itsp215/itsp216
7. _____ allows for Application layer data communication between two stations using lower layers as a support system. A. Logical addressing B. Physical addressing C. Data encapsulation D. Data encryption E. Point-to-point
C
A self-contained intelligent access point is: A. Controller-based B. Heavyweight C. Autonomous D. Thin
C
CompactFlash (CF) cards are available in two types. What is the main difference between the two types? A. Length B. Width C. Thickness D. Height
C
Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge only mode B. Repeater only mode C. Root access point mode D. Access mode
C
Which client device will allow a user to connect several Ethernet devices on a common segment to an access point? A. PCMCIA B. PCI bridge C. Wireless workgroup bridge D. Ethernet bridge
C
Which WLAN technology can be used to obtain the highest data transfer rate possible?
C - HR-OFDM
802.11a/b/g/n/ac devices use what type of communication?
C - Half Duplex
What technology is used to send WLAN data over a wireless medium using many sub-carrier frequencies?
C - Spread Spectrum
Which 802.11 PHY technology specifies an 80 MHz-wide channel for transmitting and receiving data?
C - VHT-OFDM
At which two layers of the OSI model do wireless LANs operate? (Choose 2.) A. Session B. Network C. Physical D. Application E. Data Link
C, E
A service set identifier (SSID) has a maximum limit of how many characters or octets? A. 8 B. 16 C. 32 D. 128
C. 32
Wireless network cables and devices have impedance (AC resistance) of ____________ ohms. A. 10 B. 25 C. 50 D. 75
C. 50 WLAN cables and devices are rated at 50 ohms impedance. Cable and satellite television is rated at 75 ohms.
WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch
C. 802.11a client devices
You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode
C. Active mode
A self-contained intelligent access point is ____________. A. Controller-managed B. Heavyweight C. Autonomous D. Thin
C. Autonomous
Which can cause a loss of signal strength? (Choose two.) A. Antenna B. Amplifier C. Cable D. Connector E. Transmitter
C. Cable D. Connector Cables and connectors can both result in a loss of signal strength. Antennas and amplifiers will add gain or increase signal strength. A transmitter outputs an absolute amount of power.
You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term? A. Dynamic frequency selection B. Transmit power control C. Dynamic rate switching D. Transmit save mode
C. Dynamic rate switching
You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection
C. ERP protection
Highly directional antennas are typically used for ____________ connectivity. A. Short-range B. Omnidirectional C. Long-range D. Dipole
C. Long-range Highly directional antennas are typically used for long-range point-to-point connectivity, such as bridge links. Omnidirectional antennas are used as part of an access point system or to provide point-to-multipoint links.
A beacon frame advertises information about the wireless network. A beacon frame is what type of frame? A. Data B. Control C. Management D. Detail
C. Management
Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge-only mode B. Repeater-only mode C. Root access point mode D. Access mode
C. Root access point mode
Access points that are used with wireless LAN controllers and not as standalone devices. Usually have limited functionality and require a wireless LAN controller to operate.
Controller-based access points
What is one difference between autonomus access points and controller-based access points?
Controller-based access points associate to a WLA?N controller, but autonomous access points do not
What is one difference between autonomous access points and controller-based access points?
Controller-based access points associate to a WLAN controller, but autonomous access points do not.
Different from autonomous access points, these access points are used with hardware WLAN controllers but not as stand-alone devices.
Controller-managed access points
Access points used to provide a wireless infrastructure without the use of a hardware wireless LAN controller. This technology uses a software management system for configuration, and decisions are at the network edge rather than being tunneled through the network.
Cooperative access points
Data Privacy
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Advanced Encryption Standard (AES) algorithm
11. The term encapsulation means to _____. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload
D
17. Which layer of the OSI model allows physical addresses to be converted to logical addresses? A. Application B. Session C. Transport D. Network E. Data Link
D
9. Which layer of the OSI model provides an interface to the user? A. Physical B. Network C. Transport D. Application E. Data Link F. Presentation
D
Enterprise-grade IEEE 802.11g client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey
D
In addition to wireless networking, which adapter was designed for flash memory storage and can be used in a digital camera? A. PCI B. PCMCIA C. ISA D. SDIO
D
In computer network terminology, the definition of half duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time
D
Of all the devices listed, Secure Digital Input Output (SDIO) cards are most likely to be installed in which? A. Desktop computer B. Access point C. Notebook computer D. Pocket PC
D
Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors? A. Application B. Transport C. Network D. Data Link E. Physical
D
Which wireless adapter may require some disassembly of a notebook computer to install? A. PCI B. PCMCIA C. PC Card D. Mini-PCI
D
You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wireless LAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0
D
Without any regulatory domain taken into consideration, the 2.4 GHz frequency range allows for how many channels using 802.11b/g/n?
D - 14
An HR/DSSS channel is how wide?
D - 22 MHz
OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate pf_________Mbps
D - 54
Stations operating in which two 802.11 amendments are interoperable?
D - 802.11b and 802.11g
Devices compliant with whcih two amendments to the IEEE standard use multiple radio chains and multiple antennas? (Choose two)
D - 802.11n E - 802.11/ac
Bluetooth devices use___________, which can potentially cause interference with WLANs.
D - Frequency-Hopping Spread Spectrum (FHSS)
Which WLAN technology in wireless networking uses the effects of multipath to provide data rates of 600 Mbps in the 2.4 GHz ISM band?
D - MIMO
A protocol used to automatically distribute Internet Protocol (IP) addresses and other TCP/IP information to devices connected to a local area network.
Dynamic Host Configuration Protocol (DHCP)
Given: You are recommending an AP for use in a warehouse environment. Some APs will reuqire diectional antennas and others will use dipole antennas. What feature must be supported by the APs in this installation?
External antennas
What organization is responsible for unlicensed frequency band regulation in the united states?
FCC
Bluetooth devices use ____ which an poentially cause interference with WLANs.
FHSS
True or false, SOHO-grade access points usually have a more extensive feature set than enterprise-grade access points.
False
True or false: A benefit of a wireless LAN controller is distributed administration.
False
True or false: An administrator should always configure an access point from the wireless network.
False
True or false: a benefit of a wireless LAN controller is distributed administration.
False
10. The physical address of a network adapter is the _____. A. MAC address B. Logical address C. Layer 3 address D. Mesh address
A
16. Which protocol is responsible for addressing and routing? A. IP B. TCP C. UDP D. ARP
A
19. Which layer of the OSI model uses physical addresses to deliver data to the destination? A. Physical B. Data Link C. Network D. Transport
A
8. Which topology may use a token passing access method? A. Ring B. Mesh C. Bus D. Star
A
A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the OS C. Hardware to install a PCI card D. Hardware to install a client bridge
A
How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8
A
Six wired clients can connect to a wireless LAN by using which device? A. Workgroup bridge B. PCI bridge C. Mini-PCI adapter D. PCI adapter
A
Which component is required for a successful installation and operation of an 802.11n wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows WZC
A
D
According to the 802.11a amendment, which of the following data rates are mandatory? A. 1, 2, 5.5 and 11 Mbps B. 6, 24, and 54 Mbps C. 6, 9, 12, 18, 24, 36, 48, 54 Mbps D. 6, 12, and 24 Mbps E. 1, 6, 12, and 24 Mbps
Which devices are abbreviated by the initialism STA?
According to the IEEE 802.11 standard all wireless devices, including access points.
A performance condition that occurs when two or more access point radios are providing RF coverage to the same physical area using overlapping frequencies. Simultaneous RF transmissions by two or more of these access point radios in the same physical area can result in corrupted IEEE 802.11 frames due to the frequency overlap. Also called adjacent overlapping channel interference. This definition may vary depending on the source.
Adjacent-channel interference
In wireless LAN technology, the strength or the amount of power of a radio frequency signal.
Amplitude
Two characteristics of RF signals are:
Amplitude Phase
Two characteristics of RF signals are?
Amplitude and Phase
logical
An IP address is a ______ address.
Which two channels could be used so that the access points do not interfere with each other in an 802.11g/n wireless network? (Choose three)
B - Channel 1 and Channel 9 C - Channel 6 and Channel 11 D - Channel 2 and Channel 8
How many access points can be co-located without channel reuse in the same RF area to maximize total system throughput while minimizing RF interference in an 802.11g/n network?
B - Three
Supported by WPA and WPA 2.0, RADIUS utilizes which type of authentication? A) 802.1X/WPA B) 802.1X/EAP C) 802.11X/WPA D) 802.11X/EAP E) 802.11AX/WPA F) 802.11AX/EAP
B) 802.1X/EAP
Enterprise-grade access points commonly include three types of antennas, choose the correct antennas from this list: A) Multi-directional B) Semi-directional C) Omnidirectional D) Mostly directional E) Highly directional F) Half-directional
B) Semi-directional C) Omnidirectional E) Highly directional
A ___ Topology Consist of multiple devices connected by a single shared medium
Bus
A high speed linear topology is defined as a ___?
Bus
After your city implemented a municiapl WIFI network using 802.11g on channels 1, 6, and 11 near your office, your users have been complaining about poor performance on their 802.11b VoWifi phones. The best solution for optimizing your 802.11a/g network to support VoWiFi in this scenario is to _________
Buy new 5 GHz capable VoWiFi phones
2. A high-speed linear topology is defined as a _____? A. Ring B. Mesh C. Bus D. Star
C
Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way? (Choose 2.) A. PCI B. PCMCIA C. USB 2.0 D. PCIe E. Mini-PCI
BC
Wireless bridges must be configured with and . (Choose 2.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy
BC
Which of the following is a benefit of a wireless repeater? (Choose 2.) A. Higher data transfer rate B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput E. Extends cell size
BE
When implementing a wireless LAN, what is the area covered by an AP and usable by a client station called?
Basic Service Area
The two most common modes of WLAN discovery are passive scanning, where a client station listens for _________ frames, and active scanning, where a client sends and receives _________ frames.
Beacon ; Probe
The two most common modes of WLAN discovery are passive scanning, where a client station listens for _______ frames, and active scanning, where a client sends and receives ________ frames.
Beacon; Probe
An operation mode that allows a wireless access point to be set in an operation mode for wireless point-to-point or point-to-multipoint configurations connecting two or more LANs together.
Bridge mode
How many unlicensed UNII-1 band channels are available for wireless LANs?
4
The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage.
48
The 802.3-2005 clause 33 standard specifies ___ VDC as the nominal voltage.
48 VDC
The nominal voltage supplied to Power over Ethernet (PoE) devices and specified in the IEEE 802.3-2005 Clause 33 amendment.
