ethernet (PoE) that addresses supplying both data and DC power over a single Ethernet cable. It allows for a maximum of 15.4 watts of power at the port and is also known as IEEE 802.3-2005 Clause 33.

IEEE 802.3af

802.11n

IEEE ___________, the newest communication amendment, consists of four protection modes. These modes are known as High Throughput (HT) protection modes and are a set of rules client devices and access points will use for backward compatibility. These modes are constantly changing based on the RF environment and associated wireless client devices.

IEEE Std 802.11-2007

IEEE consolidated 8 rati! ed amendments along with the original standard IEEE Std 802 .11-1999 (R 20 03) IEEE Std 802 .11a-1999 IEEE Std 802 .11b-1999 IEEE Std 802 .11d-20 01 IEEE Std 802 .11g-20 03 IEEE Std 802 .11h-20 03 IEEE Std 802 .11i-20 04 IEEE Std 802 .11j-20 04 IEEE Std 802 .11e-20 05

Which protocol is responsible for addressing and routing?

IP

A numerical identifier assigned to a computer network device that uses the TCP/IP protocol suite for communications; it is a 32-bit dotted decimal addresses usually written in the form www.xxx.yyy.zzz.

IP address

Who manages the RF spectrum Globally

IRU-R(International Telecommunication Union-Radiocommunication)

Industrial, Scientific, Medical

ISM

Radio bands that are reserved internationally for the use of radio frequency for industrial, scientific, and medical (ISM) purposes.

ISM

The measurement of alternating current AC resistance, measured in ohms.

Impedance

Passphrase-based security

In IEEE 802.11 wireless LANs, a passphrase is a series of characters or words, 8 to 63 ASCII or 64 hexadecimal characters in length, used to create a 256-bit preshared key. A passphrase is designed to verify an identity and allow access to wireless network resources.

active mode (AM)

In _________________ a WLAN device or station (STA) may receive frames at any time and is always in an "awake" state.

power save (PS) mode

In _________________, the WLAN device or station (STA) will doze or enter a low power state for very short periods of times.

The horizontal or vertical orientation of the E-field propagated from an antenna element.

Polarization

What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?

In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other.

_________________ is an extension to the IEEE 802.3 Ethernet standard that allows direct current voltage to be supplied over Ethernet cable to wireless access points.

Power over Ethernet

A method for supplying DC voltage and computer data together over a single Ethernet cable.

Power over Ethernet (PoE)

The capability of a wireless LAN client device to suspend to a low-power state, thereby extending the battery life and allowing for longer data communications.

Power save

A device that will supply DC voltage and computer data to wired computer network devices such as wireless access points, video cameras, and VoIP phones. PSE can be either an endpoint or a midspan device.

Power sourcing equipment (PSE)

A

In the 802.11a amendment, the UNII-3 band can be used for which of the following WLAN applications? A. Indoor and outdoor B. Outdoor only C. Indoor only D. The UNII-3 band cannot be used for WLANs.

transmitter

In wireless networking, a _____________ combines binary digital computer data with high-frequency AC signals to prepare it to be sent across the air. This process is called modulation. The antenna then transforms this signal into radio waves and propagates them through the air.

Push-button security

In wireless networking, a one-step process allowing users to configure wireless security by pushing a button on all devices in the network. The button may be in either hardware or software.

Site survey

In wireless networking, a process that determines areas of RF coverage and interference as well as placement of wireless infrastructure devices such as access points and bridges.

The received signal strength of a wireless client could be increased by _______.

Increasing the gain of the antenna on the access point

The RF signal strength seen by a wireless client device from an IEEE 802.11n access point can be improved by _______.

Increasing the output power on the access point

Correct Question 27 : When an IEEE 802.11g wireless LAN consists only of wireless client stations, the network is operating as what type of basic service set?

Independent

A wireless network in which no access points are used and only device-to-device communication takes place. Other terms for this type of network are ad hoc and peer-to-peer.

Independent basic service set (IBSS)

In the 802.11i amendment the UNII-3 band can be used for which of the following WLAN applications?

Indoor and Outdoor

An architecture, developed by IBM, which allowed for expansion cards in early models of personal computers.

Industry Standard Architecture (ISA)

An operation mode that allows wireless LAN client devices to connect to resources on the wired network or to other wireless client devices by using an access point.

Infrastructure mode

A form of signal loss caused by RF connectors. It is minor but can contribute to overall loss in a system, thereby resulting in less signal and less throughput.

Insertion loss

Access point, VoIP phone, camera, or other computer network device that receives Power over Ethernet from the power source equipment.

Powered device (PD)

Given: You are performing a site survey software that simulates RF behavior in a defined environment. It uses a floor plan and materials information for its calculations. What kind of site survey is performed using this method?

Predictive

Given: You are performing a site survey using software that simulates RF behavior in a defined environment. It uses a floor plan and materials information for its calculations. What kind of site survey is performed using this method?

Predictive

A software-based site survey tool sold by your company allows your customers to determine access point coverage and optimum placement within a facility without visiting the facility. What is the term that most accurately describes this type of site survey?

Predictive Modeling

A software-based site survey tool sold by your company allows your customers to determine access point coverage and optimum placement within a facility without visiting the facility. What is the term that most accurately describes this type of site survey?

Predictive Modeling

A ______analysis allows a site surveyor to view areas or RF coverage as well as interference sources

RF Spectrum

A ______analysis allows a site surveyor to view areas or RF coverage as well as interference sources.

RF Spectrum

RF coverage is also known as the __________

RF cell or basic service area (BSA)

The main objectives of a wireless LAN site survey are to determine _______ and _______. (Choose two.)

RF interference RF coverage

Unobstructed radio communication between a radio transmitter and receiver.

RF line of sight

Frequency Hopping Spread Spectrum (FHSS)

RF signal is considered spread spectrum when the bandwidth is wider than what is required to carry the data Clause 14 devices

A type of analysis that allows a site surveyor to view areas of RF coverage as well as interference sources using various tools currently available.

RF spectrum analysis

Lack of RF connectivity on a wireless client could be caused by which layer of the OSI model?

Layer 1

Which Layer of the OSI model do wired Ethernet repeaters function?

Layer 1

Access points work at which layers of the OSI model?

Layer 1 and 2

Access points work at which layers of the OSI model?

Layer 1 and Layer 2

At which of the following layers of the OSI model does WLAN function?

Layer 1 and Layer 2

Which Layer of the OSI model do wireless Ethernet repeaters function?

Layer 2

Which layer of the OSI model is responsible for delivering data to a unique hardware address?

Layer 2

If a user with a wireless client device moves from one radio cell to another and maintains connectivity, ___________ occurs.

Layer 2 transition (roaming)

Layer 3 (Network)

Layer where the IP protocol resides

Device used to shunt electrical currents from indirect lightning strikes to the ground. Protects electronic devices connected to the system from damage.

Lightning arrestor

The ability of a transmitter and receiver to "see" each other (visual line of sight) or to transmit RF energy (RF line of sight). RF line of sight is the area of coverage around the visual line of sight.

Line of sight

In wireless networking, a mechanism that prevents wireless client devices from associating to an access point that has already reached the maximum number of client devices to allow for optimal performance.

Load balancing

In radio frequency technology terms, the shape of the RF energy emitted from an antenna element; it is in the form of main, side, and rear.

Lobe

A software-based wireless LAN site survey in which a floor plan or drawing of the area to be surveyed is imported into the program. The program then simulates the RF propagation from access points by using the attenuation properties of obstacles.

Predictive modeling site survey

Sixth layer of the OSI Model

Presentation

Question 10 : Which of the following frames is used in the active scanning mechanism?

Probe request frame

- Disabled radio/adapter - Misconfigured utility - Services not running (AutoConfig/WZC) - Security settings

Problems that can cause client-side lack of connectivity include:

-Connectivity -RF signal strength -Throughput -Infrastructure/device upgrades & compatibility

Problems with wireless networks are typically associated with the following:

A specific connector used by a manufacturer to limit the type of antenna that can be connected to a device. This connector prevents the use of an antenna that would violate local RF regulations.

Proprietary connector

A set of rules that defines data communication between devices. TCP/IP is a common protocol set used in computer networking.

Protocol

An application that allows a network engineer to view all wireless frames traversing across the air in the hearing range of the wireless LAN analyzing device.

Protocol analyzer

You are a wireless LAN consultant contracted to assist in a site survey for a retail outlet that will deploy an 802.11n WLAN. You've been asked to participate in an initial meeting with top management to determine the details of a site survey. What topics would most likely be discussed at this meeting? (Choose two.)

Purpose of the wireless LAN Business requirements

802.11aa-2012

QoS enhancements to the 802.11 Media Access Control (MAC) improved management, increased link reliability, and increased application performance

LAN

Local Area Network

The IP address of a network adapter is also known as which address.

Logical Address

The IP address of a network card is known as what address

Logical Address

A decrease in radio frequency power or energy, resulting in lower overall throughput in a wireless network.

Loss

PMD(Physical Medium Dependant)

Lower physical sublayer responsible for transmitting the data onto the wireless medium.

The physical address of a network adapter is the

MAC address

The physical address of a network card is called what

MAC address

The sublayer of the Data Link layer (Layer2) of the OSI model that handles the media access control.

MAC sublayer

Which of the following modulation techniques is defined in new 802.11n specifications?

MIMO

n

MIMO technology, used with 802.11__ is designed to take advantage of multipath and increase throughput by using the effects of multipath as an advantage.

IEEE 802.11n devices use an enhanced radio technology known as multiple input multiple output (MIMO) Which statement correctly describes a benefit of MIMO?

MIMO uses reflections to allow for increased throughput.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

Management

What statement accurately descibes an advantage of manual RF site surveys over predictive site surverys?

Manual site surverys are useful for locating and identifying sources of RF interference while predictive site surveys are not capable of this task

What statement accurately describes an advantage of manual RF site surveys over predictive site surveys?

Manual site surveys are useful for locating and identifying sources of RF interference, while predictive site surveys are not capable of this task.

Mode 0 = No protection Mode 1 = HT nonmember protection mode Mode 2 = HT 20 MHz protection mode Mode 3 = Non-HT mixed mode

Match the HT Protection mode # to its corresponding name. Mode 0 Mode 1 Mode 2 Mode 3 HT nonmember protection mode HT 20 MHz protection mode No protection mode Non-HT mixed mode

Physical security

Measures taken to ensure that a specific type of information such as radio waves remains contained within a physical location, or to prevent the same from entering a physical location.

Data security

Measures taken to ensure that information transmitted from one device to another is not seen or tampered with in transit and that the same information that is sent is what is received.

This operation mode for enterprise-grade access points connects access points together wirelessly without the use of a wired infrastructure.

Mesh Mode

MAN

Metropolitan Area Network

Which of the following devices is an in-line device that will inject DC voltage into Ethernet cable?

Midspan

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable?

Midspan

Usually a single port or multiple port injector; any device that injects DC power into Ethernet cable over the unused pairs of wires to allow both DC power and computer data to the end (powered) IEEE 802.3af device.

Midspan device

_____________________ injects DC power into the Ethernet cable over the unused wire pairs or over the data pairs, depending on the version of the standard in use.

Midspan injector

A measure of radio frequency power that is equal to 1/1000 watt.

Milliwatt (mW)

Variation of the PCI standard designed for laptops and other small-footprint computer systems.

Mini-PCI

Which wireless adapter may require some disassembly of a notebook computer tp install?

Mini-PCI

Identify three of the four PCI card types, as they're generally listed i.e. not worrying about the stupid IA, IB, types

Mini-PCI Mini-PCIe Full Mini-PCIe Half Mini-PCIe

Identify the wireless radio interface type depicted in the illustration.

Mini-PCIe

Replacement for the Mini-PCI card based on PCI Express. Available in three types: Type I, Type II, and Type III. Now called the Full Mini-PCIe card after the introduction of the Half Mini-PCIe.

Mini-PCIe

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

Mismatched SSID

What is a valid solution to a hidden node problem caused by different technology types?

Mixed Mode technology

In wireless networking, a wireless device that collects propagated RF energy from the air via an antenna. It demodulates and recovers any data included in the signal.

Receiver

What two devices use RF to communicate? (Choose two.)

Receiver Transmitter

What type of protection does a lightning arrestor provide to a Wi-Fi system?

Redirection of transient current due to nearby lightning strikes

What type of protection does a lightning arrestor provide to a WiFi system?

Redirection of transient current due to nearby lightning strikes

A feature that allows for fault-tolerant deployments and uninterrupted access in the event of access point or wireless LAN controller or other network device failure.

Redundancy

Bring your own device (BYOD)

Refers to company employees bringing their personal IEEE 802.11-enabled mobile devices to their place of work and using these devices to access company resources, including the Internet, printers, software applications, and file servers.

An effect that occurs when an RF signal bounces off a smooth, nonabsorptive surface such as a tabletop and results in the original signal changing direction.

Reflection

In wireless networking, multipath is the result of what RF behavior?

Reflection

When an RF signal bounces off a smooth non-absorptive surface the behavior is called:

Reflection

An effect that occurs when an RF signal passes between mediums of different densities. The signal may change speed and also bend.

Refraction

When an RF signal passes between mediums of diff. densities and may change speed and bend, the behavior is

Refraction

A change in radio frequency power is a relative measure. Examples include loss of RF power due to a cable (dB) and passive gain of an antenna (dBi).

Relative measure of power

TCP is

Reliable

This advanced security feature allows for small- to medium-sized businesses to provide their own advanced authentication features without the need of an external server.

Remote Authentication Dial-In User Service (RADIUS)

An operation mode that allows a wireless access point to be set in an operation mode to extend the wireless RF cell for wireless client devices not within hearing range of a wireless access point.

Repeater mode

Open system authentication is in an IEEE 802.11-2012 wireless network.

Required

The device driver of a wireless network adapter card is _______.

Required

Which topology may use a token passing access method?

Ring

The process by which a wireless LAN client device moves between basic service sets, reassociating to a new access point based on various criteria and maintaining connectivity to the network.

Roaming

Which of the following is an element of 802.11i authentication and encryption algorithms to be used for communication between WAPs and wireless clients?

Robust Security Network (RSN)

security

The 802.11i amendment to the standard addresses which technology?