48 VDC
What is the nominal voltage for PoE?
48 volts of DC or VDC
802.11a-1999
5 GHz frequency space Orthogonal Frequency Division Multiplexing (OFDM) less-crowded 5 GHz U-NII bands U-NII-1, U-NII-2, and U-NII-3 band data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
802.11a operates in the _______ GHz frquency ranges and uses the ______- frequency bands.
5, UNII
Stations operating in which two IEEE 802.11 amendments are interoperable?
802.11b and 802.11g
A, C, D
802.11b is capable of which of the following data rates? (choose 3) A. 1 Mbps B. 6 Mbps C. 5.5 Mbps D. 11 Mbps E. 12 Mbps
A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity
A
Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint
A
HR/DSSS devices operate in which frequency range?
A - 2.400 GHz ISM
DSSS uses which spreading code in 1 Mbps?
A - Barker
Six wired clients can connect to a wireless LAN by using which device?
A workgroup bridge
Which items describe a service set identifier (SSID)? (Choose two.) A. 32 characters maximum B. 64 characters maximum C. Is case sensitive D. Is not case sensitive
A. 32 characters maximum C. Is case sensitive
A service set identifier (SSID) has a maximum limit of how many characters or octets?
A. 8 B. 16 ~C. 32~ D. 128
A basic service set identifier (BSSID) is the unique identifying MAC address of the ____________. A. AP radio B. AP Ethernet port C. Router D. Client
A. AP radio
View the figures and correctly identify the antenna types illustrated in the figures.
Figure 1: Parabolic Dish Figure 2: Grid
A spread-spectrum technology used in IEEE 802.11b and IEEE 802.11b/g with data rates of 5.5 and 11 Mbps set on a specific radio frequency channel.
High rate/direct-sequence spread spectrum (HR/DSSS)
802.11b-1999
High-Rate DSSS (HR-DSSS) 2.4 GHz to 2.4835 GHz ISM band Complementary Code Keying (CCK) Barker code data rates of 1, 2, 5.5, and 11 Mbps
What is an accurate description of peer communication
Horizontal link and Logical Link
Operating system feature that allows for replacement of computer system components and devices without powering down the system.
Hot-plug
In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?
How will PoE be supplied to WiFi client devices?
Given: Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?
IBSS
Given: Several users are required to transfer files among themselves in a conference room. No APs are availbale for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?
IBSS
Manufacturers design hardware used for wireless LANs based on a common set of criteria or rules known as standards. The name of the organization responsible for creating 802.11 WLAN standards is what?
IEEE
The Institute of Electrical and Electronics Engineers, a nonprofit organization responsible for generating a variety of technology standards, including those related to information technology.
IEEE
Which of the following organizations are responsible for standards compliance?
IEEE
Which organization is responsible for creating standards for wireless computer networking?
IEEE
802.11 b/g/n
IEEE 802.11 iterations that support amendment b
802.11 , 802.11b, 802.11g, 802.11n
IEEE 802.11 iterations that use the 2.4 GHz ISM band.
802.11a, 802.11n
IEEE 802.11 iterations that use the 5 GHz UNII bands
Which communication amendments are commonly supported by consumer and SOHO-grade access points?
IEEE 802.11b IEEE 802.11g IEEE 802.11n IEEE 802.11ac
2.4-2.5 GHz
IEEE 802.11g WLANs operate in what frequency range?
A
IEEE 802.11n devices use an enhanced radio technology known as multiple-input multiple-output (MIMO). Which statement correctly describes a benefit of MIMO? A. MIMO uses reflections to allow for increased throughput. B. MIMO rejects reflections to allow for increased throughput. C. MIMO uses a single radio with diversity technology for increased throughput. D. MIMO rejects data rates less than 54 Mbps for increased throughput.
Authentication
IEEE 802.1X authorization framework - Extensible Authentication Protocol (EAP) preshared keys (PSKs)
SOHO-grade access points also provide more advanced security features, such as user-based authentication ___________________ and _____________________.
IEEE 802.1X/EAP VPN pass-through
An amendment to the Ethernet standard for Power over Ethernet (PoE) that addresses supplying both data and DC power over a single Ethernet cable. It allows for a maximum of 15.4 watts of power at the port and is also known as IEEE 802.3-2005 Clause 33.
IEEE 802.3af
IEEE Std 802.11-2007
IEEE consolidated 8 rati! ed amendments along with the original standard IEEE Std 802 .11-1999 (R 20 03) IEEE Std 802 .11a-1999 IEEE Std 802 .11b-1999 IEEE Std 802 .11d-20 01 IEEE Std 802 .11g-20 03 IEEE Std 802 .11h-20 03 IEEE Std 802 .11i-20 04 IEEE Std 802 .11j-20 04 IEEE Std 802 .11e-20 05
Who manages the RF spectrum Globally
IRU-R(International Telecommunication Union-Radiocommunication)
Radio bands that are reserved internationally for the use of radio frequency for industrial, scientific, and medical (ISM) purposes.
ISM
What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?
In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other
What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?
In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other.
A
In the 802.11a amendment, the UNII-3 band can be used for which of the following WLAN applications? A. Indoor and outdoor B. Outdoor only C. Indoor only D. The UNII-3 band cannot be used for WLANs.
In the 802.11i amendment the UNII-3 band can be used for which of the following WLAN applications?
Indoor and Outdoor
An architecture, developed by IBM, which allowed for expansion cards in early models of personal computers.
Industry Standard Architecture (ISA)
802.11s-2011
Access points can therefore act as portal devices to a wireless distribution system (WDS) proposes the use of a protocol for adaptive, autoconfiguring systems that support broadcast, multicast, and unicast traffic over a multihop mesh WDS
How does the book define a consumer-grade access point?
Access points that are usually equipped with an Internet port, several ports for Ethernet connections, and a wireless access point.
Which of the following is correct regarding 802.11e?
Addresses wireless quality of service
Data Link
At which layer of the OSI model are bits compiled into frames?
20. Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF
B
Power sourcing equipment delivers which of the following? A. RF power to the access point B. DC power to the end device C. RF power to an antenna D. DC power to an antenna
B
Radio frequency channels that do not occupy the same part of the radio spectrum. In IEEE 802.11 wireless networking, there must be a separation of five channels or 25 MHz to be considered nonoverlapping.
Nonoverlapping channels
The Capacity of an access point is dependent upon which two factors?
Number of Users Software Applications
The process in which a WLAN client connection moves from one access point to another is called ____________. A. Reauthentication B. Roaming C. Rebuilding D. Roving
B. Roaming
DSSS uses which spreading code at 1mbps
Barker
application, presentation, session, transport, network, data link, physical
OSI levels
Which item has an effect on RF line of sight?
Obstacles
Tube shaped Antenna forms what type of direction of connection?
Omnidirectional
What level of the OSI model Consist of bit level data streams and Computer network Hardware connecting the devices together
Physical Layer
A change in radio frequency power is a relative measure. Examples include loss of RF power due to a cable (dB) and passive gain of an antenna (dBi).
Relative measure of power
TCP is
Reliable
This advanced security feature allows for small- to medium-sized businesses to provide their own advanced authentication features without the need of an external server.
Remote Authentication Dial-In User Service (RADIUS)
An operation mode that allows a wireless access point to be set in an operation mode to extend the wireless RF cell for wireless client devices not within hearing range of a wireless access point.
Repeater mode
Which topology may use a token passing access method?
Ring
ABC Company is comprised of four departments: sales, marketing engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _____________
Role Based Access Control (RBAC)
The default operation mode for enterprise-grade access points.
Root Access Point Mode
This operation mode involves connecting the access point to a distribution system.
Root Access Point Mode
The default mode of most access points; it allows wireless LAN client devices to connect to a wireless network and use computer network resources.
Root access point mode
Which access point mode involves connecting the access point to a distribution system for user access to the LAN?
Root access point mode
Which access point mode involves connecting the access point to a distribution system for user access to the LAN
Root access point mode
Unlicensed National Information Infrastructure (U-NII) is a radio frequency range used by IEEE-802.11a/n devices and for point-to-point or point-to-multipoint connections. The UNII band consists of a lower, middle, and upper band with four frequency ranges and is used for IEEE wireless LANs.
UNII
Physical addresses on a network device are responsible for which of the following?
To identify which device should receive the information
5.725-5.825 GHz
UNII-3 frequency band
ring topology
Topolgy still widely used by ISPs for high-speed, resilient backhaul connections over fiber-optic links
You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter. Which card would work best in this case? A. PCI B. Half Mini-PCIe C. PCMCIA D. ISA
C
Which frequency range are used in an 802.11a compliant WLAN? (Choose two)
C - 5.25 GHz UNII range D - 5.35 GHz UNII range
The layout or physical design and interconnection of a computer network. A topology includes the cabling and devices that are part of the network.
Topology
What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology
WMAN
What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology?
WMAN
Which two channels could be used so that the access points do not interfere with each other in an 802.11b wireless network?
Channel 2, 3, 6, 8, 9, and 11
Neighbor Reports
gives client stations the ability to learn from access points or W LAN controllers about other access points where the client stations might potentially roam
802.11n-2009
greater throughput - High Throughput (HT) use multiple-input, multiple-output (MIMO)
True or false, PoE spends AC voltage and computer data over the same Ethernet cable, enabling a device to receive AC power and computer data simultaneously.
False, DC power
True or false, In a full mesh network all nodes connection together with one path for every node.
False, full mesh needs at least two paths for every node.
15. Which protocol is used to guarantee delivery? A. UDP B. IP C. ARP D. TCP E. HTTP
D
10BaseT and 100BaseT implementations use ______ pair(s) of wire(s) to carry data.
two
Half-duplex is defined as a ______-way communication that occurs in _______ direction at a time.
two one
Without any regulatory domain taken into consideration
the 2.4 ghz frequency range allows for how many channels using 802.11b? ,14
802.11p-2010
upport Intelligent Transportation Systems (ITS) applications Wireless Access in Vehicular Environments (WAVE)
Channel Statistics
use this information for channel management decisions
Replacing an antenna on a wireless access point will also change the __________ and ________________ beamwidths
vertical horizontal
What allow a variety of wireless devices access to any network resources that the device or user may have permissions for.
wireless access points
What allows a variety of wireless client devices to access any network resources that the device or user may have permissions for?
wireless access points
This device can be used to extend a corporate network to a remote location through a secure connection using a WAN or the Internet.
wireless branch router or remote access point, the book uses both terms
802.11d-2001
written for compliance with the regulatory domains Country code informatio - beacons and probe responses
An independent basic service set (IBSS) consists of how many access points?
~A. 0~ B. 1 C. 2 D. 4
Which items describe a service set identifier (SSID)? (Choose two)
~A. 32 character maximum~ B. 64 character maximum ~C. Is case sensitive~ D. Is not case sensitive
A basic service set identifier (BSSID) is the unique identifying MAC address of the ________.
~A. AP radio~ B. AP Ethernet port C. Router D. Client
The IEEE 802.11 association process happens after which phase?
~A. Authentication~ B. Distribution C. Deauthentication D. Re-authentication
As a device moves away from an access point, which of the following is true regarding dynamic rate switching?
~A. Data rate decreases~ B. Output power decreases C. Data rate increases D. Output power increases
According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?
~A. One ore more~ B. Two or more C. Three or more D. Four or more
In order to set up an ad hoc network, a user must know which two parameters? (choose two)
~A. SSID~ B. BSSID ~C. Channel~ D. Mac address E. Protection Mode
True or false, Centralized data forwarding reduces the amount of infrastructure traffic because the controller-managed access point is able to make more decisions, taking some of the load away from the wireless controller.
False, this describes distributed data forwarding
A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the operating system C. Hardware to install a PCI card D. Hardware to install a client bridge
A. Software to control a wireless NIC
An actual power measurement, not a ratio or a relative value; examples include watt (W), milliwatt (mW), and decibel relative to one milliwatt (dBm).
Absolute measure of power
Occurs when material absorbs an RF signal. None of the signal penetrates through the material.
Absorption
True or false, consumer-grade access points are typically equipped with NAT, DHCP, DNS services, and wireless repeater functionality.
False, wireless repeater functionality is typically not a feature of consumer-grade access points.
IEEE 802.11a uses which PHY technology
OFDM
In what type of WiFi deployment is an antenna mounted using a pole mounting kit, as shown in the exhibit?
Outdoor Bridging
What Layer of the OSI model is responsible for organizing the bit level data for communication of devices on a network and detecting and correcting physical level errors
Data Link
What layer of the OSI reference model is responsible for data framing for a given physical layer technology?
Data Link
Circuitry that carries data between components such as the CPU, memory, and expansion boards or slots within a computer.
Data bus
Which component is required for a successful installation and operation of an 902.11n wireless USB adapter?
Device Driver
Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN
Device Driver
True or False: An administrator should always configure an access point from the wireless network.
False
SOHO access pints are typically configured by using ___ and ___
HTTP/HTTPS
IEEE 802.11a/b/g/n devices use what type of communication?
Half Duplex
Identify the two configuration methods for access points.
GUI CLI
Which protocol is responsible for addressing and routing?
IP
Industrial, Scientific, Medical
ISM
At which of the following layers of the OSI model does WLAN function?
Layer 1 and Layer 2
Which Layer of the OSI model do wireless Ethernet repeaters function?
Layer 2
Which layer of the OSI model is responsible for delivering data to a unique hardware address?
Layer 2
If a user with a wireless client device moves from one radio cell to another and maintains connectivity, ___________ occurs.
Layer 2 transition (roaming)
Layer 3 (Network)
Layer where the IP protocol resides
Sixth layer of the OSI Model
Presentation
LAN
Local Area Network
The IP address of a network adapter is also known as which address.
Logical Address
The IP address of a network card is known as what address
Logical Address
The physical address of a network adapter is the
MAC address
MAN
Metropolitan Area Network
security
The 802.11i amendment to the standard addresses which technology?
Select the statement that correctly describes the Wi-Fi Alliance's primary role in the WLAN industry.
The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.
Device that prepares information to be sent across the air in the form of radio frequency.
Transmitter
What two devices use RF to communicate?
Transmitter Receiver
Fourth layer of the OSI Model
Transport
True or false, It is common for SOHO-grade access points to be able to act as DHCP servers.
True
Logical Link Control (LLC) and Media Access Control (MAC)
Two sublayers of Data Link Layer:
How many access points can be co-located without channel reuse in the same radio frequency area to maximize wtotal system throughput while minimizing RF interference in a n IEEE 802.11g network?
Three
Point to Multipoint links consist of ___ or more connections
Three
5.15-5.25 GHz
UNII-1 frequency band
5.25-5.35 GHz
UNII-2 frequency band
What allows an administrator the ability to separate physical ports into logical networks?
VLAN technology
Which of the following statements is true regarding a wireless LAN controller?
VLANS seperate the network
Identify the strongest passphrase-based secuirty mechanism for 802.11 wireless networks.
WPA2-Personal
In December 2011, a security flaw was reported with _______
WPS
FCC
What organization is responsible for unlicensed frequency band regulation in the United States?
Physical Layer
Which layer of the OSI model uses physical addresses to deliver data to the destination?
B
Which of the following best describes the Wi-Fi Alliance? A. US-based standards organization B. Interoperability testing organization C. Works with the FCC to verify compliance D. Local regulatory body for Europe
D
Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification? A. Security/encryption B. Fast transition C. Management frame protection D. Quality of Service
What is used as a relative measurement of signal strength at the receiving client on an 802.11 wireless LAN?
RSSI
Radio frequency signals from sources other than the transmitter and receiver that are in communication with each other.
Radio frequency noise
The distance that a radio frequency will travel, which is based on the wavelength. The higher the frequency is the shorter the wavelength will be and the result will be shorter range.
Range
The measurable amount of radio frequency signal usable by a receiver.
Receive sensitivity
Ring topolgy
Which topology may use a token passing access method?
A self-forming, self-healing, intelligent network used to route data frames between access points or "nodes" with one or more of the access points connected to a network infrastructure.
Wireless mesh networking
A wireless network management system (WNMS) is a software-based, hardware-based, or cloud-based solution that allows for centralized management and control of a wireless network and may allow work with wired networks.
Wireless network management system
Point-to-multipoint
_________ WANs are often called "clouds".
Encapsulation
__________ allows for Application layer data communication between two stations using lower layers as a support system.
Cloud-managed access points are able to function on their own should connectivity with the controller be temporarily lost, the description of this technology includes the term:
adaptive access point
The term encapsulation means to
add later header and trailer information to a payload
Which are relative measures of RF power? (Choose two.)
dBi and dB
Which of the following formulas can be used to derive dBi values from dBd values?
dBi=dBd+2.14
A decibel referenced to one milliwatt (mW), and an absolute measure of radio frequency power.
dBm
Hybrid Wireless Mesh Protocol (HWMP)
default path selection metric
802.11ad-2012
defines Very High Throughput (VHT) enhancements Galois/Counter Mode Protocol (GCMP)
802.11v-2011
defines methods of retrieving information from client stations Wireless Network Management (WNM)
802.11aq
delivery of network service information prior to the association of stations on an 802.11 network allow advertisement of services to stations prior to the stations' actual association to the network
When RF passes or bends around an obstacle such as a building or column, the behavior is:
diffraction
If one connects access points that are not directly plugged into a port on the WLAN controller, they are using a feature known as ______________________
distributed access point connectivity
802.11i-2004
encryption protection from modification identity verification
Identify the two ways that power sourcing equipment deliver power to the device.
endpoint injector midspan injector
802.11z-2010
establish and standardize a Direct Link Setup (DLS) mechanism
Wireless Network Management (WNM)
exchange location information, provide support for the multiple BSSID capability, and offer a new WNM-Sleep mode
True or false: A benefit of a wireless LAN controller is distributed administration.
false
True or false: An administrator should always configure an access point from the wireless network.
false
802.11ai
fast initial link setup (FILS) secure link setup in less than 100 ms
Controller-managed access points are centrally managed from the _____________ _______________ ______________.
hardware WLAN controller
As seen in a two-dimensional (X/Y) view, the amplitude of an RF signal is:
height
802.11k-2008
radio resource measurement (RRM) Transmit Power Control (TPC) Client Statistics Channel Statistics Neighbor Reports
Transmit Power Control (TPC)
reduce interference
When an RF signal bounces off a smooth nonabsorptive surface, the behavior is:
reflection
dBi is a(n) ___________ measurement of gain introduced by ___________?
relative; an antenna
OFDM
IEEE 802.11a uses which PHY technology?
Static output transmit power of a SOHO access point is typically:
15 dbm
A self contained Intelligent access point is
Autonomous
The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage. A. 32 B. 57 C. 48 D. 12
C
Which of the following is not an advantage of an IBSS network?
Easy to secure
The data layer of the OSI model is divided into which two sublayers
LLC/MAC
WAN
Wide Area Network
physical and data link
At which two layers of the OSI model do wireless LANs operate?
Which of the following channels are considered non-overlapping in the 2.4 GHz band?
1 and 6
Which two channels are considered nonoverlapping in the 2.4 GHz band?
1 and 6
Which two channels are considered non-overlapping in the 2.4 GHz band
1, 6
How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band
11
How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band?
11
What is the maximum data rate of HR/DSSS 802.11b devices?
11mbps
How many channels are available for wireless LAN use in the unlicensed 2.4 GHz ISM band?
14
How many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
What is the typical RF transmit power of a SOHO-grade access point?
15 dBm or 32 mW
What is a valid logical IP address?
192.168.200.1
what is a valid IP address
192.168.200.1
802.11b capable of which of the following data rates?
1Mbps, 5.5Mbps, 11Mbps
FHSS uses which communication method to exchange data?
1mhz-wide subcarriers
Which IEEE standard does PoE fall under?
802.3 Ethernet
Formerly IEEE 802.3af, an amendment to the Ethernet standard for Power over Ethernet (PoE). Addresses supplying both data and DC power over a single Ethernet cable.
802.3-2005 Clause 33
How many data bits does serial communication transmit at a time?
1
What is the relationship between Decibel Relative to a Milliwatt (dBm) and milliwatt (mW)?
0 dBm = 1 mW
802.11e-2005
2 MAC methods needed to meet the QoS requirements for time-sensitive applications over IEEE 802.11 WLANs
Wi-Fi certified network devices can operate in what frequency band(s)?
2.4 GHz and 5 GHz
WiFi certified network devices can operate in what frequency band(s)?
2.4 GHz and 5 GHz
HR/DSSS devices operate in which frequencyt rane?
2.4 ghz ISM
IEEE 802.11g WLANs operate in what frequency range?
2.4-2.5ghz
IEEE 802.11g wireless networks can operate in which unlicensed RF band?
2.400-2.500 GHz ISM
an 802.11b channel is how wide in MHz
22 MHz
An 802.11b channel is how wide in MHz?