B

The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP

power, range, speed

The IEEE 802.11 wireless networking standard define what some call the _____, ______, and ____ of the radio frequency and WLAN technology.

2.4-2.5, DSSS (HR/DSSS), 5.5, 11

The IEEE 802.11b amendment to the 802.11 standard works in the _______GHz ISM band. This amendment, released in 1999, specifies high rate _____ for ____ and ___ Mbps

802.11e

The IEEE _____ amendment defines enhancements for QoS in wireless LANs and introduced the hybrid coordination function

Logical address

The IP address of a network adapter is also known as which address?

Select the statement that correctly describes the Wi-Fi Alliance's primary role in the WLAN industry.

The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.

ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy Wi-Fi client devices in the 2.4 GHz ISM band?

The Wi-Fi client devices will experience performance degradation due to co-channel interference.

An antenna used to focus the isotropic energy into a specific radiation pattern. Available in various types, including patch/panel, sector, and Yagi.

Semidirectional antenna

USB was designed as a replacement for which two legacy communication connections?

Serial and Parallel

Which of the following allows a client to communicate with a particular base station?

Service Set Identifier

Select the statement that correctly describes the WiFi Alliance's primary role in the WLAN industry.

The WiFi Alliance tests and certifies product interoperability based upon standards created by the IEEE

ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy WiFi client devices in the 2.4 GHz ISM ban?

The WiFi client devices will experience performance degradation due to co-channel interference

UNII-2

The _______ band is for indoor or outdoor uses.

UNII-1

The _______ band is intended for indoor use only.

UNII-3

The _______ band may be used indoors or outdoors but was most commonly used outdoors.

RSSI (Received Signal Strength Indicator)

The _______ is an arbitrary number assigned by the device manufacturer.

RTS/CTS (Request to Send/Clear to Send)

The ____________ process allows devices to reserve the medium for a specified period of time, enabling a device to complete a frame exchange and avoid collisions.

signal-to-noise

The __________________ ratio is the difference between the amount of received signal and the noise floor level in the area where the wireless client device is located.

What is a wireless bridge?

The ability to connect two or more wired LANs together wirelessly using IEEE 802.11

You provide consulting services for various companies and receive a call from one of your clients that their notebook computers suddenly started experiencing slow data transfers from the wireless LAN. This company is located in a multitenant building. What could cause a sudden change in performance for the notebook computers?

The access point for a new tenant in the building is set to the same RF channel.

The name of a wireless network that identifies a basic service set and is used for segmentation. It can be broadcast in beacon frames as part of the passive scanning process to allow wireless LAN client devices to locate and join the network.

Service set identifier (SSID)

Fifth layer of the OSI Model

Session

The purpose of ___ is to allow application layer data communication between two stations

Session Layer

Layer 5 of the OSI model, which opens, closes, and manages sessions between end-user application processes.

Session layer

An authentication method defined by the IEEE 802.11 standard, used in legacy devices. It requires the use of Wired Equivalent Privacy (WEP) for IEEE 802.11 authentication and data encryption. This authentication method is flawed because it has several known vulnerabilities.

Shared-key authentication

A decrease in signal strength caused by attenuation, diffusion, or interference.

Signal loss

The RF noise value in dBm minus the received signal strength in dBm. The minimum recommended value for wireless networking is 20dB to 25dB or higher.

Signal-to-noise ratio (SNR)

The most basic wireless antenna technology used in a wireless LAN system. One antenna is used at the transmitter to transmit data and one antenna is used at the receiver to receive the data.

Single input/single output (SISO)

What are some examples of midspan PoE devices?

Single port injectors/Multiport injectors

A wireless network design in which all access points operate on the same channel and are managed by a centralized controller to avoid interference.

Single-channel architecture (SCA)

Which of the following are midspan PoE devices? (Choose 2.)

Single-port and multiport injectors

Enterprise-Grade IEEE 802.11g client utilities typically contain which advance feature?

Site survey

The capacity of an access point is dependent on which factors? (Choose two.)

Software applications Number of users

device Driver can be used in wireless networking which is an example of a device driver

Software to control a wireless NIC

-Device drivers -Client device adapter utilities -Device firmware

Software upgrades for wireless networks commonly fall under three areas:

Which of the following information does an administrator need before upgrading a controller in the wireless network?

Software version

continuous aware mode (CAM)

Some manufacturers refer to active mode as _____.

-Application servers (Office suites, etc) -Databases -Engineering apps (CAD) -File servers -Barcode scanners -Printers -Voice handsets

Some of the common applications that are used by wireless LANs are:

-Hardware selection & placement -RF interference sources -Client device load balancing -AP capacity and utilization -Minimizing multipath -Hidden node problems

Some of the factors that you need to consider when optimizing a wireless LAN:

-Wireless access points -Wireless bridges -Wireless LAN controllers -Wired infrastructure devices

Some of the wireless devices that can be related to a global problem include:

The radio spectrum is the radio frequency (RF) portion of the electromagnetic spectrum.

Spectrum

An instrumentation device or a hardware or software utility used to view radio frequency energy over a range of frequencies. In wireless networking, a spectrum analyzer can be PC card-based, designed specifically for WLAN use, or a separate instrumentation device—a calibrated device that has the capability to view an entire radio spectrum.

Spectrum analyzer

What tool is best suited for locating and identifying sources of RF interference, such as microwave ovens?

Spectrum analyzer

What echnolofy is used to send WLAN data over a wireless medium using subcarrier frequencies?

Spread-Spectrum

In wireless networking, technology that provides redundancy of the digital data as it traverses through the air by combining a set code with the digital data prior to the transmission.

Spreading code

A single-channel architecture management technique in which each floor or area of a building is assigned a channel to use. Spanning and blanketing are other terms used to identify managed areas based on channels.

Stacking

A separate signal carried on a main radio frequency transmission.

Subcarrier

Which protocol is used to guarantee delivery?

TCP

How many non-overlapping channels are available in the unlicensed 2.4 GHz ISM band?

THREE

802.11af-2014

TV white space (TVWS)

In what situation is an RF site survey LEAST needed?

Telecommuters using a single "remote AP" at home

What is the most likely cause of low throughput on a hotel's guest network?

The 1.5 Mbps Internet connection is creating a bottleneck for the Wi-Fi users.

What is the most likely cause of low throughput on a hotel's guest network?

The 1.5 Mbps internet connection is creating a bottleneck for the WiFi users

ERP-OFDM and DSSS

The 802.11g standard uses which two Physical layer technologies?

Device that prepares information to be sent across the air in the form of radio frequency.

Transmitter

What two devices use RF to communicate?

Transmitter Receiver

Fourth layer of the OSI Model

Transport

QoS null frame

There is also a variant of the null frame called the ___________, which is used with quality of service power save mode.

You are a help desk technician providing support for a wireless network. A user calls and complains he cannot access the Internet. The user tells you he has good signal strength, but the network connection states "acquiring network address" and the IP address is all zeros. What could cause this problem?

There is an incorrect WPA passphrase on the client device.

Layer 4 of the OSI model, which consists of both connectionless UDP and connection-oriented TCP protocols and provides end-to-end communication services for applications between devices on a computer network.

Transport layer

Layer 7 Application

This layer has protocols such as FTP, HTTP, and POP3.

Layer 5 Session

This layer opens, closes, and manages sessions between end-user application processes.

Layer 6 Presentation

This layer provides delivery and formatting of information for processing and display.

802.11b/g/n Mixed Mode

This mode allows devices that support the IEEE 802.11g/n amendments and IEEE 802.11b devices to operate together in the same BSA and be associated to the same access point.

Hidden node is the result of two client devices connected to an access point, but unable to 'hear' each other prior to starting a transmission. (True/False)

True

If a client device is showing a low receive signal strength, a network engineer could increase the transmit output power of the access point to improve the signal. (True/False)

True

True of false: Full-duplex allows two-way communication to occur between devices simultaneously

True

True or false, A cell is the area of RF coverage of the transmitter

True

True or false, Firewalls can be hardware-based, software-based, or a combination of the two.

True

True or false, It is common for SOHO-grade access points to be able to act as DHCP servers.

True

True or false, direct access point connectivity is defined as a direct connection to ports on the switch and is typically used with device connection layer hardware wireless controllers.

True

True

True or False: An APIPA address will be in the 169.254.X.X range.

True

True or False: According to the book, it is always a good idea to restart the wireless client network adapter, which will often correct some wireless client device connectivity issues.

False (Newer APs do this)

True or False: Legacy access points contain integrated spectrum analysis capabilities, allowing an admin to connect to the AP and view the RF in the area remotely.

True

True or False: The calculation of the RSSI value is done in a proprietary manner. Some manufacturers recommend a range of -65 dBm to -67 dBm of received signal strength. The closer the number is to zero, the better the received signal.

True.

True or False? An IBSS can be created with the IEEE 802.11 WLAN adapter that is built into a wireless computer or other devices.

True.

True or False? For the most part, ESSID and SSID are synonymous terms for the name or segmentation of a wireless network.

False. Only open system authentication is allowed on newer WLAN security.

True or False? IEEE 802.11 open system authentication and shared-key authentication are both valid authentication processes allowed on newer WLAN security.

True.

True or False? In most if not all cases, the BSA for each BSS will overlap to allow roaming from one BSS to another.

True or false, A wireless branch router/remote access point can build a Layer 3 VPN tunnel between devices allowing the router on each side will act as a VPN endpoint.

True, they can also be configured as a VPN pass-through device

Logical Link Control (LLC) and Media Access Control (MAC)

Two sublayers of Data Link Layer:

Physical Layer Convergence Protocol (PLCP) and Physical Medium Dependent (PMD)

Two sublayers of PHY physical layer:

In computer Network Terminology, the definition of half duplex is closest to which of the following?

Two-way communication one way at a time

In computer network terminology, the definition of half duplex is closest to which of the following?

Two-way communication one way at a time

Unlicensed National Information Infrastructure (U-NII) is a radio frequency range used by IEEE-802.11a/n devices and for point-to-point or point-to-multipoint connections. The UNII band consists of a lower, middle, and upper band with four frequency ranges and is used for IEEE wireless LANs.

UNII

How many access points can be co-located without channel reuse in the same radio frequency area to maximize wtotal system throughput while minimizing RF interference in a n IEEE 802.11g network?

Three

Point to Multipoint links consist of ___ or more connections

Three

- obstacle (obstructions) - distance (signal strength) - technology (signaling methods)

Three causes of hidden node problems are:

The actual rate at which information is transferred, taking into consideration factors such as overhead, interference, and contention between devices.

Throughput

5.15-5.25 GHz

UNII-1 frequency band

5.25-5.35 GHz

UNII-2 frequency band

5.725-5.825 GHz

UNII-3 frequency band

Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for dektop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adpater would provide WiFi connectivity to these desktop computers?

USB 2.0

Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for desktop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adapter would provide Wi-Fi connectivity to these desktop computers?

USB 2.0

Universal Serial Bus version 2, which incorporates several changes to USB, including connector types. Data rates allow for a maximum speed of 480 Mbps.

USB 2.0

You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer?

USB 2.0

UDP is

Unreliable

Extensible Authentication Protocol (EAP)

Used in IEEE 802.11 wireless networks as an authentication process to allow access to network resources. EAP is available in various types, which include user and certificate authentication.

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling WiFi equipment. While evaluating the manufacturer's sepcifications for a specific WiFi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?

User Identity validation

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling Wi-Fi equipment. While evaluating the manufacturer's specifications for a specific Wi-Fi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?

User identity validation

What allows an administrator the ability to separate physical ports into logical networks?

VLAN technology

Which of the following statements is true regarding a wireless LAN controller?

VLANS seperate the network

What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology

WMAN

What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology?

WMAN

You support a wireless network for an office of five employees. The installation consists of one access point three notebook computers, and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fi WPA 2.0 certified you want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment?

WPA 2.0 personal/WPS

Enterprise access points may contain which of the following features?

WPA 2.0 support RADIUS server Repeater Mode

Enterprise access points may contain which of the following features? (Choose 3.)

WPA 2.0 support, RADIUS server, and repeater mode

SOHO access points commonly support which of the following features? (Choose 3.)

WPA 2.0 support, static output power, and wifi certifications

802.11i

WPA was developed as an interim solution for which amendment to the 802.11 standard?

The Wi-Fi Alliance certifications include several standards for security and QoS listed in the chapter, name them.

WPA/WPA 2.0 for security WMM and WMM-PS for QoS

Question 7 : Which wireless security protocol is also known as IEEE 802.11i?

WPA2

Identify the strongest passphrase-based secuirty mechanism for 802.11 wireless networks.

WPA2-Personal

Identify the strongest passphrase-based security mechanism for 802.11 wireless networks.

WPA2-Personal

SOHO access points commonly support which of the following features?

WPA2.0 support/Static output power/Wi-Fi certifications

In December 2011, a security flaw was reported with _______

WPS

FCC

What organization is responsible for unlicensed frequency band regulation in the United States?

association ID (AID)

When a WLAN device associates to an access point, the device receives what is known as an ______________. This is a value that will represent that device in various functions, including PS mode.

B

Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF

-Verify you have correct firmware file -Read the release notes -Do not power off during upgrade -Never upgrade a device that is running on battery power.

Which items are very important when you are performing a firmware upgrade on any device?

A. 32 Characters maximum C. contains one ASCII character D. Is case sensitive

Which items describe a service set identifier (SSID)? (Pick three) A. 32 characters maximum B. 64 characters maximum C. contains one ASCII character D. Is case sensitive E. Is not case sensitive

Network (layer3)

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Network (layer 3)

Which layer of the OSI model allows physical addressing and routing?

layer 3

Which layer of the OSI model is responsible for IP addressing?

Network Layer

Which layer of the OSI model is responsible for addressing and routing?

Data Link

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors?

Application Layer

Which layer of the OSI model provides an interface to the user?

Physical Layer

Which layer of the OSI model uses physical addresses to deliver data to the destination?

B

Which of the following best describes the Wi-Fi Alliance? A. US-based standards organization B. Interoperability testing organization C. Works with the FCC to verify compliance D. Local regulatory body for Europe

D

Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification? A. Security/encryption B. Fast transition C. Management frame protection D. Quality of Service

What is used as a relative measurement of signal strength at the receiving client on an 802.11 wireless LAN?