22MHz
An HR/DSSS channel is how wide?
22mhz
In the 2.4 GHz range, what distance between the center frequencies (in megahertz) is required for two channels to be considered nonoverlapping for HR/DSSS?
25 MHz
In the 2.4 GHz range, what distance between the center frequencies is required to be considered non-overlapping for HR/DSSS?
25 MHz
New Modulation
256-QAM modulation 30 percent increase in speed
How many nonoverlapping channels are available in the unlicensed 2.4 GHz ISM band?
3
Static output Transmit power of a SOHO access point is typically
32 dbm
802.11y-2008
3650 MHz-3700 MHz licensed band in the United States requires content-based protocol (CBP) dynamic STA enablement (DSE) procedures
How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4
802.11a operates in the __________ GHz frequency range and uses the ___________ frequency bands.
5, UNII
Which frequency randes are used in an IEEE 802.11a-compliant wireless LAN?
5.25 ghz UNII range 5.35 ghz UNII range
A wireless repeater can reduce the data throughput by up to _____ percent.
50
OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate of ___ mbps.
54
According to 802.11a amendment which of the following data rates are mandatory
6, 12, and 24 mbps
Wired Equivalent Privacy (WEP)
64-bit static encryption
802.11g is backward-compatible with which of the following IEEE wireless LAN standards?
802.11 DSSS 802.11b HR/DSSS
Which IEEE 802.11 standard and which wireless access point grade can support Wi-Fi multimedia certifications and QoS?
802.11e Enterprise-grade
You are hired by ABC Company to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ______ or ______ amendments to the 802.11 standard. (Choose 2)
802.11g 802.11n
DSSS and HR/DSSS
802.11g is backward-compatible with which IEEE wireless LAN standards? (choose 2)
You are hired by ABC Comapny to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ________ or ________ amendments to the 802.11 standard.
802.11g, 802.11n
Ratified in 2005, which IEEE 802.11 amendment covers security?
802.11i
WPA was developed as an interim solution for which amendment to the 802.11 standard?
802.11i
Devices compiant with which amendment to the IEEE standard use multiple radio chains and multiple antennas
802.11n
The IEEE ________ amendment specifies fast transition (FT) and the IEEE ________ amendment helps with this functionality.
802.11r 802.11k
Which IEEE 802.11 standard and which wireless access point grade can support fast BSS transition (FT)?
802.11r Enterprise-grade
The IEEE ___________ amendment to the IEEE 802.11 standard included wireless mesh networking in 2011.
802.11s
Which IEEE 802.11 standard and which wireless access point grade can support security management frames?
802.11w Enterprise-grade
This IEEE standard defines VLANs.
802.1Q
Which network access method attempts to avoid collision?
A - CSMA/CA
FM radio stations use what type of RF communication?
A - High power, narrow bandwidth
physical
A MAC address is a unique identifier of each device on the computer network and is known as the _____ address.
dynamic frequency selection (DFS)
A P will allow client stations to associate based on the supported channel AP can quiet a channel to test for the presence of radar AP may test a channel for the presence of radar before using the channel AP can detect radar on the current channel and other channels AP can cease operations af ter radar detection to avoid interference interference is detected, the AP may choose a different channel to transmit
Bus
A high-speed linear topology is defined as a ______.
A method used in the design of wireless networks so that overlapping cells are on different or nonoverlapping channels and minimize interference.
Channel planning
Which IEEE ratified amendments were defined in 2012? Choose two. A) 802.3af B) 802.11.af C) 802.11at D) 802.3at E) 802.1at F) 802.1af
A) 802.3af D) 802.3at Note, it is also called PoE+
12. Which of the following is an accurate description of peer communication (Choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network
A,C
An independent basic service set (IBSS) consists of how many access points? A. 0 B. 1 C. 2 D. 4
A. 0
How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8
A. 1
Powered amplifiers provide an increase in signal strength by using ____________ gain. A. Active B. Passive C. Positive D. Maximum
A. Active Active gain requires an external power source to provide an increase in signal strength. An amplifier is an example of a device that uses active gain. Antennas provide an increase in strength by using passive gain.
When an IEEE 802.11g wireless LAN consists only of wireless client stations, the network is operating as what type of basic service set?
A. Active ~B. Independent~ C. Passive D. Infrastructure
Wireless LAN devices in an 802.11a peer-to-peer network will connect to which device(s)?
A. An access point B. 802.11g client devices ~C. 802.11a client devices~ D. A wireless switch
In order for a wireless client to become completely part of the basic service set, it must first _______ and then ______
A. Associate, authenticate ~B. Authenticate, associate~ C. Deauthenticate, authenticate D. Disassociate, authenticate
You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?
A. Association B. Authentication ~C. ERP protection~ D. HT protection
The IEEE 802.11 association process happens after which phase? A. Authentication B. Distribution C. Deauthentication D. Reauthentication
A. Authentication
WLAN controllers may contain which of the following features? (Choose three.) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing
A. Centralized administration B. Captive portal D. Built-in RADIUS services
A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
A. Data B. Control ~C. Management~ D. Detail
As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases
A. Data rate decreases
Which component is required for a successful installation and operation of an 802.11ac wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows AutoConfig
A. Device driver
You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?
A. Different RF channel ~B. Mismatched SSID~ C. Different BSSID D. Mismatches association
A controller-managed access point connected to a port on the WLAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity
A. Direct connectivity
You are a sales engineer connected to an IEEE 802.11a access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?
A. Dynamic frequency selection B. Transmit power control ~C. Dynamic rate switching~ D. Transmit Save Mode
Access points work at which layers of the OSI model? (Choose two.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
A. Layer 1 B. Layer 2
Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint
A. Midspan
An IEEE 802.11g access point requires a minimum of how many antennas to move data? A. One B. Two C. Four D. Six
A. One 802.11g access points require only one antenna to function. Systems that support antenna diversity will require two antennas to correctly operate.
The open system authentication process uses how many frames?
A. One ~B. Two~ C. Three D. Four
According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets? A. One or more B. Two or more C. Three or more D. Four or more
A. One or more
Horizontal beamwidth is ____________ to the earth's surface. A. Parallel B. Perpendicular C. Positive D. Negative
A. Parallel Horizontal beamwidth is parallel to the earth's surface. This is based on how the E-field propagates away from the antenna element. Vertical beamwidth is perpendicular to the earth's surface.
RF line of sight is required for which type of IEEE 802.11 WLAN installation? (Choose two.) A. Point-to-point B. Scattered C. Point-to-multipoint D. Reflected E. Refracted
A. Point-to-point C. Point-to-multipoint Point-to-point and point-to-multipoint both require RF line of sight to be able to effectively communicate. Scattering, reflection, and refraction are all behaviors of RF.
You are a network engineer troubleshooting a WLAN weak signal complaint. While moving a handheld WLAN device, you notice that the signal strength increases when the device is moved from a horizontal to a vertical position. This is because the ____________is changing. A. Polarization B. Wavelength C. Frequency D. Diffusion
A. Polarization Changing the orientation of a device or antenna will change the polarization and affect the received signal strength. The signal strength may either increase or decrease depending on how the polarization is changed from the original position. Wavelength, frequency, and phase are characteristics of RF.
When a wireless LAN device listens for beacon frames, it is participating in which phase?
A. Power save B. Passive Scanning C. Active scanning ~D. Authentication~
You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager, who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?
A. Power save mode D. Association Mode ~C. Active mode~ D. Passive mode
The process in which a wireless LAN client connection moves from one access point to another is called _________.
A. Re-authentication ~B. Roaming~ C. Rebuilding D. Roving
In order to set up an ad hoc network, a user must know which two parameters? (Choose two.) A. SSID B. BSSID C. Channel D. MAC address E. Protection mode
A. SSID C. Channel
A patch antenna is an example of which type of antenna? A. Semidirectional B. Omnidirectional C. Highly directional D. Dipole-directional
A. Semidirectional A patch antenna provides semidirectional coverage. The amount of coverage depends on the design and gain of the antenna. Parabolic dishes are highly directional.
Enterprise access points may contain which of the following features? (Choose three.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment
A. WPA 2.0 support B. RADIUS server D. Repeater mode
A basic service set (BSS) consists of how many access points?
A. Zero ~B. At least one~ C. At least two D. At least four
Access points work at which layers of the OSI model? (Choose 2.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
AB
Which of the following are midspan PoE devices? (Choose 2.) A. Single-port injectors B. Multiport injectors C. Endpoint injectors D. Endspan injectors
AB
Enterprise access points may contain which of the following features? (Choose 3.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment
ABD
Wireless LAN controllers may contain which of the following features? (Choose 3) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing
ABD
SOHO access points are typically configured by using and _____. (Choose 2.) A. HTTP B. FTP C. HTTPS D. CLI E. SMTP
AC
SOHO access points commonly support which of the following features? (Choose 3.) A. WPA 2.0 support B. CLI configuration C. Static output power D. Wi-Fi certifications
ACD
Which one of the following adjustments can most benefit a high density environment?
APs with lower output power
What symptom would indicate the presence of a hidden node in a WiFi network?
An increase in retransmisions
Which explanations of antenna usage are the most accurate?
An omni-directional antenna is well suited to provide wireless coverage in most homes A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions
Which explanations of antenna usage are the most accurate?
An omni-directional antenna is well-suited to provide wireless coverage in most homes. A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions.
Seventh layer of the OSI Model
Application
Which layer of the OSI model provides an interface to the user?
Application
Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN. What is this process of identity validation called?
Authentication
Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN?
Authentication
A self-contained intelligent access point is:
Autonomous
A self-contained intelligent access point that can function as an independent wireless network device.
Autonomous access point
A self-contained unit with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the devices have permission to use.
Autonomous access point
As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing _______ access points, and they could consider ________ to ease the management burden.
Autonomous; a WLAN controller-based architecture
As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing __________ access points, and they could consider _____________ to ease the management burden.
Autonomous; a WLAN controller-based architecture
13. Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network
B
14. At which layer of the OSI model are bits compiled into frames? A. Physical B. Data Link C. Network D. Transport E. Application
B
18. The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP
B
3. The lower three layers of the OSI model are _____, _____, and _____. A. Data link, Physical, Transport B. Physical, Data Link, Network C. Session, Physical, Application D. Application, Presentation, Session
B
A _____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation? A. Notebook B. Desktop C. Tablet D. Barcode scanner
B
A wireless workgroup bridge will allow you to do which of the following? A. Connect two wireless LAN NICs together. B. Connect a wired LAN to an AP. C. Connect a PCI card to a WLAN. D. Connect two client bridges.
B
Most manufacturers recommend installing a wireless IEEE 802.11n USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process
B
Static output transmit power of a SOHO access point is typically: A. 32 dBm B. 15 dBm C. 23 mW D. 15 mW
B
The IP address of a network adapter is also known as which address? A. MAC address B. Logical address C. Layer 4 address
B
USB was designed as a replacement for which two legacy communication connections? A. Serial and PCI B. Serial and parallel C. Parallel and ISA D. Parallel and EISA
B
Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility
B
Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN? A. Mini-PCI card B. Device driver C. Third-party utility D. Enterprise utility
B
Which layer of the OSI model is responsible for addressing and routing? A. Physical B. Network C. Transport D. Application
B
Which layer of the OSI model is responsible for delivering data to a unique hardware address? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
B
Which of the following statements is true regarding a wireless LAN controller? A. Virtual local area networks (VLANs) involve physical separation of ports. B. Virtual local area networks (VLANs) involve a logical separation of ports. C. Virtual local area network (VLAN) is another name for a repeater. D. Virtual local area networks (VLANs) require Power over Ethernet (PoE).
B
You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 2.0 C. Half Mini-PCIe D. PCMCIA
B
What is the maximum data rate of HR/DSSS 802.11b device?
B - 11 Mbps
OFDM uses which communication channel width to exchange data?
B - 20 MHz-wide channel
Which of these statements is true? Choose two. A) All SOHO-grade access points have adjustable RF output power B) Some SOHO-grade access points have adjustable RF output power C) Some consumer-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power E) All consumer-grade access points have adjustable RF output power
B) Some SOHO-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power
Operational Modes of an 802.11g
B-Only Mode - ata rates of 11, 5.5, 2, and 1 Mbps support for DSSS, HR-DSSS, and ERP-DSSS/CCK technology G-Only Mode - data rates of 6-54 Mbps ERP-DSSS/CCK, HR-DSSS, and DSSS is disabled B/G Mode - throughput from 20 Mbps down to as little as 8 Mbps both ERP-DSSS/CCK and ERP-OFDM is enabled
The curvature of the earth will have an impact on the WLAN signal after how many miles? A. 2 B. 7 C. 10 D. 25
B. 7 The curvature of the earth or earth bulge will have an impact on a WLAN signal after seven miles. If the signal needs to travel farther than seven miles, the antenna will have to be installed in a higher location.
802.11a access points support which antenna technology to help reduce the effects of multipath? A. Adjustable gain B. Antenna diversity C. Adjustable polarization D. Antenna multiplexing
B. Antenna diversity 802.11a access points can use antenna diversity. Gain and polarization are considered RF concepts.
A basic service set (BSS) consists of how many access points? A. Zero B. At least one C. At least two D. At least four
B. At least one
In order for a wireless client to become completely part of the basic service set, it must first ____________ and ____________ then. A. Associate, authenticate B. Authenticate, associate C. Deauthenticate, authenticate D. Disassociate, authenticate
B. Authenticate, associate
A wireless workgroup bridge will allow you to do which of the following? A. Connect two WLAN NICs together B. Connect a wired LAN to an access point C. Connect a PCI card to a WLAN D. Connect two client bridges
B. Connect a wired LAN to an access point
Which is required in order to successfully install an IEEE 802.11ac WLAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility
B. Device driver
An azimuth chart shows which RF radiation pattern? A. Vertical B. Horizontal C. Positive D. Negative
B. Horizontal The horizontal RF radiation pattern of an antenna is displayed using an azimuth chart. The vertical radiation pattern is displayed using an elevation chart.
When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set? A. Active B. Independent C. Passive D. Infrastructure
B. Independent
Which of the following are benefits of a wireless repeater? (Choose two.) A. Higher data transfer rate. B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput. E. Extends cell size.
B. Larger cell size allows more devices to access the medium. E. Extends cell size.
What device is used to shunt transient current to ground in the event of an indirect lightning strike? A. Lightning striker B. Lightning arrestor C. Lightning prevention D. Lightning breaker
B. Lightning arrestor A lightning arrestor is used to protect a WLAN system from an indirect lightning strike. A lightning arrestor will direct transient or induced electrical current to earth ground as a result of a lightning strike.
You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association
B. Mismatched SSID
Antennas provide an increase in RF coverage by using ____________ gain. A. Active B. Passive C. Positive D. Maximum
B. Passive Antennas provide an increase in RF coverage by means of passive gain. Passive gain occurs when isotropic RF energy is focused into a specific radiation pattern. Active gain requires the use of an external power source.
When a WLAN device listens for beacon frames, it is participating in which phase? A. Power save B. Passive scanning C. Active scanning D. Authentication
B. Passive scanning
Wireless bridges must be configured with ____________and____________. (Choose two.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy
B. The same SSID C. The same RF channel
The open system authentication process uses how many frames? A. One B. Two C. Three D. Four
B. Two
IEEE 802.11a/b/g access points require ____________ antennas on each radio for diversity functionality. A. One B. Two C. Three D. Six
B. Two An IEEE 802.11a or IEEE 802.11b/g access point will require two antennas for diversity. Although there are two antennas, a single input/single output access point will have only one radio. The access point provides additional intelligence to determine which antenna to use. Other WLAN technologies, such as IEEE 802.11ac MIMO, may use multiple antennas.
Which WLAN adapter can be installed in a computer without the need to disassemble the computer in any way? A. PCI B. USB 3.0 C. PCIe D. Mini-PCI
B. USB 3.0
You want to connect a desktop computer to an IEEE 802.11ac wireless network. Which WLAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 3.0 C. Half Mini-PCIe D. PCMCIA
B. USB 3.0
Most manufacturers recommend installing a wireless IEEE 802.11ac USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process
B. When instructed by the setup utility
Which layer of the OSI model uses physical addresses to deliver data to the destination?
Physical
Which weather element would commonly have an effect on a WLAN system? A. Rain B. Snow C. Wind D. Hail
C. Wind Of the answers listed, wind would have the biggest impact on a WLAN system. Rain, snow, and hail do not affect wireless transmission unless the weather is severe. In this case, the collection of the elements may have an impact on the WLAN signal transmitted or received.
Data Integrity
CCMP uses a much stronger MIC - Message Integrity Check (MIC) in the trailer of all 802.11 frames is a 32-bit CRC known as the frame check sequence (FCS)
In Europe radio Frequencies are managed by
CEPT
Which network access method attempts to avoid collisions?
CSMA/CA
With respect to IEEE 802.11 wireless networking, the capacity is how many wireless client devices or users that an access point can service effectively, offering the best performance.
Capacity
Protocol using mechanisms that attempt to avoid collisions. This protocol is required with IEEE 802.11 wireless networking because the wireless devices have no way of detecting a collision. Instead, devices will use a method that may involve reserving the wireless medium for a specified period of time, attempting to avoid collisions.
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
A method used with IEEE 802.3 Ethernet networking; it is a contention-based media access control method that Ethernet devices use to share the medium. This method allows for only one device to transmit at any one time. If a collision is detected, the transmitting devices will need to back off for a random period of time and retransmit.
Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
Area of RF coverage extending from an antenna in wireless infrastructure and wireless client devices.
Cell
Wireless LAN Controllers commonly have what abilities?
Centralized Administration Captive Portal Built-In RADIUS services
Configuration of many devices such as wireless access points from one central device, software application, or location.
Centralized administration
Wireless LAN controllers may contain which of the following features? (Choose 3)
Centralized administration, captive portal, and built in RADIUS services
Tunneling of all traffic to a controller from the access point for handling, usually using proprietary methods.
Centralized data forwarding
Radio frequency range assignment varying in frequency based on the use of the device.
Channel
When supported by the manufacturer, a classification signature determines the maximum amount of DC power a device requires, thereby allowing the power sourcing equipment to better manage the amount of DC power delivered to a specific physical port.
Classification signature
The physical carrier sensing performed constantly by all stations that are not currently transmitting or receiving data. CCA is used to determine whether the medium is available for RF transmissions.
Clear channel assessment (CCA)
After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a Wi-Fi network? (Choose 2)
Client Utility Device Driver
After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a WiFi network?
Client Utility, Device Driver
The transmit power control (TPC)
Client can associate with an A P based on their transmit power AP can specify the transmit power of any or all stations A P can change transmission power on stations
Given: In Single-Channel Architecture (SCA) systems multiple access points can use the same BSSID. This feature allows for the creation of a network-wide virtual access point that can be applied across multiple physical access points operating on the same channel.
Client stations do not have to make roaming decisions
CWNP terminology defines co-channel interference as a performance condition that occurs when two or more independently coordinated access point radios are providing RF coverage to the same physical area using the same IEEE 802.11 channel. Additional RF medium contention overhead occurs for all radios using this channel in this physical area, resulting in throughput degradation and latency.
Co-channel interference
In wireless networking, multiple devices or access points in the same RF space and usually on different channels.
Co-location
Operating system feature that allows extensive and detailed configuration of a device such as a wireless access point or wireless LAN controller by using specific commands set by the device manufacturer.
Command-line interface (CLI)
Originally designed as a mass storage device format used in portable electronic devices; now used for a variety of devices and technologies, including Ethernet networks, Bluetooth, digital cameras, RFID, and Wi-Fi networks.
Compact Flash
A wireless workgroup bridge will allow you to do which of the following?
Connect a wired LAN to an AP
A WLAN bridge is best-suited for which scenario?
Connecting a portable classroom to a school network
bus topology
Consists of multiple devices connected along a single shared medium with two defined endpoints:
The lower three layers of the OSI model are?
Physical Data Link Network
IP addresses are logical addresses on which layer of the OSI model? A) Transport B) Data-Link C) Internet D) Network E) Session
D) Network Note, the Internet Layer is from the TCP/IP Model
Omnidirectional antennas have a horizontal beamwidth ____________ of degrees. A. 90 B. 180 C. 270 D. 360
D. 360 Omnidirectional antennas have a horizontal beamwidth of 360°. The vertical beamwidth will vary depending on the design and the gain of the antenna.
A point-to-point wireless link requires what percent of the Fresnel zone to be clear in order to be considered to have an acceptable RF line of sight? A. 0 B. 20 C. 40 D. 60
D. 60 It is recommended that at least 60 percent of the Fresnel zone be free of obstruction in order to have acceptable RF line of sight. Up to 40 percent of the zone can be blocked by obstructions without affecting the signal.