RSSI

Radio frequency signals from sources other than the transmitter and receiver that are in communication with each other.

Radio frequency noise

The distance that a radio frequency will travel, which is based on the wavelength. The higher the frequency is the shorter the wavelength will be and the result will be shorter range.

Range

The process in which a wireless LAN client connection moves from one access point to another is called _______.

Reauthentication

The measurable amount of radio frequency signal usable by a receiver.

Receive sensitivity

The minimum amount of signal a receiver must be able to receive in order to determine the data that was sent from the transmitter.

Received signal strength

An arbitrary number assigned by the radio chipset or device manufacturer. There is no standard for this value, and it will not be comparable between devices from different manufacturers.

Received signal strength indicator (RSSI)

A and C

Which of the following is an accurate description of peer communication (choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network

D

Which of the following is correct regarding 802.11e? A. Only operates in the 5 GHz frequency range B. Only operates at 1, 2, 5.5, and 11 Mbps C. Addresses wireless security D. Addresses wireless quality of service

E

Which of the following organizations is responsible for standards compliance? A. FCC B. ETSI C. IEEE D. WPA2 E. Wi-Fi Alliance

TCP

Which protocol is used to guarantee delivery?

Ring topolgy

Which topology may use a token passing access method?

802.11k and 802.11v

Which two amendments work with IEEE 802.11r to provide more information to the wireless device so it can make a more intelligent roaming decision based on the RF environment?

personal mode w/passphrase and enterprise mode using 802.1X/EAP

Which two options are available for Wi-Fi Protected Access 2 (WPA 2.0)?

An organization formed to promote IEEE standards for wireless LAN technology and manufacturer interoperability testing.

Wi-Fi Alliance

SOHO

Wi-Fi Protected Setup was designed for which wireless application?

A wireless networking device used to extend a corporate network to a remote location such as a home, conference room, or branch office through a secure connection using a wide area network or the Internet. It may contain Ethernet switch capabilities and a wireless access point.

Wireless branch router

A device used to connect two or more local area networks together using radio frequency. It can be configured in either point-to-point or point-to-multipoint configurations.

Wireless bridge

A device used in wireless LAN technology allowing centralized administration and control of access points, including radio management, security, VLANs, and redundancy.

Wireless controller

A system that connects basic service sets together, making an extended service set using RF instead of physical cabling such as Ethernet.

Wireless distribution system (WDS)

ABC Company has recently deployed a WiFi network in their corporate facility. After deployment, the considered a solution for monitoring and enforcing their wireless secuirty policy. What type of system can perform this task?

Wireless intrusion Prevention System (WIPS)

A software and/or hardware solution designed to monitor wireless networking RF signals using sensors or access points and to record events to a centralized database. It has the capability to react and prevent intrusion.

Wireless intrusion prevention system (WIPS)

A self-forming, self-healing, intelligent network used to route data frames between access points or "nodes" with one or more of the access points connected to a network infrastructure.

Wireless mesh networking

The process of a wireless client device looking for wireless networks and to identify the parameters of the network, including the SSID, supported data rates, and security settings.

Wireless network discovery

A wireless network management system (WNMS) is a software-based, hardware-based, or cloud-based solution that allows for centralized management and control of a wireless network and may allow work with wired networks.

Wireless network management system

frames

Wireless networking devices communicate by sending RF waves to each other through the air. These RF waves carry the digital data from one device to another. At this stage, the information traveling through the air is organized into what are known as ________.

A network that connects wireless devices within the immediate area of individual people. This type of network allows a user to connect various devices wirelessly to their own personal area network, including but not limited to computer keyboards, mice, and headsets. Bluetooth is a common technology used with WPANs.

Wireless personal network (WPAN)

Automatic power save delivery (APSD)

________ differs from the original power save mode in that a trigger frame will wake a device in order to receive data. This is a more efficient way of performing power save functions.

Point-to-multipoint

_________ WANs are often called "clouds".

Mode 0

_________ allows for HT devices only. These HT devices must also share operational functionality and they must match; for example, they must all support 20 MHz or 20/40 MHz channels only.

Encapsulation

__________ allows for Application layer data communication between two stations using lower layers as a support system.

Mode 3

__________ is used if one or more non-HT stations are associated in the BSS. This mode allows backward compatibility with non-802.11n or IEEE 802.11a/b/g wireless devices. This is the likely the most common mode for IEEE 802.11n HT networks today.

CCA (Clear Channel Assessment)

___________ detects radio frequency energy from other IEEE 802.11 wireless client devices in the same RF space and understands that the medium is busy. Therefore, that wireless client device will not attempt to transmit until it detects the medium is clear.

Hidden node

____________ _________ is the result of wireless client devices connected to an access point and not able to "hear" each other prior to starting a transmission.

Dual CTS

____________ is a Layer 2 protection mechanism that is used for backward compatibility between IEEE 802.11n HT and IEEE 802.11a/b/g devices.

Isolated

_________________ problems usually include a single wireless LAN client device or computer that could be experiencing connectivity or data transfer issues.

Phased coexistence operation (PCO)

__________________ is an optional BSS mode with alternating 20 MHz and 20/40 MHz phases controlled by a PCO-capable access point.

Wireless network discovery

__________________ is the process of a client device scanning for wireless networks and identifying the parameters of the network, including the SSID, supported data rates, and security settings.

Active scanning

___________________ is the second part of the WLAN discovery phase. In this process, WLAN devices wishing to connect to a network send out a management frame known as a probe request.

Antenna diversity

___________________ will help minimize the problems for 802.11a/b/g systems caused by multipath.

Deauthentication

_____________occurs when an existing authentication is no longer valid. This can be caused by a WLAN device logging off from the current connection or transitioning to a different BSS.

Data

_____frames are used to carry payloads or Layer 3 information between wireless devices.

MIMO

_____is a big part of what makes IEEE 802.11n such an amazing technology

Point Coordination Function (PCF)

access point briefly takes control of the medium and polls the clients

mesh point portal (MPP)

acts as a gateway to one or more external networks

Cloud-managed access points are able to function on their own should connectivity with the controller be temporarily lost, the description of this technology includes the term:

adaptive access point

The term encapsulation means to

add later header and trailer information to a payload

Hybrid Coordination Function (HCF)

additional coordination function that is applied in an 802.11e QoS wireless network

Self-contained units with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the device have permission to use.

autonomous access points

Client load ______ is a mechanism that prevents wireless client devices from associating to an access point that has already reached the maximum number of client devices for optimal performance.

balancing

The angle of measurement of the main RF lobe measured at what is called the half-power point or -3 dB point. Beamwidth is measured both horizontally and vertically, in degrees.

beamwidth

robust security network (RSN)

better hide the data flying through the air while at the same time placing a bigger guard at the front door

Separating the intelligence from the access point and placing it into the wireless controller can cause ______________ with the higher data rates of IEEE 802.11n and 801.11ac

bottlenecks

Wider Channels

capability of 80 MHz and 160 MHz channels

A mesh point (MP)

capable of using a mandatory mesh routing protocol called Hybrid Wireless Mesh Protocol (HWMP)

A common feature in hardware WLAN controllers and cloud-managed systems that is used to obtain payment information, a simple agreement to terms and conditions for a hotspot or account credentials.

captive web portal

WLAN controller solutions consist of two common types of architectures, name them.

centralized (split-MAC) distributed

In WLAN controllers and cloud-managed controller-less solutions, this gives an administrator complete control over the wireless network from a single physical location.

centralized administration

Identify three popular types of autonomous access points:

consumer SOHO enterprise

Distributed Coordination Function (DCF)

contention-based method determining who gets to transmit on the wireless medium next

Two main objectives of a wireless site survey are to determine areas of RF ______ and the amount of RF ______.

coverage, interference

Decibel (dB) is a relative expression representing a change in radio frequency power.

dB

Which two are relative measurements of RF Power?

dB dBi are relative measurements of RF power

A decibel referenced to a dipole antenna, representing the passive gain of a dipole antenna and a relative expression of radio frequency power.

dBd

A decibel referenced against an isotropic radiator, representing the passive gain of an antenna as an increase in power and a relative expression of radio frequency power.

dBi

What is the gain of an antenna measured in?

dBi

Which are relative measures of RF power? (Choose two.)

dBi and dB

Which of the following formulas can be used to derive dBi values from dBd values?

dBi=dBd+2.14

A decibel referenced to one milliwatt (mW), and an absolute measure of radio frequency power.

dBm

Hybrid Wireless Mesh Protocol (HWMP)

default path selection metric

802.11ad-2012

defines Very High Throughput (VHT) enhancements Galois/Counter Mode Protocol (GCMP)

802.11v-2011

defines methods of retrieving information from client stations Wireless Network Management (WNM)

802.11aq

delivery of network service information prior to the association of stations on an 802.11 network allow advertisement of services to stations prior to the stations' actual association to the network

When RF passes or bends around an obstacle such as a building or column, the behavior is:

diffraction

No connectivity on a wireless client device can be caused by?

disabled radio or wireless adapter, misconfigured client utility

If one connects access points that are not directly plugged into a port on the WLAN controller, they are using a feature known as ______________________

distributed access point connectivity

802.11i-2004

encryption protection from modification identity verification

Identify the two ways that power sourcing equipment deliver power to the device.

endpoint injector midspan injector

Which grade of access points allow the user to change the transmit power?

enterprise and some SOHO

802.11z-2010

establish and standardize a Direct Link Setup (DLS) mechanism

Wireless Network Management (WNM)

exchange location information, provide support for the multiple BSSID capability, and offer a new WNM-Sleep mode

Hybrid Coordination Function Controlled Channel Access (HCCA)

extension of PCF gives the access point the ability to provide for "prioritization of stations." certain client stations will be given a chance to transmit before others

Enhanced Distributed Channel Access (EDCA)

extension to DCF prioritization of frames based on upper-layer protocols

True or false: A benefit of a wireless LAN controller is distributed administration.

false

True or false: An administrator should always configure an access point from the wireless network.

false

802.11r-2008

fast basic service set transition (FT) fast secure roaming troublesome when using a WPA-Enterprise or WPA2- Enterprise security solution bypassing 802.1X authentication when roaming to a new access point

802.11ai

fast initial link setup (FILS) secure link setup in less than 100 ms

Neighbor Reports

gives client stations the ability to learn from access points or W LAN controllers about other access points where the client stations might potentially roam

802.11n-2009

greater throughput - High Throughput (HT) use multiple-input, multiple-output (MIMO)

Controller-managed access points are centrally managed from the _____________ _______________ ______________.

hardware WLAN controller

As seen in a two-dimensional (X/Y) view, the amplitude of an RF signal is:

height

When a wireless device is connected to an access point, it is known to be in _____________ mode.

infrastructure mode

When a wireless device is connected to an access point, it is said to be in ____________.

infrastructure mode

Which of the following best describes the Wi-Fi alliance?

interoperability testing organization

802.11u-2011

interworking issues between an IEEE 802.11 access network and any external network to which it is connected Wireless Interworking with External Networks (WIEN) basis for the Wi-Fi Alliance's Hotspot 2.0 specification and its Passpoint certification

In infrastructure mode, what happens to wireless data traffic that passes through an access point?

it is passed through to it's intended destination, crazy huh

mesh access point (MAP)

provides both mesh functionalities and AP functionalities simultaneously

Broadcast/Multicast Integrity Protocol (BIP)

provides data integrity and replay protection using AES-128 in Cipher-Based Message Authentication Code (CMAC) mode

802.11k-2008

radio resource measurement (RRM) Transmit Power Control (TPC) Client Statistics Channel Statistics Neighbor Reports

Transmit Power Control (TPC)

reduce interference

When an RF signal bounces off a smooth nonabsorptive surface, the behavior is:

reflection

dBi is a(n) ___________ measurement of gain introduced by ___________?

relative; an antenna

dBi is a(n) ____________ measurement of gain introduced by _____________?

relative; an antenna

802.11w-2009

robust management frames delivering management frames in a secure manner, therefore preventing the management frames from being able to be spoofed provides protection for unicast, broadcast, and multicast management frames Broadcast/Multicast Integrity Protocol (BIP)

802.11ah

se of Wi-Fi in frequencies below 1 GHz sensor networks along with backhaul for sensor networks and with extended range Wi-Fi Internet-of-Things (IoT) or Machine-to-Machine (M2M)

Client Statistics

signal-to-noise ratio, signal strength, and data rates can all be reported information such as frame transmissions, retries, and errors may all be reported

IEEE Std 802.11-2012

single document containing all the amendments that had been published at that time

What are the two types of midspan devices?

single-port and multiport injectors

Direct Sequence Spread Spectrum (DSSS)

spread spectrum technology that uses ! xed channels Clause 16 device

Question 4 : Which of the following is used to identify a particular 802.11 wireless LAN?

ssid

Which of the following security options is used to identify and connect to a wireless network?

ssid

802.11aj

support for operating in the Chinese Milli-Meter Wave (CMMW) frequency bands 59- 64 GHz

Without any regulatory domain taken into consideration

the 2.4 ghz frequency range allows for how many channels using 802.11b? ,14

10BaseT and 100BaseT implementations use ______ pair(s) of wire(s) to carry data.

two

Half-duplex is defined as a ______-way communication that occurs in _______ direction at a time.

two one

802.11p-2010

upport Intelligent Transportation Systems (ITS) applications Wireless Access in Vehicular Environments (WAVE)

Channel Statistics

use this information for channel management decisions

Replacing an antenna on a wireless access point will also change the __________ and ________________ beamwidths

vertical horizontal

What allow a variety of wireless devices access to any network resources that the device or user may have permissions for.

wireless access points

What allows a variety of wireless client devices to access any network resources that the device or user may have permissions for?

wireless access points

This device can be used to extend a corporate network to a remote location through a secure connection using a WAN or the Internet.

wireless branch router or remote access point, the book uses both terms

802.11d-2001

written for compliance with the regulatory domains Country code informatio - beacons and probe responses

An independent basic service set (IBSS) consists of how many access points?

~A. 0~ B. 1 C. 2 D. 4

Which items describe a service set identifier (SSID)? (Choose two)

~A. 32 character maximum~ B. 64 character maximum ~C. Is case sensitive~ D. Is not case sensitive

A basic service set identifier (BSSID) is the unique identifying MAC address of the ________.

~A. AP radio~ B. AP Ethernet port C. Router D. Client

The IEEE 802.11 association process happens after which phase?

~A. Authentication~ B. Distribution C. Deauthentication D. Re-authentication

As a device moves away from an access point, which of the following is true regarding dynamic rate switching?

~A. Data rate decreases~ B. Output power decreases C. Data rate increases D. Output power increases

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

~A. One ore more~ B. Two or more C. Three or more D. Four or more

In order to set up an ad hoc network, a user must know which two parameters? (choose two)

~A. SSID~ B. BSSID ~C. Channel~ D. Mac address E. Protection Mode

Which of the following configurations for wireless LANs has many access points?

ESS

OFDM

IEEE 802.11a uses which PHY technology?

Static output transmit power of a SOHO access point is typically:

15 dbm

Offers a method of on-boarding a device for corporate policy compliance

15. Which of the following best describes a self-service portal?

Question 16 : An independent basic service set requires a minimum of how many access points?

0

What is the minimum number of access points required for an independent basic service set?

0

What is the relationship between Decibel Relative to a Milliwatt (dBm) and milliwatt (mW)?

0 dBm = 1 mW

How many access points does a basic service set (BSS) consist of?

1

How many data bits does serial communication transmit at a time?

1

Which of the following channels are considered non-overlapping in the 2.4 GHz band?

1 and 6

Which two channels are considered nonoverlapping in the 2.4 GHz band?

1 and 6

Which of the following data rates are specified by the 802.11b standard for DSSS technology?

1, 2, 5.5, and 11 Mbps

Which two channels are considered non-overlapping in the 2.4 GHz band

1, 6

B. Software as a Service (SaaS) C. On-premises technology

1. MDM implementations are commonly available in which of the following types of technology? (Choose two.

APNS apple push notification service

10. Which of the following allows a mobile device such as an iPad or iPhone to receive information even when the destination application is not open or running?

How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band

11

How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band?

11

Pushing content

11. Which of the following MDM features allows for corporate and other applications to be distributed to mobile devices that connect to the corporate network?

What is the maximum data rate of HR/DSSS 802.11b devices?

11mbps

Query a Directory service database

12. Lightweight Directory Access Protocol (LDAP) is used to ____________.

The return on investment ROI for SaaS verses on-premises MDM solutions

13. Telecommunications expense management defines which of the following?

How many channels are available for wireless LAN use in the unlicensed 2.4 GHz ISM band?

14

How many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?

14

walled garden

14. Which of the following is another term that describes a captive web portal?

What is the typical RF transmit power of a SOHO-grade access point?

15 dBm or 32 mW

dynamic frequency selection (DFS)

A P will allow client stations to associate based on the supported channel AP can quiet a channel to test for the presence of radar AP may test a channel for the presence of radar before using the channel AP can detect radar on the current channel and other channels AP can cease operations af ter radar detection to avoid interference interference is detected, the AP may choose a different channel to transmit

beacon

A ________ frame is an advertisement of the wireless network. It carries specific information about the access point or basic service set, such as the SSID, the RF channel that it is operating on, the available data rates it is configured for, the security parameters, and much more.

global

A __________ problem usually involves many client devices or groups of devices.

receiver

A _______________ collects the propagated signal from the air using an antenna and reverses the process by transforming the received signal, back into an AC signal. Through the use of a demodulation process, the digital data is recovered.

Wiring closet

A central and secured location where cabling is terminated and connects to infrastructure devices such as Layer 2 switches and Layer 3 routers.

Spectrum Analyzer

A common tool used to view areas of RF coverage and interference sources including non-802.11 wireless devices.

Overlay WIPS sensor

A dedicated hardware device that is a standalone sensor and does not have any wireless access point functionally.

Temporal Key Integrity Protocol (TKIP)

A firmware upgrade designed to enhance security issues with Wired Equivalent Privacy; TKIP is an enhancement to WEP.

Integrated WIPS sensor

A hardware device that contains access point functionality and wireless intrusion prevention system (WIPS) sensor capabilities in one physical device. Can share a radio for part-time WIPS monitoring or can have a dedicated radio for full-time WIPS monitoring.

Bus

A high-speed linear topology is defined as a ______.

Role-based access control (RBAC)

A mechanism that relies on restricting access to only authorized users or groups. This access is from authentication based on specific roles rather than user identities. It was designed to ease the task of security administration on large networks.

Authentication, Authorization, and Accounting (AAA)

A protocol that provides a framework to allow secure access and authorization as well as keep track of the user's activities on a computer network, including wireless networks.

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A security protocol that is a mandatory part of the IEEE 801.11i amendment to the standard and part of Wi-Fi Protected Access 2.0 (WPA2) certification from the Wi-Fi Alliance, providing strong security.

null data null function

A special type of data frame is the __________, or _______, frame, which helps implement power save features and is not used to carry any data payload.

MAC address filtering

A technique that allows or denies access to a wireless client device based on its Layer 2 MAC unique hardware address

What devices, tools, or programs can be used in a manual site survey? (Choose two.) A. Spectrum analyzer B. Passive scanning utility C. Predictive site analyzer D. Association analyzer E. Authentication analyzer

A, B. A spectrum analyzer and a tool that passively scans for wireless networks such as NetStumbler can be used for a manual site survey. The other options' association and authentication can be viewed using a protocol analyzer and are not "standalone" tools.

You are using a wireless client adapter with a site survey utility and a notebook computer to perform a manual site survey in a very small office building. Which values are important to record to verify proper RF coverage for the location? (Choose two.) A. Signal strength B. SNR C. Packet retries D. Signal loss E. Propagation loss

A, B. The signal strength and SNR are two important values to record during the manual site survey process. Signal loss and propagation loss have different effects, and packet retries are more of an issue with dynamic rate selection.

The manual site survey consists of which possible methods? (Choose two.) A. Passive B. Scanning C. Active D. Spectrum E. Packet

A, C. Manual site surveys can be either passive or active. Scanning is a method of locating wireless LANs. A spectrum analyzer will allow you to see the RF. A packet is information that carries computer data from one device to another.

A main objective of a wireless LAN site survey is to determine _____ and _____ . (Choose the best two options.) A. Areas of RF interference B. Applications to be used C. Access point locations D. Wiring closet locations E. Security implementations

A, C. The main objectives of a wireless site survey are to determine areas of RF interference and RF coverage as well as locations of access points and other infrastructure devices. The applications used have more to do with capacity planning. Wiring closet locations and security implantations are factors that need to be taken into account but are not the main objectives.

Which guidelines are recommended when performing a manual site survey? (Choose two.) A. Walkthrough of location B. Predictive analysis C. Equipment purchase D. Client device configuration E. Spectrum analysis

A, E. A walkthrough of the location and spectrum analysis are both recommended guidelines when performing a manual site survey. Equipment purchase and client device configuration are additional factors to consider but are not part of the manual site survey. A predictive analysis is a software-based site survey solution that does not require manual testing.

12. Which of the following is an accurate description of peer communication (Choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network

A,C

An independent basic service set (IBSS) consists of how many access points? A. 0 B. 1 C. 2 D. 4

A. 0

How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8

A. 1

You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?

A. Association B. Authentication ~C. ERP protection~ D. HT protection

The IEEE 802.11 association process happens after which phase? A. Authentication B. Distribution C. Deauthentication D. Reauthentication

A. Authentication

WLAN controllers may contain which of the following features? (Choose three.) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing

A. Centralized administration B. Captive portal D. Built-in RADIUS services

Co-channel interference is caused by access points on _____ . A. Channels 1 and 1 B. Channels 1 and 2 C. Channels 1 and 6 D. Channels 1, 6, and 11

A. Co-channel interference is caused by two access points operating on the same radio frequency channel. Access points operating on channels 1 and 2 may cause adjacent channel interference. Channels 1, 6, and 11 are nonoverlapping channels and will not interfere with one another.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

A. Data B. Control ~C. Management~ D. Detail

As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases

A. Data rate decreases

Which component is required for a successful installation and operation of an 802.11ac wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows AutoConfig

A. Device driver

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

A. Different RF channel ~B. Mismatched SSID~ C. Different BSSID D. Mismatches association

A controller-managed access point connected to a port on the WLAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity

A. Direct connectivity

You are a sales engineer connected to an IEEE 802.11a access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

A. Dynamic frequency selection B. Transmit power control ~C. Dynamic rate switching~ D. Transmit Save Mode

Access points work at which layers of the OSI model? (Choose two.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

A. Layer 1 B. Layer 2

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint

A. Midspan

An IEEE 802.11g access point requires a minimum of how many antennas to move data? A. One B. Two C. Four D. Six

A. One 802.11g access points require only one antenna to function. Systems that support antenna diversity will require two antennas to correctly operate.

The open system authentication process uses how many frames?

A. One ~B. Two~ C. Three D. Four

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets? A. One or more B. Two or more C. Three or more D. Four or more

A. One or more

You are a network engineer troubleshooting a WLAN weak signal complaint. While moving a handheld WLAN device, you notice that the signal strength increases when the device is moved from a horizontal to a vertical position. This is because the ____________is changing. A. Polarization B. Wavelength C. Frequency D. Diffusion

A. Polarization Changing the orientation of a device or antenna will change the polarization and affect the received signal strength. The signal strength may either increase or decrease depending on how the polarization is changed from the original position. Wavelength, frequency, and phase are characteristics of RF.

When a wireless LAN device listens for beacon frames, it is participating in which phase?

A. Power save B. Passive Scanning C. Active scanning ~D. Authentication~

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager, who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?

A. Power save mode D. Association Mode ~C. Active mode~ D. Passive mode

The process in which a wireless LAN client connection moves from one access point to another is called _________.

A. Re-authentication ~B. Roaming~ C. Rebuilding D. Roving

In order to set up an ad hoc network, a user must know which two parameters? (Choose two.) A. SSID B. BSSID C. Channel D. MAC address E. Protection mode

A. SSID C. Channel

A patch antenna is an example of which type of antenna? A. Semidirectional B. Omnidirectional C. Highly directional D. Dipole-directional

A. Semidirectional A patch antenna provides semidirectional coverage. The amount of coverage depends on the design and gain of the antenna. Parabolic dishes are highly directional.

A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the operating system C. Hardware to install a PCI card D. Hardware to install a client bridge

A. Software to control a wireless NIC

A performance condition that occurs when two or more access point radios are providing RF coverage to the same physical area using overlapping frequencies. Simultaneous RF transmissions by two or more of these access point radios in the same physical area can result in corrupted IEEE 802.11 frames due to the frequency overlap. Also called adjacent overlapping channel interference. This definition may vary depending on the source.

Adjacent-channel interference

In wireless LAN technology, the strength or the amount of power of a radio frequency signal.

Amplitude

Two characteristics of RF signals are:

Amplitude Phase

Two characteristics of RF signals are?

Amplitude and Phase

IEEE 802.1X

An IEEE standard for port-based access control; it provides an authentication process. Originally intended for use with IEEE 802.3 Ethernet networks but used with IEEE 802.11 wireless networks.

logical

An IP address is a ______ address.

A. Association is established and terminated and no valid IP address

An incorrect passphrase set on a client device will result in a different preshared key that is generated for a device using WPA 2.0 as a security solution. What will be the result of a mismatched passphrase between the client device and an access point? A. Association is established and terminated and no valid IP address B. Invalid association and valid IP address C. A deauthentication D. A disassociation

What symptom would indicate the presence of a hidden node in a WiFi network?

An increase in retransmisions

What symptom would indicate the presence of a hidden node in a Wi-Fi network?

An increase in retransmissions

Which explanations of antenna usage are the most accurate?

An omni-directional antenna is well-suited to provide wireless coverage in most homes. A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions.

Wired Equivalent Privacy (WEP)

An optional authentication and/or encryption mechanism defined in the IEEE 802.11 standard designed to prevent casual eavesdropping. A weak and compromised legacy form of wireless security.

A technology designed to mitigate the problems associated with multipath in a wireless LAN system.

Antenna diversity

Seventh layer of the OSI Model

Application

Which layer of the OSI model provides an interface to the user?

Application

Which of the following will be the most likely reason in determining the number of access points required for a wireless LAN deployment?

Applications used

The final step to becoming part of a basic service set; allows wireless LAN client devices to pass traffic across an access point. Allows for association request and association response frames to be sent and received. Takes place after IEEE 802.11 authentication.

Association

A value assigned to an IEEE 802.11 wireless client device by the wireless access point to identify the associated device. The AID value is identified in association response frames.

Association ID (AID)

A feature used by Microsoft and integrated in the Windows operating systems to provide IP addresses automatically to any device requesting one that is connected to a common LAN and without the use of a DHCP server. If a network device is unable to locate a DHCP server, APIPA is used to automatically configure an IP address from a reserved range. This reserved IP address range is 169.254.0.1 through 169.254.255.254.

Automatic Private IP Addressing (APIPA)

A self contained Intelligent access point is

Autonomous

A self-contained intelligent access point is:

Autonomous

A self-contained intelligent access point that can function as an independent wireless network device.

Autonomous access point

A self-contained unit with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the devices have permission to use.

Autonomous access point

As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing _______ access points, and they could consider ________ to ease the management burden.

Autonomous; a WLAN controller-based architecture

As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing __________ access points, and they could consider _____________ to ease the management burden.

Autonomous; a WLAN controller-based architecture

In RF terminology, the angle of measurement for the horizontal radiation pattern of an antenna element.

Azimuth

Which of these statements is true? Choose two. A) All SOHO-grade access points have adjustable RF output power B) Some SOHO-grade access points have adjustable RF output power C) Some consumer-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power E) All consumer-grade access points have adjustable RF output power

B) Some SOHO-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power

Non-Wi-Fi interference for an 802.11g network can be caused by _____ and _____ . (Choose two.) A. AM radios B. Microwave ovens C. 802.11b networks D. Cordless phones E. Radar systems F. Digital TV systems

B, D. Non-Wi-Fi interference is interference by anything other than wireless LANs that operates in the same frequency range. AM radios and digital TV systems do not operate in the license-free bands. 802.11b interference is wireless LAN interference. Radar systems operate in the 5 GHz UNII band.