Enterprise-grade IEEE 802.11n/ac client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey
D. Site survey
In computer network terminology, the definition of half-duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time
D. Two-way communication one way at a time
You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0
D. Wireless USB 2.0
Power sourcing equipment delivers which of the following?
DC power to the end device
power sourcing equipment delivers which of the following?
DC power to the end device
___ allows for application layer data communication between two stations using lower layers as a support system.
Data Encapsulation
At which layer of the OSI model are bits compiled into frames?
Data Link
Second layer of the OSI Model
Data Link
Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors.
Data Link
What unit of measurement is used to measure the power difference between two RF signals?
Decibel
A ____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation?
Desktop
Software that allows components such as network adapters, keyboards, mice, video cards, and all other attached devices to communicate with a computer operating system.
Device driver
Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter
Device driver
Effect that occurs when an RF signal passes an obstacle, such as a building. The RF wave changes direction by bending around the obstacle.
Diffraction
When RF passes or bends around an obstacle like building or column, the behavior is ?
Diffraction
Effect that occurs when the RF signal naturally widens as it leaves an antenna element, resulting in attenuation of the radio frequency signal. Diffusion is the underlying cause of free space path loss.
Diffusion
A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following?
Direct connectivity
A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate Device is considered to have which of the following?
Direct connectivity
A spread-spectrum technology used in IEEE 802.11 and IEEE 802.11b/g with data rates of 1 and 2 Mbps set on a specific radio frequency channel.
Direct-sequence spread spectrum (DSSS)
A method that allows wireless client devices to compete for the time to transmit frames across the medium. In wireless networking this medium is the air.
Distributed coordinated function (DCF)
Method in which traffic is handled by the edge device such as an access point, eliminating the need to send data through the infrastructure to a wireless LAN controller for processing.
Distributed data forwarding
ABC Company would like to provide WiFi coverage to the are highlighted on the floorplan in the exhibit. If mounted at location-A, what type of antenna would provide a coverage pattern similar to the highlighted area?
Diversity Patch
802.11g standard uses what two physical layer Technologies
ERP-OFDM
The 802.11g standard uses which two physical layer technologies
ERP-OFDM
ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is suing WEP security with a 128-bit key. You have been asked to provide feedback about the strngth of their security. You tell ABC Company that ________.
Each currently-used security mechanism is weak, and the network is insecure
In a typical office building, WiFi clients are likely to experience poor WiFi coverage in what locations?
Elevators, Stairwells
ABC Corporation has decided to deploy their first WiFi netowrk in their corporate headquarters. ABC prepared for adding a WiFi network by installing PoE-capable Ethernet switches in their wiring closets. What type of PoE implementation is this?
Endpoint
A wireless LAN controller or an Ethernet switch that delivers DC voltage directly to connected devices to supply both DC voltage and computer data.
Endpoint device
____________________ delivers DC power directly over the same wire pairs that carry data over the unused wire pairs.
Endpoint injector
VPN solutions are often used in conjunction with WIFi networks for what purpose?
Endpoint secuirty for traveling users connected to unsecure WiFi hot-spots
A wireless infrastructure device with an extensive feature set; it is connected to a distribution system, allowing wireless LAN devices to access computer network resources. Contains at least two network interfaces, 10/100/1000 BaseT/Tx Ethernet (usually) and RF (wireless).
Enterprise access point
List the three interfaces typically available on a wireless branch router/remote access point.
Ethernet port(s) Internet port to connection to the WAN or an Internet connection Wireless port to allow IEEE 802.11 computers and devices to connect to a network through a wireless connection
The "next generation" of a PC card. Lower in cost, smaller in size, and higher in performance.
Express Card
802.11g-2003
Extended Rate Physical (ERP) transmit in the 2.4 GHz to 2.4835 GHz ISM ERP-OFDM - Extended Rate Physical OFDM Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps ERP-DSSS/CCK - used with support for the data rates of 1, 2, 5.5, and 11 Mbps
UNII-3
The _______ band may be used indoors or outdoors but was most commonly used outdoors.
How many channels are available for wireless LANs to use in the unlicensed UNII-1 band
Four
Caused by diffusion, it is the weakening of a radio frequency signal as it travels through open air with no obstructions.
Free space path loss
The number of complete cycles of an alternating current (AC) signal that will occur in a period of one second.
Frequency
What is the term defining the amount of times a cycle of an RF signal will oscillate in one second
Frequency
What is the term defining the number of times a cycle of an RF signal will oscillate in one second?
Frequency
What two factors are used to calculate the wavelength of an RF wave? (Choose 2)
Frequency Speed of light
What two factors are used to calculate the wavelength of an RF wave?
Frequency, Speed of light
Formally known as the Mini-PCIe card, it became known as the Full Mini-PCIe card with the introduction of the Half Mini-PCIe card form factor.
Full Mini-PCIe
An increase in signal strength of an RF signal, caused by an increase in amplitude. See also active gain, passive gain.
Gain
802.11ak
General Link (GLK) bridged networks
Directional antenna See through
Grid
What two types of antennas are used in point to point connections
Grid and Parabola
Which wirelessLAN technologycan be used to obtain the highest data transfer rate possible?
HT-OFDM
SOHO access points are typically configured by using and . (Choose 2.)
HTTP and HTTPS
The Half Mini-PCIe card is half the length of the Mini-PCIe card. The length is the only difference between the two.
Half Mini-PCIe
Two-way communication that occurs in only one direction at a time.
Half-duplex
The amplitude of an RF signal is:
Height
Which of the following is the amplitude of an RF signal?
Height
FM radio stations use what type of RF communication?
High power, Narrow bandwidth
Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main buildings network for web browsing. The main building has an existing 802.11g WiFi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main buildings network?
Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs
Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main building's network for web browsing. The main building has an existing 802.11g Wi-Fi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main building's network?
Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs.
Two or more RF signals interacting with each other and causing a degradation of performance.
Interference
In radio frequency terminology, energy broadcast equally in all directions in a 360 degree spherical manner.
Isotropic
A theoretical concept used in reference and calculations. Assumes that RF energy is broadcast equally in all directions in a spherical manner. An isotropic radiator is an imaginary, perfect antenna.
Isotropic radiator
Two sublayers of Data Link layer
LLC/MAC
Which of the following is a benefit of a wireless repeater?
Larger cell size allows more devices to access the medium
Which of the following is a benefit of a wireless repeater?
Larger cell size allows more devices to access the medium and extends cell size
Where is the use of a Wireless Internet Service Provider (WISP) most appropriate?
Last mile wireless data delivery to homes and businesses
Which Layer of the OSI model do wired Ethernet repeaters function?
Layer 1
Access points work at which layers of the OSI model?
Layer 1 and 2
Access points work at which layers of the OSI model?
Layer 1 and Layer 2
The ability of a transmitter and receiver to "see" each other (visual line of sight) or to transmit RF energy (RF line of sight). RF line of sight is the area of coverage around the visual line of sight.
Line of sight
A decrease in radio frequency power or energy, resulting in lower overall throughput in a wireless network.
Loss
PMD(Physical Medium Dependant)
Lower physical sublayer responsible for transmitting the data onto the wireless medium.
The physical address of a network card is called what
MAC address
The sublayer of the Data Link layer (Layer2) of the OSI model that handles the media access control.
MAC sublayer
IEEE 802.11n devices use an enhanced radio technology known as multiple input multiple output (MIMO) Which statement correctly describes a benefit of MIMO?
MIMO uses reflections to allow for increased throughput.
What statement accurately descibes an advantage of manual RF site surveys over predictive site surverys?
Manual site surverys are useful for locating and identifying sources of RF interference while predictive site surveys are not capable of this task
This operation mode for enterprise-grade access points connects access points together wirelessly without the use of a wired infrastructure.
Mesh Mode
Which of the following devices is an in-line device that will inject DC voltage into Ethernet cable?
Midspan
Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable?
Midspan
Usually a single port or multiple port injector; any device that injects DC power into Ethernet cable over the unused pairs of wires to allow both DC power and computer data to the end (powered) IEEE 802.3af device.
Midspan device
_____________________ injects DC power into the Ethernet cable over the unused wire pairs or over the data pairs, depending on the version of the standard in use.
Midspan injector
A measure of radio frequency power that is equal to 1/1000 watt.
Milliwatt (mW)
Variation of the PCI standard designed for laptops and other small-footprint computer systems.
Mini-PCI
Which wireless adapter may require some disassembly of a notebook computer tp install?
Mini-PCI
Identify three of the four PCI card types, as they're generally listed i.e. not worrying about the stupid IA, IB, types
Mini-PCI Mini-PCIe Full Mini-PCIe Half Mini-PCIe
Identify the wireless radio interface type depicted in the illustration.
Mini-PCIe
Replacement for the Mini-PCI card based on PCI Express. Available in three types: Type I, Type II, and Type III. Now called the Full Mini-PCIe card after the introduction of the Half Mini-PCIe.
Mini-PCIe
Technology introduced in the IEEE 802.11n amendment to describe various HT-OFDM data rates depending on the wireless LAN technology in use such as 20/40 MHz wide radio frequency channels or short guard interval.
Modulation and coding scheme (MCS)
What is a wireless bridge?
The ability to connect two or more wired LANs together wirelessly using IEEE 802.11
As an RF signal propagates, it reflects off an object. The reflected signal and the signal following a direct path arrive at the receiver at different points in time. What is the term used to describe this RF behavior?
Multipath
Simple antenna diversity mitigates the adverse effects caused by which common Wi-Fi problem?
Multipath
Simple antenna diversity mitigates the adverse effects caused by which common WiFi problem?
Multipath
Which Wi-Fi technology simultaneously uses multiple radio chains to transmit or receive data?
Multiple Input, Multiple Output (MIMO)
Which WiFi technology simultaneously uses multiple radio chains to transmit or receive data?
Multiple Input, Multiple Output (MIMO)
A technology using multiple radio chains and multiple antennas, allowing for high throughput up to 600 Mbps in IEEE 802.11 wireless networks.
Multiple input/multiple output (MIMO)
As a general rule, where is the most appropriate location to install a dipole antenna?
Near the center of the coverage area
Third layer of the OSI Model
Network
Which layer of the OSI model allows physical addresses to be converted to logical addresses?
Network
Which layer of the OSI model is responsible for addressing and routing?
Network
In order to assess your customer's WiFi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting?
Network Administrator, Facilities manager
The way in which devices connected to a common infrastructure communicate and transmit data across a network medium from one device to another, as in CSMA/CD and CSMA/CA.
Network access method
Layer 3 of the OSI model; this layer is where the Internet Protocol (IP) protocol resides and is responsible for the addressing and routing of computer data.
Network layer
IEEE 802.11
Original IEEE 802.11 Standard published in June 1997 - IEEE Std 802.11-1997 revised in 1999 reaffirmed in 2003 - IEEE Std 802.11-1999 (R2003) On March 8, 2007 - IEEE Std 802.11-2007 March 29, 2012 - IEEE Std 802.11-2012
A technology designed to transmit many signals simultaneously over one transmission path in a shared medium; it is used in wireless networking with IEEE 802.11a/g/n networks.
Orthogonal frequency division multiplexing (OFDM)
9, 18, 36, 48, 54 Mbps
Orthogonal frequency division multiplexing data rates supported but not required
6,12,24 Mbps
Orthogonal frequency division multiplexing required data rates
A newer term for the PCMCIA adapter. The PC Card has been replaced with ExpressCard technology.
PC Card
Personal Computer Memory Card International Association, a standards organization that defines and promotes PC card technology. Also used as the name of the card.
PCMCIA
You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter which card would work best in this case?
PCMCIA
Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way?
PCMCIA/USB 2.0
Identifies the Physical layer (Layer 1) of the OSI model, which consists of bit-level data streams and computer network hardware connecting the devices together.
PHY
Directional Dish Bowl shaped
Parabolic Dish
Which WiFi vertical market applications are regulated by a government or industry group for security compliance?
Patient records in hospitals, Consumer payment information in retail stores
A standard for computer interface cards developed by Intel. Cards are inserted into an available slot (interface) in a desktop computer, allowing for the attachment of peripheral devices.
Peripheral Component Interconnect (PCI)
PAN
Personal Area Network
Which two of the following options are available for Wi-Fi protected Access 2 (WPA 2.0)?
Personal Mode Enterprise mode
A particular point in the time of a cycle; measured from some arbitrary zero and expressed as an angle and measured in degrees.
Phase
First layer of the OSI Model
Physical
B
Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network
At which two layers of the OSI model do wireless LANs operate?
Physical/Data Link
Which scenario represents an improper installiation for an AP with low-gain omnidirectional antennas?
Place above the doorway, at one end of a long hallway
Of all the devices listed Secure Digital Input Output (SDIO) cards are most likely to be installed in which?
Pocket PC
A Layer 3 VPN solution that uses the Microsoft 128-bit Point-to-Point Encryption (MPPE) protocol and provides both tunneling and encryption capabilities.
Point-to-Point Tunneling Protocol (PPTP)
three
Point-to-multipoint links consist of __________ or more connections.
semidirectional and highly directional antennas
Point-to-point links typically use which antenna types?
In order to extend network access from Building 1 to Building 2, ABC Company has implemented a WiFi solution. What type of WiFi solution is shown in the figure?
Point-to-point, Semidirectional, Bridge
_________________ is an extension to the IEEE 802.3 Ethernet standard that allows direct current voltage to be supplied over Ethernet cable to wireless access points.
Power over Ethernet
A method for supplying DC voltage and computer data together over a single Ethernet cable.
Power over Ethernet (PoE)
A device that will supply DC voltage and computer data to wired computer network devices such as wireless access points, video cameras, and VoIP phones. PSE can be either an endpoint or a midspan device.
Power sourcing equipment (PSE)
Access point, VoIP phone, camera, or other computer network device that receives Power over Ethernet from the power source equipment.
Powered device (PD)
Given: You are performing a site survey software that simulates RF behavior in a defined environment. It uses a floor plan and materials information for its calculations. What kind of site survey is performed using this method?
Predictive
A software-based site survey tool sold by your company allows your customers to determine access point coverage and optimum placement within a facility without visiting the facility. What is the term that most accurately describes this type of site survey?
Predictive Modeling
A set of rules that defines data communication between devices. TCP/IP is a common protocol set used in computer networking.
Protocol
Media Access Control (MAC)
The bit-level communication is accomplished through _____ addressing.
802.11aa-2012
QoS enhancements to the 802.11 Media Access Control (MAC) improved management, increased link reliability, and increased application performance
802.11ae-2012
QoS management quality-of-service management frame (QMF) service can be enabled
The WiFi Multimedia (WMM) certification, which is illustrated in the exhibit, pertains to which topic?
Quality of Service
Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification?
Quality of Service
Temporal Key Integrity Protocol (TKIP)
RC-4 stream cipher algorithm - enhancement of WEP encryption
RF coverage is also known as the __________
RF cell or basic service area (BSA)
Unobstructed radio communication between a radio transmitter and receiver.
RF line of sight
Frequency Hopping Spread Spectrum (FHSS)
RF signal is considered spread spectrum when the bandwidth is wider than what is required to carry the data Clause 14 devices
An arbitrary number assigned by the radio chipset or device manufacturer. There is no standard for this value, and it will not be comparable between devices from different manufacturers.
Received signal strength indicator (RSSI)
In wireless networking, a wireless device that collects propagated RF energy from the air via an antenna. It demodulates and recovers any data included in the signal.
Receiver
What two devices use RF to communicate? (Choose two.)
Receiver Transmitter
What type of protection does a lightning arrestor provide to a Wi-Fi system?
Redirection of transient current due to nearby lightning strikes
What type of protection does a lightning arrestor provide to a WiFi system?
Redirection of transient current due to nearby lightning strikes
A feature that allows for fault-tolerant deployments and uninterrupted access in the event of access point or wireless LAN controller or other network device failure.
Redundancy
An effect that occurs when an RF signal bounces off a smooth, nonabsorptive surface such as a tabletop and results in the original signal changing direction.
Reflection
When an RF signal bounces off a smooth non-absorptive surface the behavior is called:
Reflection
An effect that occurs when an RF signal passes between mediums of different densities. The signal may change speed and also bend.
Refraction
When an RF signal passes between mediums of diff. densities and may change speed and bend, the behavior is
Refraction
802.11af-2014
TV white space (TVWS)
In addition to wireless networking which adapter was designed for flash memory storage and can be used in a Digital camera?
SDIO
Small office, home office; in wireless LAN terms, SOHO defines a smaller network with fewer client devices than in a large or enterprise deployment.
SOHO
Wi-Fi protected setup was designed for which o f the following wireless applications?
SOHO
The logical name of a WLAN is
SSID
An effect that occurs when an RF signal strikes an uneven surface. Wavefronts of the signal will reflect off the uneven surface in several directions.
Scattering
Semi-Directional Antenna
Sector Antenna
Designed as a flash memory storage device with storage capacities from 8 MB to 4 GB. Now allows for connection of other devices such as cameras, global positioning system (GPS) units, FM radios, TV tuners, Ethernet networks, and Wi-Fi networks.
Secure Digital Input Output (SDIO)
The 802.11i amendment to the standard addresses which of the following technologies?
Security
Point to Point links typically use which antenna types?
Semidirectional and Highly Directional
USB was designed as a replacement for which two legacy communication connections?
Serial and Parallel
Fifth layer of the OSI Model
Session
The purpose of ___ is to allow application layer data communication between two stations
Session Layer
Layer 5 of the OSI model, which opens, closes, and manages sessions between end-user application processes.
Session layer
In what situation is an RF site survey LEAST needed?
Telecommuters using a single "remote AP" at home
The RF noise value in dBm minus the received signal strength in dBm. The minimum recommended value for wireless networking is 20dB to 25dB or higher.
Signal-to-noise ratio (SNR)
The most basic wireless antenna technology used in a wireless LAN system. One antenna is used at the transmitter to transmit data and one antenna is used at the receiver to receive the data.
Single input/single output (SISO)
What are some examples of midspan PoE devices?
Single port injectors/Multiport injectors
Which of the following are midspan PoE devices? (Choose 2.)
Single-port and multiport injectors
Enterprise-Grade IEEE 802.11g client utilities typically contain which advance feature?
Site survey
The capacity of an access point is dependent on which factors? (Choose two.)
Software applications Number of users
device Driver can be used in wireless networking which is an example of a device driver
Software to control a wireless NIC
The radio spectrum is the radio frequency (RF) portion of the electromagnetic spectrum.
Spectrum
What tool is best suited for locating and identifying sources of RF interference, such as microwave ovens?
Spectrum analyzer
UNII-2
The _______ band is for indoor or outdoor uses.
UNII-1
The _______ band is intended for indoor use only.
What echnolofy is used to send WLAN data over a wireless medium using subcarrier frequencies?
Spread-Spectrum
In wireless networking, technology that provides redundancy of the digital data as it traverses through the air by combining a set code with the digital data prior to the transmission.
Spreading code
A single-channel architecture management technique in which each floor or area of a building is assigned a channel to use. Spanning and blanketing are other terms used to identify managed areas based on channels.
Stacking
A separate signal carried on a main radio frequency transmission.
Subcarrier
Which protocol is used to guarantee delivery?
TCP
How many non-overlapping channels are available in the unlicensed 2.4 GHz ISM band?
THREE
What is the most likely cause of low throughput on a hotel's guest network?
The 1.5 Mbps internet connection is creating a bottleneck for the WiFi users
ERP-OFDM and DSSS
The 802.11g standard uses which two Physical layer technologies?
B
The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP
power, range, speed
The IEEE 802.11 wireless networking standard define what some call the _____, ______, and ____ of the radio frequency and WLAN technology.
2.4-2.5, DSSS (HR/DSSS), 5.5, 11
The IEEE 802.11b amendment to the 802.11 standard works in the _______GHz ISM band. This amendment, released in 1999, specifies high rate _____ for ____ and ___ Mbps
802.11e
The IEEE _____ amendment defines enhancements for QoS in wireless LANs and introduced the hybrid coordination function
Logical address
The IP address of a network adapter is also known as which address?
ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy Wi-Fi client devices in the 2.4 GHz ISM band?
The Wi-Fi client devices will experience performance degradation due to co-channel interference.
Select the statement that correctly describes the WiFi Alliance's primary role in the WLAN industry.
The WiFi Alliance tests and certifies product interoperability based upon standards created by the IEEE
ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy WiFi client devices in the 2.4 GHz ISM ban?
The WiFi client devices will experience performance degradation due to co-channel interference
54Mbps, OFDM
The data rates for IEEE 802.11a are up to _____ using____.
Which statement best defines SNR?
The difference between the noise floor and a signal's strength
After successfully connecting to the WiFi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that ask for your name, room number, and a secret key. What has most likely happened?
The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network
physical, data link, network
The lower three layers of the OSI model are ______, _____, and __________.
MAC address
The physical address of a network adapter is the __________.