Operational Modes of an 802.11g

B-Only Mode - ata rates of 11, 5.5, 2, and 1 Mbps support for DSSS, HR-DSSS, and ERP-DSSS/CCK technology G-Only Mode - data rates of 6-54 Mbps ERP-DSSS/CCK, HR-DSSS, and DSSS is disabled B/G Mode - throughput from 20 Mbps down to as little as 8 Mbps both ERP-DSSS/CCK and ERP-OFDM is enabled

The curvature of the earth will have an impact on the WLAN signal after how many miles? A. 2 B. 7 C. 10 D. 25

B. 7 The curvature of the earth or earth bulge will have an impact on a WLAN signal after seven miles. If the signal needs to travel farther than seven miles, the antenna will have to be installed in a higher location.

Which of the following is true of a predictive modeling survey? A. It takes more time than a passive survey to get accurate results. B. It takes less time than a passive survey to get accurate results. C. It finds areas of interference from neighboring wireless LANs. D. It helps you choose the manufacturer's equipment to be used for the wireless LAN.

B. A predictive modeling site survey will take less time than a passive survey because a passive survey requires a manual analysis. On-site protocol analysis or scanning utility will determine areas of RF interference from wireless LANs. The predictive modeling survey does not help you choose manufacturers' equipment to be used in a deployment.

When a device associates to an access point during a site survey, it is performing what type of survey? A. Predictive B. Active C. Passive D. Required

B. An active site survey requires the survey device to associate to an access point. A passive site survey monitors all access points in the area. A predictive modeling site survey does not involve associating to an access point. Associating to an access point is not a required part of manual testing.

Which of the following are benefits of a wireless repeater? (Choose two.) A. Higher data transfer rate. B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput. E. Extends cell size.

B. Larger cell size allows more devices to access the medium. E. Extends cell size.

What device is used to shunt transient current to ground in the event of an indirect lightning strike? A. Lightning striker B. Lightning arrestor C. Lightning prevention D. Lightning breaker

B. Lightning arrestor A lightning arrestor is used to protect a WLAN system from an indirect lightning strike. A lightning arrestor will direct transient or induced electrical current to earth ground as a result of a lightning strike.

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association

B. Mismatched SSID

You are performing a protocol analysis in order to determine potential interference from other wireless LANs in the immediate area of the site survey. You discover several wireless LANs that can potentially cause interference with the proposed installation. Which technology in use would not have an impact on the 802.11g wireless network you are surveying for? A. FHSS B. OFDM C. DSSS D. ERP-OFDM E. PBCC

B. OFDM networks operate in the 5 GHz UNII band and would not affect an 802.11g network that operates in the 2.4 GHz ISM band. FHSS, DSSS, and ERP-OFDM all operate in the 2.4 GHz ISM band and could cause interference with an 802.11g network.

Antennas provide an increase in RF coverage by using ____________ gain. A. Active B. Passive C. Positive D. Maximum

B. Passive Antennas provide an increase in RF coverage by means of passive gain. Passive gain occurs when isotropic RF energy is focused into a specific radiation pattern. Active gain requires the use of an external power source.

When a WLAN device listens for beacon frames, it is participating in which phase? A. Power save B. Passive scanning C. Active scanning D. Authentication

B. Passive scanning

You have been hired by a company to perform a wireless LAN site survey in a multitenant building. You discover numerous access points on channels 1, 6, and 11. To optimize the new deployment, what recommendation could you make to the customer? Assume that all new hardware will be purchased and backward compatibility is not required. A. Configure the access points to automatic channel selection for the 2.4 GHz ISM band. B. Configure the access points to operate in the 5 GHz band. C. Perform a spectrum analysis to find space in the 2.4 GHz band. D. Perform a predictive modeling site survey to determine which channels to use.

B. Since new hardware will be purchased and backward compatibility is not required, you could recommend using wireless network hardware that works in the 5 GHz band. This will eliminate interference from the other tenants that are using the 2.4 GHz ISM band. Automatic channel selection, spectrum analysis, and predictive modeling site survey will not help because surrounding access points already use the entire band.

Wireless bridges must be configured with ____________and____________. (Choose two.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy

B. The same SSID C. The same RF channel

The open system authentication process uses how many frames? A. One B. Two C. Three D. Four

B. Two

IEEE 802.11a/b/g access points require ____________ antennas on each radio for diversity functionality. A. One B. Two C. Three D. Six

B. Two An IEEE 802.11a or IEEE 802.11b/g access point will require two antennas for diversity. Although there are two antennas, a single input/single output access point will have only one radio. The access point provides additional intelligence to determine which antenna to use. Other WLAN technologies, such as IEEE 802.11ac MIMO, may use multiple antennas.

Which WLAN adapter can be installed in a computer without the need to disassemble the computer in any way? A. PCI B. USB 3.0 C. PCIe D. Mini-PCI

B. USB 3.0

You want to connect a desktop computer to an IEEE 802.11ac wireless network. Which WLAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 3.0 C. Half Mini-PCIe D. PCMCIA

B. USB 3.0

Most manufacturers recommend installing a wireless IEEE 802.11ac USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process

B. When instructed by the setup utility

Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way? (Choose 2.) A. PCI B. PCMCIA C. USB 2.0 D. PCIe E. Mini-PCI

BC

2. A high-speed linear topology is defined as a _____? A. Ring B. Mesh C. Bus D. Star

C

7. _____ allows for Application layer data communication between two stations using lower layers as a support system. A. Logical addressing B. Physical addressing C. Data encapsulation D. Data encryption E. Point-to-point

C

A self-contained intelligent access point is: A. Controller-based B. Heavyweight C. Autonomous D. Thin

C

An operation mode that allows a wireless access point to be set in an operation mode for wireless point-to-point or point-to-multipoint configurations connecting two or more LANs together.

Bridge mode

A ___ Topology Consist of multiple devices connected by a single shared medium

Bus

A high speed linear topology is defined as a ___?

Bus

You are a wireless LAN consultant contracted to assist in a site survey for a retail outlet that will deploy an 802.11n WLAN. You've been asked to participate in an initial meeting with top management to determine the details of a site survey. What topics would most likely be discussed at this meeting?

Business requirements, Purpose of the wireless LAN

-Healthcare -Warehouse/retail -Manufacturing -Industrial

Businesses or organizations that use wireless LANs where RF interference could be a factor include:

After your city implemented a municiapl WIFI network using 802.11g on channels 1, 6, and 11 near your office, your users have been complaining about poor performance on their 802.11b VoWifi phones. The best solution for optimizing your 802.11a/g network to support VoWiFi in this scenario is to _________

Buy new 5 GHz capable VoWiFi phones

After your city implemented a municipal Wi-Fi network using 802.11g on channels 1, 6, and 11 near your office, your users have been complaining about poor performance on their 802.11b VoWiFi phones. The best solution for optimizing your 802.11a/g network to support VoWiFi in this scenario is to _____________.

Buy new 5 GHz capable VoWiFi phones.

CompactFlash (CF) cards are available in two types. What is the main difference between the two types? A. Length B. Width C. Thickness D. Height

C

The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage. A. 32 B. 57 C. 48 D. 12

C

You need to attend a business meeting out of town that requires air travel. You are in the airport and have some extra time. While waiting to board your plane you decide to check your office email using an 802.11g/n wireless hotspot access point at the airport. In order to provide a secure connection, you would enable your notebook computer to use_____________

C - VPN to the corporate network

At which two layers of the OSI model do wireless LANs operate? (Choose 2.) A. Session B. Network C. Physical D. Application E. Data Link

C, E

A service set identifier (SSID) has a maximum limit of how many characters or octets? A. 8 B. 16 C. 32 D. 128

C. 32

Wireless network cables and devices have impedance (AC resistance) of ____________ ohms. A. 10 B. 25 C. 50 D. 75

C. 50 WLAN cables and devices are rated at 50 ohms impedance. Cable and satellite television is rated at 75 ohms.

WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch

C. 802.11a client devices

A type of site survey that is software-based, requires minimum time on-site, and takes into consideration the attenuation value of materials such as the type of walls and doors is _____. A. Active B. Passive C. Predictive D. Optional

C. A predictive modeling site survey is software-based and takes the attenuation values of the building and other materials into consideration. Active and passive are forms of manual site surveys and record actual information about the site.

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode

C. Active mode

A self-contained intelligent access point is ____________. A. Controller-managed B. Heavyweight C. Autonomous D. Thin

C. Autonomous

Which can cause a loss of signal strength? (Choose two.) A. Antenna B. Amplifier C. Cable D. Connector E. Transmitter

C. Cable D. Connector Cables and connectors can both result in a loss of signal strength. Antennas and amplifiers will add gain or increase signal strength. A transmitter outputs an absolute amount of power.

You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection

C. ERP protection

Highly directional antennas are typically used for ____________ connectivity. A. Short-range B. Omnidirectional C. Long-range D. Dipole

C. Long-range Highly directional antennas are typically used for long-range point-to-point connectivity, such as bridge links. Omnidirectional antennas are used as part of an access point system or to provide point-to-multipoint links.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame? A. Data B. Control C. Management D. Detail

C. Management

You have been hired by a company to perform a manual site survey. When explaining the difference between a manual and predictive modeling site survey, you let the customer know the advantages and disadvantages of each. A manual site survey has which advantage? A. Speed B. No hardware required C. Accuracy D. Facility access not required

C. Manual site surveys can be very accurate because actual readings are taken at the site using test access points and a wireless client. This can take quite some time to complete depending on the size of the location. Wireless hardware is required to perform the site survey, and access to the whole facility is required.

You are a network consultant hired to perform a manual site survey for a small office building. The wireless network to be installed will use data and voice. For backward compatibility, the customer needs to support 2.4 GHz equipment. To provide the highest quality of service for the voice application, you recommend that the received signal strength be a minimum ___ of for a data rate of 54 mbps. A. -20 dBm B. -25 dBm C. -67 dBm D. -76 dBm

C. Recommended received signal strength for voice applications in the 2.4 GHz ISM band at a data rate of 54 mbps is about -67 dBm. A recommended signal-to-noise ratio is more than 20 to 25 dB.

Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge-only mode B. Repeater-only mode C. Root access point mode D. Access mode

C. Root access point mode

Protocol using mechanisms that attempt to avoid collisions. This protocol is required with IEEE 802.11 wireless networking because the wireless devices have no way of detecting a collision. Instead, devices will use a method that may involve reserving the wireless medium for a specified period of time, attempting to avoid collisions.

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)

A method used with IEEE 802.3 Ethernet networking; it is a contention-based media access control method that Ethernet devices use to share the medium. This method allows for only one device to transmit at any one time. If a collision is detected, the transmitting devices will need to back off for a random period of time and retransmit.

Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

Area of RF coverage extending from an antenna in wireless infrastructure and wireless client devices.

Cell

Wireless LAN Controllers commonly have what abilities?

Centralized Administration Captive Portal Built-In RADIUS services

Configuration of many devices such as wireless access points from one central device, software application, or location.

Centralized administration

Wireless LAN controllers may contain which of the following features? (Choose 3)

Centralized administration, captive portal, and built in RADIUS services

Tunneling of all traffic to a controller from the access point for handling, usually using proprietary methods.

Centralized data forwarding

Radio frequency range assignment varying in frequency based on the use of the device.

Channel

Question 32 : In order to set up an ad hoc network, a user must know which two parameters? (Choose two.)

Channel SSID

A method used in the design of wireless networks so that overlapping cells are on different or nonoverlapping channels and minimize interference.

Channel planning

When supported by the manufacturer, a classification signature determines the maximum amount of DC power a device requires, thereby allowing the power sourcing equipment to better manage the amount of DC power delivered to a specific physical port.

Classification signature

The physical carrier sensing performed constantly by all stations that are not currently transmitting or receiving data. CCA is used to determine whether the medium is available for RF transmissions.

Clear channel assessment (CCA)

After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a Wi-Fi network? (Choose 2)

Client Utility Device Driver

After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a WiFi network?

Client Utility, Device Driver

load balancing

Client ___________ __________________ is a mechanism that prevents wireless client devices from associating to an access point that has already reached the maximum number of client devices for optimal performance.

The transmit power control (TPC)

Client can associate with an A P based on their transmit power AP can specify the transmit power of any or all stations A P can change transmission power on stations

Weak signal strength would have an impact on what device?

Client device

Given: In Single-Channel Architecture (SCA) systems, multiple access points can use the same BSSID. This feature allows for the creation of a network-wide virtual access point that can be applied across multiple physical access points operating on the same channel. What benefit does this solution offer?

Client stations do not have to make roaming decisions

CWNP terminology defines co-channel interference as a performance condition that occurs when two or more independently coordinated access point radios are providing RF coverage to the same physical area using the same IEEE 802.11 channel. Additional RF medium contention overhead occurs for all radios using this channel in this physical area, resulting in throughput degradation and latency.

Co-channel interference

In wireless networking, multiple devices or access points in the same RF space and usually on different channels.

Co-location

Operating system feature that allows extensive and detailed configuration of a device such as a wireless access point or wireless LAN controller by using specific commands set by the device manufacturer.

Command-line interface (CLI)

- User expectations - Distance & output power from AP - Number of devices associated

Common throughput problems:

- Add more APs - Increase output power or antenna gain - Enable Load Balancing on APs

Common throughput solutions:

Originally designed as a mass storage device format used in portable electronic devices; now used for a variety of devices and technologies, including Ethernet networks, Bluetooth, digital cameras, RFID, and Wi-Fi networks.

Compact Flash

A wireless workgroup bridge will allow you to do which of the following?

Connect a wired LAN to an AP

Which of the following is not a requirement for the initial gathering of technical information for a wireless LAN site survey in a new deployment scenario?

Cost of equipment

A WLAN bridge is best-suited for which scenario?

Connecting a portable classroom to a school network

bus topology

Consists of multiple devices connected along a single shared medium with two defined endpoints:

Access points that are used with wireless LAN controllers and not as standalone devices. Usually have limited functionality and require a wireless LAN controller to operate.

Controller-based access points

What is one difference between autonomus access points and controller-based access points?

Controller-based access points associate to a WLA?N controller, but autonomous access points do not

What is one difference between autonomous access points and controller-based access points?

Controller-based access points associate to a WLAN controller, but autonomous access points do not.

Different from autonomous access points, these access points are used with hardware WLAN controllers but not as stand-alone devices.

Controller-managed access points

Access points used to provide a wireless infrastructure without the use of a hardware wireless LAN controller. This technology uses a software management system for configuration, and decisions are at the network edge rather than being tunneled through the network.

Cooperative access points

You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wireless LAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0

D

Without any regulatory domain taken into consideration, the 2.4 GHz frequency range allows for how many channels using 802.11b/g/n?

D - 14

OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate pf_________Mbps

D - 54

Stations operating in which two 802.11 amendments are interoperable?

D - 802.11b and 802.11g

Devices compliant with whcih two amendments to the IEEE standard use multiple radio chains and multiple antennas? (Choose two)

D - 802.11n E - 802.11/ac

Bluetooth devices use___________, which can potentially cause interference with WLANs.

D - Frequency-Hopping Spread Spectrum (FHSS)

Hiding the SSID of a WLAN will require a user to ___________in order to gain access to the wireless network

D - Know the SSID and enter it manually

Which WLAN technology in wireless networking uses the effects of multipath to provide data rates of 600 Mbps in the 2.4 GHz ISM band?

D - MIMO

Which data encryption/authentication method is identified in the original 802.11 standard?

D - WEP

IP addresses are logical addresses on which layer of the OSI model? A) Transport B) Data-Link C) Internet D) Network E) Session

D) Network Note, the Internet Layer is from the TCP/IP Model

Omnidirectional antennas have a horizontal beamwidth ____________ of degrees. A. 90 B. 180 C. 270 D. 360

D. 360 Omnidirectional antennas have a horizontal beamwidth of 360°. The vertical beamwidth will vary depending on the design and the gain of the antenna.

Enterprise-grade IEEE 802.11n/ac client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey

D. Site survey

A point-to-point wireless link requires what percent of the Fresnel zone to be clear in order to be considered to have an acceptable RF line of sight? A. 0 B. 20 C. 40 D. 60

D. 60 It is recommended that at least 60 percent of the Fresnel zone be free of obstruction in order to have acceptable RF line of sight. Up to 40 percent of the zone can be blocked by obstructions without affecting the signal.

When considering the use of antennas for wireless LAN deployment during a site survey, which antenna could be tested to verify proper coverage for a long hallway or corridor? A. High-gain omnidirectional B. Low-gain omnidirectional C. Parabolic dish D. Yagi

D. A semidirectional antenna such as a Yagi is a good choice for an application requiring coverage down a long hallway or corridor. Low- or high-gain omnidirectional antennas will provide 360-degree horizontal coverage. Parabolic dish antennas are typically used for outdoor long-range bridging.

When using a predictive modeling site survey approach, which of the following is true about manual verification? A. Manual verification never has to be performed. B. Manual verification is always required. C. Manual verification should be performed only at the customer's request. D. Manual verification should be performed, but it is not required.

D. A verification of the predictive survey should be performed to verify that the survey meets the customer's requirements. Although not required, it should be considered.

You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-story building. Which characteristic must be considered while performing a site survey? A. All omnidirectional antennas should be vertically polarized. B. Multiple floors require the same channel. C. Each floor should be treated as an individual site survey. D. The channel plan should take all three floors into consideration.

D. Because of RF propagation, site surveys are really three-dimensional. Therefore in a three-story building all fl oors need to be taken into consideration. Omnidirectional antennas may be polarized either vertically or horizontally. Single-channel architectures use the same channel for multiple floors.

When performing a manual site survey, choose the best way to identify areas that lack RF coverage. A. Mark them with tape so they can be located at a later time. B. Use a camera to take a photograph and document it in the report. C. Show the site manager the areas that lack coverage. D. Document on the floor plans or blueprints.

D. Dead spots (areas that lack RF coverage) should be identified on floor plans or blueprints. This is part of standard documentation practices. Marking them with tape, taking a photograph, and showing the site manager in person are not the best ways to document dead spots.

You need to perform a site survey for a small real estate office that currently has no wireless network. Which factors must be considered as part of the site survey? A. Spectrum analysis B. Packet analysis C. Environmental conditions D. Correct antenna selection

D. In this situation, correct antenna selection is important to provide optimal coverage as well as proper aesthetics. In this example, a spectrum analysis or protocol analysis could be performed but is not required. Environmental conditions are typically not an issue in a small office deployment.

You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0

D. Wireless USB 2.0

Power sourcing equipment delivers which of the following?

DC power to the end device

power sourcing equipment delivers which of the following?

DC power to the end device

___ allows for application layer data communication between two stations using lower layers as a support system.

Data Encapsulation

At which layer of the OSI model are bits compiled into frames?

Data Link

Second layer of the OSI Model

Data Link

RF jamming

Disruption of communication between devices via RF interference. Jamming can be either intentional or unintentional. Used by intruders to perform denial-of-service (DoS) and hijacking attacks on wireless networks.

The throughput of a wireless LAN can be affected by _______ or _______.

Distance from access point, output power of access point

Question 22 : Weak or no signal at a wireless client device can be the result of _______.

Distance from an access point

A method that allows wireless client devices to compete for the time to transmit frames across the medium. In wireless networking this medium is the air.

Distributed coordinated function (DCF)

Software that allows components such as network adapters, keyboards, mice, video cards, and all other attached devices to communicate with a computer operating system.

Device driver

Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter

Device driver

-Ethernet cabling -Ethernet switches -Layer 3 routers -Wide area network (WAN) connectivity

Devices and components that can contribute to wired infrastructure problems include:

Effect that occurs when an RF signal passes an obstacle, such as a building. The RF wave changes direction by bending around the obstacle.

Diffraction

When RF passes or bends around an obstacle like building or column, the behavior is ?

Diffraction

Effect that occurs when the RF signal naturally widens as it leaves an antenna element, resulting in attenuation of the radio frequency signal. Diffusion is the underlying cause of free space path loss.

Diffusion

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following?

Direct connectivity

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate Device is considered to have which of the following?

Direct connectivity

A spread-spectrum technology used in IEEE 802.11 and IEEE 802.11b/g with data rates of 1 and 2 Mbps set on a specific radio frequency channel.

Direct-sequence spread spectrum (DSSS)

SSID hiding

Disabling the broadcast of the service set identifier in wireless LAN beacon frames. SSID hiding is a weak and compromised method used by some as a form of wireless security.

No longer being associated or able to pass traffic across an access point. It is a notification, not a request, and can be sent from either an access point or an associated wireless device.

Disassociation

The 802.11g standard uses which two physical layer technologies

ERP-OFDM

A protocol used to automatically distribute Internet Protocol (IP) addresses and other TCP/IP information to devices connected to a local area network.

Dynamic Host Configuration Protocol (DHCP)

You are a sales engineer connected to an IEEE 802.11a access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

Dynamic rate switching

The ability to change data rates based on signal quality and strength within a basic service area. Also known as dynamic rate selection or adaptive rate selection.

Dynamic rate switching (DRS)

A______________filter is used to allow or deny wireless barcode scnners access to an 802.11b/g/n network

E - MAC

You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?

ERP protection

802.11g standard uses what two physical layer Technologies

ERP-OFDM

ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is suing WEP security with a 128-bit key. You have been asked to provide feedback about the strngth of their security. You tell ABC Company that ________.

Each currently-used security mechanism is weak, and the network is insecure

ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is using WEP security with a 128-bit key. You have been asked to provide feedback about the strength of their security. You tell ABC Company that _________.

Each currently-used security mechanism is weak, and the network is insecure.

ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is using WEP security with a 128-bit key. You have been asked to provide feedback about the strength oftheir security. You tell ABC Company that _________.

Each currently-used security mechanism is weak, and the network is insecure.

The earth curvature has an effect after seven miles in distance; additional height needs to be added to the antenna in order to lessen the impact. Also known as earth bulge.

Earth curvature

Which of the following is not an advantage of an IBSS network?

Easy to secure

In RF terminology, the angle of measurement for the vertical radiation pattern of an antenna element.

Elevation

In a typical office building, Wi-Fi clients are likely to experience poor Wi-Fi coverage in what locations? (Choose 2)

Elevators Stairwells

In a typical office building, WiFi clients are likely to experience poor WiFi coverage in what locations?

Elevators, Stairwells

ABC Corporation has decided to deploy their first WiFi netowrk in their corporate headquarters. ABC prepared for adding a WiFi network by installing PoE-capable Ethernet switches in their wiring closets. What type of PoE implementation is this?

Endpoint

Which statement best defines SNR?

The difference between the noise floor and a signal's strength

View the figures and correctly identify the antenna types illustrated in the figures.

Figure 1: Parabolic Dish Figure 2: Grid

Software that remains in memory when the power is removed.

Firmware

Which of the following can be imported into a commercial site survey program to assist in predicting the RF coverage of access points?

Floor plans

What site specific information should be gathered prior to a site survey?

Floor plans, Electrical Specifications

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band

Four

Caused by diffusion, it is the weakening of a radio frequency signal as it travels through open air with no obstructions.

Free space path loss

The number of complete cycles of an alternating current (AC) signal that will occur in a period of one second.

Frequency

What is the term defining the amount of times a cycle of an RF signal will oscillate in one second

Frequency

What is the term defining the number of times a cycle of an RF signal will oscillate in one second?

Frequency

What two factors are used to calculate the wavelength of an RF wave? (Choose 2)

Frequency Speed of light

What two factors are used to calculate the wavelength of an RF wave?

Frequency, Speed of light

Public access networks including hotspots, and hospitality may need to accept connections from a wide variety of client devices except?

IEEE 802.11b

Given: Several users are required to transfer files among themselves in a conference room. No APs are availbale for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?

IBSS

Manufacturers design hardware used for wireless LANs based on a common set of criteria or rules known as standards. The name of the organization responsible for creating 802.11 WLAN standards is what?

IEEE

The Institute of Electrical and Electronics Engineers, a nonprofit organization responsible for generating a variety of technology standards, including those related to information technology.

IEEE

Which of the following organizations are responsible for standards compliance?

IEEE

Which organization is responsible for creating standards for wireless computer networking?

IEEE

802.11 b/g/n

IEEE 802.11 iterations that support amendment b

802.11 , 802.11b, 802.11g, 802.11n

IEEE 802.11 iterations that use the 2.4 GHz ISM band.

802.11a, 802.11n

IEEE 802.11 iterations that use the 5 GHz UNII bands

An amendment to the IEEE 802.11 standard that specifies operation in the 5 GHz Unlicensed National Information Infrastructure (UNII) band with data rates of up to 54 Mbps and the orthogonal frequency division multiplexing (OFDM) Physical layer specification.

IEEE 802.11a

Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main buildings network for web browsing. The main building has an existing 802.11g WiFi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main buildings network?

Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs

Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main building's network for web browsing. The main building has an existing 802.11g Wi-Fi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main building's network?

Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs.

Two or more RF signals interacting with each other and causing a degradation of performance.

Interference

Question 19 : Which items describe a service set identifier (SSID)? (Choose two.)

Is case sensitive 32 characters maximum

In radio frequency terminology, energy broadcast equally in all directions in a 360 degree spherical manner.

Isotropic

A theoretical concept used in reference and calculations. Assumes that RF energy is broadcast equally in all directions in a spherical manner. An isotropic radiator is an imaginary, perfect antenna.

Isotropic radiator

The data layer of the OSI model is divided into which two sublayers

LLC/MAC

Two sublayers of Data Link layer

LLC/MAC

A. Layer 1

Lack of RF connectivity on a wireless client could be caused by which layer of the OSI model? A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 7

Which of the following is a benefit of a wireless repeater?

Larger cell size allows more devices to access the medium

Which of the following is a benefit of a wireless repeater?

Larger cell size allows more devices to access the medium and extends cell size

Where is the use of a Wireless Internet Service Provider (WISP) most appropriate?

Last mile wireless data delivery to homes and businesses

intermittent

Most _________________ connectivity issues in IEEE 802.11 wireless LANs are associated with the amount of received signal strength.

- (HTTP) - (TFTP) - (FTP)

Most infrastructure devices have several options for performing upgrades, including:

A phenomenon resulting from various wavefronts of reflected signals arriving at a receiver at slightly different times. Multipath causes corruption of the received signal, resulting in less overall throughput.

Multipath

As an RF signal propagates, it reflects off an object. The reflected signal and the signal following a direct path arrive at the receiver at different points in time. What is the term used to describe this RF behavior?

Multipath

Simple antenna diversity mitigates the adverse effects caused by which common Wi-Fi problem?

Multipath

Simple antenna diversity mitigates the adverse effects caused by which common WiFi problem?

Multipath

What can IEEE 802.11n MIMO technology use to provide higher throughput to wireless client devices that 802.11g cannot?

Multipath

Which Wi-Fi technology simultaneously uses multiple radio chains to transmit or receive data?

Multiple Input, Multiple Output (MIMO)

Which WiFi technology simultaneously uses multiple radio chains to transmit or receive data?

Multiple Input, Multiple Output (MIMO)

A technology using multiple radio chains and multiple antennas, allowing for high throughput up to 600 Mbps in IEEE 802.11 wireless networks.

Multiple input/multiple output (MIMO)

A wireless network design in which access points are set to different nonoverlapping channels to minimize interference.

Multiple-channel architecture (MCA)

As a general rule, where is the most appropriate location to install a dipole antenna?

Near the center of the coverage area

Third layer of the OSI Model

Network

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Network

Which layer of the OSI model is responsible for addressing and routing?

Network

In order to assess your customer's WiFi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting?

Network Administrator, Facilities manager

The way in which devices connected to a common infrastructure communicate and transmit data across a network medium from one device to another, as in CSMA/CD and CSMA/CA.

Network access method

In order to assess your customer's Wi-Fi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting? (Choose 2)

Network administrator Facilities manager

What level of the OSI model Consist of bit level data streams and Computer network Hardware connecting the devices together

Physical Layer

Interviewing managers and users will help determine which part of the site survey process?

Performance expectations

A standard for computer interface cards developed by Intel. Cards are inserted into an available slot (interface) in a desktop computer, allowing for the attachment of peripheral devices.

Peripheral Component Interconnect (PCI)

PAN

Personal Area Network

Which two of the following options are available for Wi-Fi protected Access 2 (WPA 2.0)?

Personal Mode Enterprise mode

A particular point in the time of a cycle; measured from some arbitrary zero and expressed as an angle and measured in degrees.

Phase

First layer of the OSI Model

Physical

Which layer of the OSI model uses physical addresses to deliver data to the destination?

Physical

A wireless LAN site survey and design includes defining _______ and _______ security requirements to help protect against RF jamming and protect the integrity of information. (Choose two.)

Physical Data

The lower three layers of the OSI model are?

Physical Data Link Network

ABC Company is comprised of four departments: sales, marketing engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _____________

Role Based Access Control (RBAC)

ABC Company is comprised of four departments: sales, marketing, engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _________.

Role Based Access Control (RBAC)

The default operation mode for enterprise-grade access points.

Root Access Point Mode

This operation mode involves connecting the access point to a distribution system.

Root Access Point Mode

The default mode of most access points; it allows wireless LAN client devices to connect to a wireless network and use computer network resources.

Root access point mode

Which access point mode involves connecting the access point to a distribution system for user access to the LAN?

Root access point mode

Which access point mode involves connecting the access point to a distribution system for user access to the LAN

Root access point mode

In addition to wireless networking which adapter was designed for flash memory storage and can be used in a Digital camera?

SDIO

Small office, home office; in wireless LAN terms, SOHO defines a smaller network with fewer client devices than in a large or enterprise deployment.

SOHO

Wi-Fi protected setup was designed for which o f the following wireless applications?

SOHO

The logical name of a WLAN is

SSID

An effect that occurs when an RF signal strikes an uneven surface. Wavefronts of the signal will reflect off the uneven surface in several directions.

Scattering

Semi-Directional Antenna

Sector Antenna

Semidirectional antenna that can be configured in a group to provide omnidirectional coverage. Useful in communities and campuses, or for wireless ISPs.

Sector antenna

Designed as a flash memory storage device with storage capacities from 8 MB to 4 GB. Now allows for connection of other devices such as cameras, global positioning system (GPS) units, FM radios, TV tuners, Ethernet networks, and Wi-Fi networks.

Secure Digital Input Output (SDIO)

The 802.11i amendment to the standard addresses which of the following technologies?

Security

Point to Point links typically use which antenna types?

Semidirectional and Highly Directional

You recently installed an IEEE 802.11g wireless network in a small office. One of the employees has been complaining of poor performance and mentioned her notebook computer runs very slowly because of the access point it connects to. What could cause this notebook computer to be performing poorly?

The access point is located at the opposite side of the building from the user's office separated by several walls.

You are a wireless LAN engineer hired to perform a predictive analysis site survey for a 150,000-square-foot office building. This space includes walled offices as well as cubicles. What is an advantage of a predictive modeling site survey over a manual survey in this specific application?

The amount of time required for accurate results is much less than a complete manual walkthrough.

RF coverage

The area in which radio frequency can be sent and received from devices providing two-way communication.

Media Access Control (MAC)

The bit-level communication is accomplished through _____ addressing.

Which of the following statements is true about active scanning?

The client sends 802.11 Probe Request frames to query available APs.

-Radio frequency transmitter -Radio frequency receiver

The components used to send and receive radio frequency information is accomplished by which 2 main components?

54Mbps, OFDM

The data rates for IEEE 802.11a are up to _____ using____.

A. Required

The device driver of a wireless network adapter card is ____________. A. Required B. Optional C. Used with security D. Another name for SSID

What does the signal-to-noise ratio represent?

The difference between received signal and noise floor

After successfully connecting to the WiFi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that ask for your name, room number, and a secret key. What has most likely happened?

The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network

After successfully connecting to the Wi-Fi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that asks for your name, room number, and a secret key. What has most likely happened?

The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network.

physical, data link, network

The lower three layers of the OSI model are ______, _____, and __________.

Physical

The lower two layers of the OSI model are responsible for the operation of wireless networks. The ______________ layer provides a connection between devices.

Null authentication

The method used when there is no means of being authenticated to an external source. Any station that requests authentication may become authenticated.

64QAM / 54Mbps

The modulation/demodulation technology used depends on the wireless standard or amendment with which the device is compliant. For example, an 802.11g WLAN will use _______QAM when transmitting data at _______Mbps.

-Hard drive -Video card -Keyboard -Mouse -USB ports -Network adapters

The most common devices that require a software device driver are:

Two

The open system authentication process uses how many frames?

MAC address

The physical address of a network adapter is the __________.

Given: In ABC Company's branch office, there are three 802.11n access points serving 20 Wi-Fi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the building during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time. What is the most likely cause of the slow and intermittent connectivity?

The picnic tables are located at the edge of the effective range of Wi-Fi coverage.

Given: In ABC Company's branch office, there are three 802.11n access points serviing 20 WiFi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the builiding during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time.

The picnic tables are located at the edge of the effective range of WiFi coverage

roaming

The process in which a WLAN client connection moves from one access point to another is called __________.

discovery phase

The process in which the SSID is used by devices to select a wireless network to join is called the ___________________.

modulation

The process of combining binary data with high-frequency AC signals to prepare it to be sent accross the air.

C. Increasing the gain of the antenna on the access point

The received signal strength of a wireless client could be increased by __________________. A. Upgrading the wireless client device B. Enabling load-balancing features on the access point C. Increasing the gain of the antenna on the access point D. Installing the Microsoft Wireless Zero Configuration utility

IEEE 802.11n

The release of this document opened the doors for manufacturers of IEEE 802.11 wireless LAN equipment, giving them the opportunity to move forward with new technology that allows for better performance, higher throughput, and several other benefits.

Wireless bridges must be configured with ____ and _____,

The same SSID The same RF channel

Wireless bridges must be configured with _______ and _______.

The same SSID and RF channel

D

The term encapsulation means to ____________. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload

C. Distance from access point, output power of access point

The throughput of a wireless LAN can be affected by ____________ or _____________. A. Distance from access point, IP address B. Distance from access point, MAC address C. Distance from access point, output power of access point D. Distance from access point, output power of client device

A. Adding access points

The throughput of a wireless LAN client device can be increased by performing which task? A. Adding access points B. Upgrading the client software to full-duplex mode C. Increasing the RF noise D. Hiding the SSID

MAC address

The unique identifier or hardware address of each device on a computer network; the abbreviation stands for media access control. It is also called the physical address.

You are a network administrator and receive a call from a user stating that she cannot access the wireless LAN. The office contains 50 other users, and nobody else is complaining about the network. What could be a potential problem that would keep this user from connecting to the access point? T

The wireless client device has a corrupt device driver.

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in WiFi networks because ___________.

The wireless transmission medium is half-duplex, thus shared by all users

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in Wi-Fi networks because ___________.

The wireless transmission medium is half-duplex, thus shared by all users.

CompactFlash (CF) cards are available in two types. What is the main difference between the two types?

Thickness

802.11k

This IEEE 802.11 amendment addresses radio resource management.

802.11w

This IEEE 802.11 amendment designed to mitigate DoS or Hijacking attacks.

802.11r

This IEEE 802.11 amendment specifies fast secure roaming or fast transition technology for VoIP with wireless LAN technology

802.11 g

This amendment addresses extended data rates with OFDM technology.

802.11 y

This amendment allows for the use of high-powered wireless LAN equipment to operate in the 3.65-3.7 GHz band.

Physical addresses on a network device are responsible for which of the following?

To identify which device should receive the information

ring topology

Topolgy still widely used by ISPs for high-speed, resilient backhaul connections over fiber-optic links

The layout or physical design and interconnection of a computer network. A topology includes the cabling and devices that are part of the network.

Topology

A device used to connect two or more dissimilar types of LANs together, such as wireless (IEEE 802.11) and Ethernet (IEEE 802.3).

Translational bridge

Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP. What do you tell them is a benefit of using multiple antennas?

Transmit and receive diversity that addresses multipath problems Improved throughput by enabling full-duplex communication

Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP. What do you tell them is a benefit of using multiple antennas?

Transmit and receive diversity that addresses multipath problems.

C. 802.11a client devices

WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch

Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concersn about wireless hot-spot usage. To address these concerns, what advice should you give to your traveling users with regard to wireless hot-spot usage?

Verify that personal firewall and antivirus software are both enabled before connecting, Always use company-provided VPN client software after connecting to the WiFi network

Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concerns about wireless hot-spot usage. To address these concerns, what advice should you give to your traveling users with regard to wireless hot-spot usage? (Choose 2)

Verify that personal firewall and antivirus software are both enabled before connecting. Always use company-provided VPN client software after connecting to the Wi-Fi network.

802.11ac-2013

Very High Throughput (VHT) enhancements below 6 GHz 5 GHz frequency bands Wider Channels New Modulation More Spatial Streams Improved MIMO and Beamforming

A logical separation of ports to define broadcast domains in a Layer 2 network, independent of their physical location.

Virtual local area networks (VLANs)

Which of the following statements is true regarding a wireless LAN controller?

Virtual local area networks involve a logical separation of ports

Technology that allows for private communications over a public network infrastructure such as the Internet. A VPN creates a secure tunnel for the user and the connected endpoint.

Virtual private network (VPN)

The ability of the transmitter and receiver to see each other.

Visual line of sight

Which device is the best candidate to use the roaming features of an IEEE 802.11n wireless computer network?

Voice handset

Disruption common in a wireless LAN system, caused by a mismatch in the impedance.

Voltage standing wave ratio (VSWR)

The basic unit of measurement for radio frequency power.

Watt (W)

Which are absolute measurements of RF Power

Watt and mW

The distance of one complete cycle or one oscillation of an AC signal. Wavelength is typically identified by the Greek symbol lambda.

Wavelength

The range of a 2.4 GHz signal is mostly dependent on which RF characteristic?

Wavelength

A. Distance from an access point

Weak or no signal at a wireless client device can be the result of __________________. A. Distance from an access point B. Distance from other client devices C. Distance from the wiring closet D. Distance from Ethernet switch

B. Client device

Weak signal strength would have an impact on what device? A. Infrastructure device B. Client device C. Multipath device D. Transmitter device

C. 169.254.0.1

What address would be considered a Windows Automatic Private IP Address, assigned when no DHCP server is available on the LAN? A. 192.168.0.1 B. 172.168.0.1 C. 169.254.0.1 D. 10.1.0.1

802.11r

What amendment was added to provide a standardized methodology for client station roaming and fast secure transition within the WLAN?

You are hired to perform a wireless LAN site survey for a large enterprise company with over a thousand employees. You need to come up with a list of questions to ask users of the wireless network. Which question would be the most relevant for the user community?

What applications do you use?

You are a wireless LAN consultant hired to perform a site survey for a hotel. You need to interview the management and staff regarding the proposed installation of the wireless network. Which of the following is an appropriate question to ask the hotel manager?

What are the aesthetic requirements?

Management Control Data

What are the three frame types used in wireless networks depending on the information being sent?

D. Multipath

What can IEEE 802.11n MIMO technology use to provide higher throughput to wireless client devices that 802.11g cannot? A. Hidden node B. Received signal strength C. DHCP D. Multipath

A. Adding another access point

What can solve a hidden node problem caused by an obstacle or obstruction on an IEEE 802.11g wireless network? A. Adding another access point B. Setting the access point to Mixed Mode C. Increasing the distance between the access point and the clients D. Adjusting the received signal strength on the client

direct sequence spread spectrum

What does DSSS stand for?

orthogonal frequency division multiplexing

What does OFDM stand for?

Quadrature Amplitude Modulation

What does QAM stand for?

B. The difference between received signal and noise floor

What does the signal-to-noise ratio represent? A. The difference between output power and noise floor B. The difference between received signal and noise floor C. The difference between access point output power and received client power D. The difference between client output power and noise generated by the access point

A. Mixed Mode technology

What is a valid solution to a hidden node problem caused by different technology types? A. Mixed Mode technology B. Additional access point C. Increasing output power D. Removing an obstacle

other wireless devices

What is the number one source of RF interference in a wireless network?

As an alternative to using leased lines to connect two offices on the same campus, your customer wants to implement a Wi-Fi solution. When asked by your customer, what advantages do you cite regarding use of a Wi-Fi infrastructure instead of a leased line? (Choose 2)

Wi-Fi implementations have a lower total cost of ownership than leased lines. Wi-Fi implementations offer more flexibility and easier expansion than leased lines.

Interference caused by other IEEE 802.11 wireless networks operating in the 2.4 GHz ISM or 5 GHz UNII bands.

Wi-Fi interference

How do Wi-Fi routers differ from Wi-Fi access points?

Wi-Fi routers are comprised of both a router and an access point within the same hardware.

As an alternative to using leased lines to connect two offices on the same campus, your customer wants to implement a WiFi solution. When asked by your customer, what advantages do you cite regarding use of a WiFi infrastructure instead of a leased line?

WiFi implementations have a lower total cost of ownership than leased lines, WiFi implementations offer more flexibility and easier expansion than leased lines.

How do WiFi routers differ from WiFi access points?

WiFi routers are comprised of both a router and an access point within the same hardware

WAN

Wide Area Network

The effect of the force of wind on an antenna or other structure. In the case of an antenna, wind blowing at high speeds causes the antenna to move. Antennas designed for use in outdoor installations usually have a wind loading specification.

Wind loading

This operation mode for enterprise-grade access points can connect two or more LANs.

Wireless Bridge Mode

Mesh Mode has made this obsolete.

Wireless Distribution System (WDS)

ABC Company has recently deployed a Wi-Fi network in their corporate facility. After deployment, they considered a solution for monitoring and enforcing their wireless security policy. What type of system can perform this task?

Wireless Intrusion Prevention System (WIPS)

A wireless LAN adapter client utility built into the Microsoft Windows XP and Vista operating systems; it runs as a service.

Wireless Zero Configuration (WZC) service

ABC Manufactoring currently has 35 access points throughout their main facility, and each Friday afternoon two adminitrators walk the premises with specturm and protocol analyzers to detect unauthroized devices and network activity. You have noted several problems with this approach. To address the inefficiencies with this approach and to provide the most robust preventative security, you have set aside a portion of the department's budget to install a ______.

Wireless Intrusion Prevention System (WIPS)

ABC Manufacturing currently has 35 access points throughout their main facility, and each Friday afternoon two administrators walk the premises with spectrum and protocol analyzers to detect unauthorized devices and network activity. You have noted several problems with this approach. To address the inefficiencies with this approach and to provide the most robust preventative security, you have set aside a portion of the department's budget to install a ________.

Wireless Intrusion Prevention System (WIPS)

A ________ will help determine and have the potential to mitigate certain levels of wireless intrusions or attacks on the network.

Wireless Intrusion Prevention Systems (WIPS)

What can help detect a rogue access point?

Wireless Intrusion Prevention Systems (WIPS)

Your customer has asked you to recommend a Wi-Fi solution that includes the following features: • Role Based Access Control • Stateful Firewall • Quality of Service What device type can perform all of these functions?

Wireless LAN Controller

Your customer has asked you to recommend a WiFi solution that includes the following features: 1. Role Based Access Control 2. Stateful Firewall 3. Quality of Service

Wireless LAN Controller

A device that usually consists of an Internet port, small Ethernet switch, and wireless access point. It allows SOHO and residential users to connect devices to the network and access the Internet. Also known as wireless broadband router or wireless residential gateway.

Wireless LAN router

This operation mode for enterprise-grade access points can act to extend the RF cell.

Wireless Repeater Mode

You have a notebook computer and wish to connect to an IEEE 802.11n wireless network the computer does not have a built in wireless LAN card or a pc card interface you do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution?

Wireless USB 2.0

semidirectional or highly directional

Wireless point-to-point links typically call for ________antennas.

As part of a pre-deployment manual RF site survey, your manager has assigned to you the task of documenting security and interference details about exisiting WLANs in the building. What is the best tool for locating and collecting information about existing APs in the building?

Wireless protocol analyzer

As part of a pre-deployment manual RF site survey, your manager has assigned to you the task of documenting security and interference details about existing WLANs in the building. What is the best tool for locating and collecting information about existing APs in the building?

Wireless protocol analyzer

A device used to extend a radio frequency cell, it allows users located beyond the connection distance of a wireless access point to connect to a wireless LAN by repeating the signal to an access point.

Wireless repeater

A wireless client device that allows several Ethernet devices on an Ethernet segment to associate and connect to a wireless infrastructure through an access point. Also known as a wireless client bridge.

Wireless workgroup bridge

Which client device will allow a user to connect several Ethernet devices on a common segment to an access point?

Wireless workgroup bridge

Distance

With hidden node ____________ problems, client device-to-client device RF communication cannot occur, because the client devices are too far apart and not in radio range of each other.

Directional Antenna Tree shaped

Yagi

A semidirectional antenna typically used outdoors for short-range bridging or indoors for long hallways and corridors to provide RF coverage to a specific area.

Yagi antenna

Hybrid coordination function

_____ defines traffic classes and assigns a priority to the information to be transmitted.

C. ERP protection

You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection

C. There is an incorrect WPA passphrase on the client device.

You are a help desk technician providing support for a wireless network. A user calls and complains he cannot access the Internet. The user tells you he has good signal strength, but the network connection states "acquiring network address" and the IP address is all zeros. What could cause this problem? A. The client device has a static IP address. B. The client has an 802.11a network adapter. C. There is an incorrect WPA passphrase on the client device. D. A computer virus has infected the client device.

D. The wireless client device has a corrupt device driver.

You are a network administrator and receive a call from a user stating that she cannot access the wireless LAN. The office contains 50 other users, and nobody else is complaining about the network. What could be a potential problem that would keep this user from connecting to the access point? A. The connection to the Internet has been terminated. B. The access point needs to be upgraded. C. Incorrect firmware was installed on the access point. D. The wireless client device has a corrupt device driver.

Why is it better to configure access points from the wired side of the network?

You are not sending secure information over the internet.

B. The access point for a new tenant in the building is set to the same RF channel.

You provide consulting services for various companies and receive a call from one of your clients that their notebook computers suddenly started experiencing slow data transfers from the wireless LAN. This company is located in a multi-tenant building. What could cause a sudden change in performance for the notebook computers? A. A firmware upgrade was recently performed on the access point. B. The access point for a new tenant in the building is set to the same RF channel. C. The access point shows a low received signal strength. D. Someone activated the diversity antennas on the access point.

B and C

You support a wireless network for an office of five employees. The installation consists of one access point, three notebook computers, and two desktop computers. The access point and computers i the office have wireless adapters that are Wi-Fi WPA 2.0 Certified. You want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment? (choose 2) A. WEP B. WPA 2.0 personal C. WPS D. WMM E. WPA 2.0 enterprise

The user disabled the profile on the device

locate their company-issued smart phone device. The network administrator that was assigned to the trouble ticket is unable to remotely lock the device through the MDM software that is in use at the organization. which of the following would most likely cause this issue

Which are absolute measures of RF power? (Choose two.)

mW and Watt

802.11h-2003

mechanisms for dynamic frequency selection (DFS) and transmit power control (TPC) capability for 802.11 radios to transmit in a new frequency band called U-NII-2 Extended with 11 more channels

Robust Security Network (RSN)

method of establishing authentication, negotiating security associations, and dynamically generating encryption keys for client stations and access points

Improved MIMO and Beamforming

multi-user MIMO (MU-MIMO) technology simplified beamforming method called null data packet (NDP) beamforming

More Spatial Streams

ould be built to transmit and receive up to eight spatial streams

According to the PoE amendments, what is the term for an apparatus that delivers power?

power sourcing equipment (PSE)

According to the PoE amendments, what is the term for an apparatus that receives power?

powered device (PD)

translational bridge

A _______________ is defined as a device used to connect two or more dissimilar types of LANs together, such as wireless (IEEE 802.11) and Ethernet (IEEE 802.3).

At least one

A basic service set (BSS) consists of how many access points?

AP radio

A basic service set identifier (BSSID) is the unique identifying MAC address of the ___________

Control

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

global or isolated

A first step in troubleshooting wireless LAN problems is to identify whether an issue is __________________________ or _________________________ .

B. Add another access point

A wireless client device is showing a low receive signal strength value. What option could improve this situation? A. Upgrade the client device B. Add another access point C. Upgrade firmware on devices D. Eliminate multipath

one or more

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

Mode 1

All devices in _________ must be HT-capable. When a non-HT device—that is, an IEEE 802.11a/b/g access point or wireless client device—is within the hearing range of the HT access point and on the same 20 MHz channel or one of the 20/40 MHz wide channels, this protection mode will be activated.

Mode 2

All devices in _____________ must be HT-capable. The operation of this protection mode is based on the fact that 802.11n devices can use 20 MHz or 20/40 MHz wide channels.

extended service set (ESS)

An ____ is defined as a "set of one or more interconnected basic service sets (BSSs) that appears as a single BSS to the Logical Link Control (LLC) layer at any station (STA) associated with one of those BSSs." It is also a common configuration in most WLAN deployments for small to medium businesses as well as large organizations.

IBSS

An _____ network is also known as an ad hoc or peer-to-peer network. This WLAN operation mode uses no access points and consists of only wireless devices or client computers.

0

An independent basic service set (IBSS) consists of how many access points?

A. Data rate decreases

As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases

target beacon transmission time (TBTT)

By default, beacons for most access points broadcast at about 10 times a second. This value is actually 1024 microseconds and is identified as the _____.

What factors may have a significant affect the throughput of a wireless LAN system?

Distance from the access point

ad hoc, infrastructure

IEEE 802.11 wireless LANs (WLANs) can be configured in one of two operation methods : _________ or ____________ mode.

randomly generated number (with same format as MAC address)

In an ad hoc or IBSS network the BSSID is always a what?

authenticate, associate

In order for a wireless client to become completely part of the basic service set, it must first ________ and then _____________.

protection mechanisms

In order to allow newer, faster WLAN technology such as 802.11n devices to communicate with older wireless devices, technology called _____________were designed to allow for backward compatibility.

SSID, Channel

In order to set up an ad hoc network, a user must know which two parameters? (Name both)

D. Reflection

In wireless networking, multipath is the result of what RF behavior? A. Refraction B. Diffraction C. Absorption D. Reflection

Distribution System (DS)

Infrastructure mode requires at least one access point, but can consist of up to thousands of them. These access points are connected by a common medium known as the ____________.

With hidden node distance, client-device to client-device RF communication cannot occur because the client devices are too far apart and not in radio range of each other. This can be resolved by?

Moving the client devices closer together, Increasing the client transmit power

single channel architecture (SCA).

Roaming within an IEEE 802.11 WLAN is always decided by the client device with the exception of _________________.

wildcard

The IEEE 802.11 standard requires access points to respond to devices that are sending a null or blank SSID. The standard refers to this as a ___________ SSID.

802.11e

The IEEE ___________ amendment to the standard fueled the need for more efficient power save mechanisms in wireless networking.

hardware address

The MAC address is the unique identifier of a network adapter or what is known as the ______________________.

A. Increasing the output power on the access point

The RF signal strength seen by a wireless client device from an IEEE 802.11n access point can be improved by: A. Increasing the output power on the access point B. Enabling load balancing C. Upgrading the ISP service D. Enabling WPA2.0 on both the access point & the client

service set identifier (SSID)

The _____ is the logical name of the service set used to identify the wireless network, and it is used by devices to select a wireless network to join.

Basic Service Set Identifier (BSSID)

The _______ is defined as the unique identifier, Media Access Control (MAC) address of the basic service set. It is important to note that some manufacturers may allow for several of these to be connected to a single access point radio or for a single common one to be shared among many access points.

Basic service area (BSA)

The ______________ is the area of RF coverage or the RF cell that encompasses a wireless access point and its associated stations. A wireless client device will be contained in this area as long as it has enough required receive signal strength to maintain an association state with the wireless access point.

basic service set (BSS)

The ________________ is the foundation of the wireless network. This mode consists of an access point connected to a network infrastructure and its associated wireless devices.

passive scanning active scanning

The discovery phase consists of the ______________ and _____________ processes.

passive scanning

The first part of the discovery phase in IEEE 802.11 wireless networking is known as _______________. This process allows WLAN devices to "listen" for information about wireless networks in the radio receiving area of the wireless network or the BSA.

XX:XX:XX:YY:YY:YY X, Y

The format of a BSSID is ____________where _ is the number assigned to a manufacturer, and _ is the unique hardware address of the device.

You are a network administrator and receive a call from a user stating that she cannot access the wireless LAN. The office contains 50 other users, and nobody else is complaining about the network. What could be a potential problem that would keep this user from connecting to the access point?

The wireless client device has a corrupt device driver.

Extended rate physical (ERP) High-throughput (HT)

There are two broad categories of protection mechanism: ___________________ protection mechanism for IEEE 802.11g networks _________________ protection mechanism for IEEE 802.11n networks.

Open System Authentication

This 802.11 authentication method is defined by the IEEE 802.11 standard as a null authentication algorithm and is a two-step authentication process. Two management frames are exchanged between the device and the access point. For the most part, this authentication method cannot fail unless other security measures are put in place that prevent the device from accessing the network.

Shared-key Authentication

This IEEE 802.11 authentication method is a four-way frame exchange. During this process, four management frames are sent between the wireless device wanting to join the wireless network and the access point.

802.11b-Only Mode

This operation mode disables all the IEEE 802.11g ERP-OFDM data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps and allowing only DSSS data rates of 1 and 2 Mbps and HR/DSSS rates of 5.5 and 11 Mbps.

802.11g-Only Mode

This operation mode is the opposite of 802.11b-only mode. It disables all of the IEEE 802.11b DSSS and HR/DSSS data rates of 1, 2, 5.5, and 11 Mbps, and it allows the IEEE 802.11g ERP-OFDM data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps.

True.

True or False? Management frames never cross the Data Link Layer of the OSI model.

False. After version 8.1 it was disallowed.

True or False? Microsoft Windows operating systems after version 7 no longer allow for an ad hoc network to be created from the graphical user interface. However, there are some command-line settings that can be used to allow wireless ad hoc connections from other devices.

True.

True or False? Shared-key authentication is used for both IEEE 802.11 authentication and data encryption.

Independent

When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set?

SSID RF Channel Security Config

Which three common parameters must be set on all devices belonging to the same IBSS? (Name three.)

Dynamic rate switching

You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

C. Active mode

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode

B. Mistmatched SSID

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association

B. The access point is located at the opposite side of the building from the user's office separated by several walls.

You recently installed an IEEE 802.11g wireless network in a small office. One of the employees is complaining of poor performance and mentioned her notebook computer runs very slowly because of the access point it connects to. What could cause this notebook computer to be performing poorly? A. The new 5.8 GHz cordless telephone in her office is interfering with the IEEE 802.11g wireless LAN. B. The access point is located at the opposite side of the building from the user's office separated by several walls. C. A media access control (MAC) filter is enabled on the notebook computer, causing excessive retries. D. You recently rolled out a new version of the access point's firmware to enable new features that became available.

Dynamic rate switching (DRS) also known as Dynamic rate shifting and dynamic rate selection

____________ is the process which allows an associated wireless device to adapt to the RF signal strength and signal quality in a particular location of the BSA.

Management

______________ frames assist WLAN devices in finding and connecting to a wireless network. This includes advertising the capabilities of the WLAN and allowing connections by the authentication and association process.

Association

________________ takes place after a wireless device has been successfully 802.11 authenticated either by open system authentication or by shared-key authentication. In this state, the authenticated device can pass traffic across the access point to the network infrastructure or other associated wireless devices.

Disassociation

__________________occurs when an association to an access point is terminated. This may occur when the associated WLAN device roams from one BSS to another.

Control

______frames are used to govern access to the wireless medium by allowing devices to reserve the medium and acknowledge data. In addition, some of these frames are used to request data from the access point after returning from a power save state and with IEEE 802.11 protection mechanisms to allow wireless device coexistence.

What is the purpose of the RTS/CTS process?

allows devices to reserve the medium for a specified period of time, enables device to complete a frame exchange and avoid collisions


संबंधित स्टडी सेट्स

CEH Module 17: Hacking Mobile Platform

View Set

Chapter 06 Manufacturing and Service Processes

View Set

Belanger Ch 10 - Networks and Telecommunications

View Set

Section 27: Math Basics for Delaware

View Set

Unit 5 Multiple Choice Questions

View Set