Given: In ABC Company's branch office, there are three 802.11n access points serviing 20 WiFi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the builiding during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time.
The picnic tables are located at the edge of the effective range of WiFi coverage
IEEE 802.11n
The release of this document opened the doors for manufacturers of IEEE 802.11 wireless LAN equipment, giving them the opportunity to move forward with new technology that allows for better performance, higher throughput, and several other benefits.
Wireless bridges must be configured with ____ and _____,
The same SSID The same RF channel
Wireless bridges must be configured with _______ and _______.
The same SSID and RF channel
D
The term encapsulation means to ____________. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload
The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in WiFi networks because ___________.
The wireless transmission medium is half-duplex, thus shared by all users
The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in Wi-Fi networks because ___________.
The wireless transmission medium is half-duplex, thus shared by all users.
CompactFlash (CF) cards are available in two types. What is the main difference between the two types?
Thickness
802.11k
This IEEE 802.11 amendment addresses radio resource management.
802.11w
This IEEE 802.11 amendment designed to mitigate DoS or Hijacking attacks.
802.11r
This IEEE 802.11 amendment specifies fast secure roaming or fast transition technology for VoIP with wireless LAN technology
802.11 g
This amendment addresses extended data rates with OFDM technology.
802.11 y
This amendment allows for the use of high-powered wireless LAN equipment to operate in the 3.65-3.7 GHz band.
Layer 7 Application
This layer has protocols such as FTP, HTTP, and POP3.
Layer 5 Session
This layer opens, closes, and manages sessions between end-user application processes.
Layer 6 Presentation
This layer provides delivery and formatting of information for processing and display.
The actual rate at which information is transferred, taking into consideration factors such as overhead, interference, and contention between devices.
Throughput
Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP. What do you tell them is a benefit of using multiple antennas?
Transmit and receive diversity that addresses multipath problems.
Layer 4 of the OSI model, which consists of both connectionless UDP and connection-oriented TCP protocols and provides end-to-end communication services for applications between devices on a computer network.
Transport layer
True of false: Full-duplex allows two-way communication to occur between devices simultaneously
True
True or false, A cell is the area of RF coverage of the transmitter
True
True or false, Firewalls can be hardware-based, software-based, or a combination of the two.
True
True or false, direct access point connectivity is defined as a direct connection to ports on the switch and is typically used with device connection layer hardware wireless controllers.
True
True or false, A wireless branch router/remote access point can build a Layer 3 VPN tunnel between devices allowing the router on each side will act as a VPN endpoint.
True, they can also be configured as a VPN pass-through device
Physical Layer Convergence Protocol (PLCP) and Physical Medium Dependent (PMD)
Two sublayers of PHY physical layer:
In computer Network Terminology, the definition of half duplex is closest to which of the following?
Two-way communication one way at a time
In computer network terminology, the definition of half duplex is closest to which of the following?
Two-way communication one way at a time
Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for dektop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adpater would provide WiFi connectivity to these desktop computers?
USB 2.0
Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for desktop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adapter would provide Wi-Fi connectivity to these desktop computers?
USB 2.0
Universal Serial Bus version 2, which incorporates several changes to USB, including connector types. Data rates allow for a maximum speed of 480 Mbps.
USB 2.0
You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer?
USB 2.0
UDP is
Unreliable
As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling WiFi equipment. While evaluating the manufacturer's sepcifications for a specific WiFi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?
User Identity validation
As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling Wi-Fi equipment. While evaluating the manufacturer's specifications for a specific Wi-Fi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?
User identity validation
Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concersn about wireless hot-spot usage. To address these concerns, what advice should you give to your traveling users with regard to wireless hot-spot usage?
Verify that personal firewall and antivirus software are both enabled before connecting, Always use company-provided VPN client software after connecting to the WiFi network
802.11ac-2013
Very High Throughput (VHT) enhancements below 6 GHz 5 GHz frequency bands Wider Channels New Modulation More Spatial Streams Improved MIMO and Beamforming
A logical separation of ports to define broadcast domains in a Layer 2 network, independent of their physical location.
Virtual local area networks (VLANs)
Which of the following statements is true regarding a wireless LAN controller?
Virtual local area networks involve a logical separation of ports
Technology that allows for private communications over a public network infrastructure such as the Internet. A VPN creates a secure tunnel for the user and the connected endpoint.
Virtual private network (VPN)
The ability of the transmitter and receiver to see each other.
Visual line of sight
You support a wireless network for an office of five employees. The installation consists of one access point three notebook computers, and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fi WPA 2.0 certified you want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment?
WPA 2.0 personal/WPS
Enterprise access points may contain which of the following features?
WPA 2.0 support RADIUS server Repeater Mode
Enterprise access points may contain which of the following features? (Choose 3.)
WPA 2.0 support, RADIUS server, and repeater mode
SOHO access points commonly support which of the following features? (Choose 3.)
WPA 2.0 support, static output power, and wifi certifications
802.11i
WPA was developed as an interim solution for which amendment to the 802.11 standard?
The Wi-Fi Alliance certifications include several standards for security and QoS listed in the chapter, name them.
WPA/WPA 2.0 for security WMM and WMM-PS for QoS
SOHO access points commonly support which of the following features?
WPA2.0 support/Static output power/Wi-Fi certifications
The basic unit of measurement for radio frequency power.
Watt (W)
Which are absolute measurements of RF Power
Watt and mW
The distance of one complete cycle or one oscillation of an AC signal. Wavelength is typically identified by the Greek symbol lambda.
Wavelength
The range of a 2.4 GHz signal is mostly dependent on which RF characteristic?
Wavelength
direct sequence spread spectrum
What does DSSS stand for?
orthogonal frequency division multiplexing
What does OFDM stand for?
B
Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF
Network (layer3)
Which layer of the OSI model allows physical addresses to be converted to logical addresses?
Network (layer 3)
Which layer of the OSI model allows physical addressing and routing?
Network Layer
Which layer of the OSI model is responsible for addressing and routing?
Data Link
Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors?
Application Layer
Which layer of the OSI model provides an interface to the user?
MIMO
_____is a big part of what makes IEEE 802.11n such an amazing technology
A and C
Which of the following is an accurate description of peer communication (choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network
D
Which of the following is correct regarding 802.11e? A. Only operates in the 5 GHz frequency range B. Only operates at 1, 2, 5.5, and 11 Mbps C. Addresses wireless security D. Addresses wireless quality of service
E
Which of the following organizations is responsible for standards compliance? A. FCC B. ETSI C. IEEE D. WPA2 E. Wi-Fi Alliance
TCP
Which protocol is used to guarantee delivery?
personal mode w/passphrase and enterprise mode using 802.1X/EAP
Which two options are available for Wi-Fi Protected Access 2 (WPA 2.0)?
An organization formed to promote IEEE standards for wireless LAN technology and manufacturer interoperability testing.
Wi-Fi Alliance
SOHO
Wi-Fi Protected Setup was designed for which wireless application?
How do Wi-Fi routers differ from Wi-Fi access points?
Wi-Fi routers are comprised of both a router and an access point within the same hardware.
As an alternative to using leased lines to connect two offices on the same campus, your customer wants to implement a WiFi solution. When asked by your customer, what advantages do you cite regarding use of a WiFi infrastructure instead of a leased line?
WiFi implementations have a lower total cost of ownership than leased lines, WiFi implementations offer more flexibility and easier expansion than leased lines.
How do WiFi routers differ from WiFi access points?
WiFi routers are comprised of both a router and an access point within the same hardware
This operation mode for enterprise-grade access points can connect two or more LANs.
Wireless Bridge Mode
Mesh Mode has made this obsolete.
Wireless Distribution System (WDS)
ABC Manufactoring currently has 35 access points throughout their main facility, and each Friday afternoon two adminitrators walk the premises with specturm and protocol analyzers to detect unauthroized devices and network activity. You have noted several problems with this approach. To address the inefficiencies with this approach and to provide the most robust preventative security, you have set aside a portion of the department's budget to install a ______.
Wireless Intrusion Prevention System (WIPS)
A ________ will help determine and have the potential to mitigate certain levels of wireless intrusions or attacks on the network.
Wireless Intrusion Prevention Systems (WIPS)
What can help detect a rogue access point?
Wireless Intrusion Prevention Systems (WIPS)
Your customer has asked you to recommend a Wi-Fi solution that includes the following features: • Role Based Access Control • Stateful Firewall • Quality of Service What device type can perform all of these functions?
Wireless LAN Controller
Your customer has asked you to recommend a WiFi solution that includes the following features: 1. Role Based Access Control 2. Stateful Firewall 3. Quality of Service
Wireless LAN Controller
A device that usually consists of an Internet port, small Ethernet switch, and wireless access point. It allows SOHO and residential users to connect devices to the network and access the Internet. Also known as wireless broadband router or wireless residential gateway.
Wireless LAN router
This operation mode for enterprise-grade access points can act to extend the RF cell.
Wireless Repeater Mode
You have a notebook computer and wish to connect to an IEEE 802.11n wireless network the computer does not have a built in wireless LAN card or a pc card interface you do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution?
Wireless USB 2.0
A wireless networking device used to extend a corporate network to a remote location such as a home, conference room, or branch office through a secure connection using a wide area network or the Internet. It may contain Ethernet switch capabilities and a wireless access point.
Wireless branch router
A device used to connect two or more local area networks together using radio frequency. It can be configured in either point-to-point or point-to-multipoint configurations.
Wireless bridge
A device used in wireless LAN technology allowing centralized administration and control of access points, including radio management, security, VLANs, and redundancy.
Wireless controller
A system that connects basic service sets together, making an extended service set using RF instead of physical cabling such as Ethernet.
Wireless distribution system (WDS)
ABC Company has recently deployed a WiFi network in their corporate facility. After deployment, the considered a solution for monitoring and enforcing their wireless secuirty policy. What type of system can perform this task?
Wireless intrusion Prevention System (WIPS)
A software and/or hardware solution designed to monitor wireless networking RF signals using sensors or access points and to record events to a centralized database. It has the capability to react and prevent intrusion.
Wireless intrusion prevention system (WIPS)
A network that connects wireless devices within the immediate area of individual people. This type of network allows a user to connect various devices wirelessly to their own personal area network, including but not limited to computer keyboards, mice, and headsets. Bluetooth is a common technology used with WPANs.
Wireless personal network (WPAN)
semidirectional or highly directional
Wireless point-to-point links typically call for ________antennas.
As part of a pre-deployment manual RF site survey, your manager has assigned to you the task of documenting security and interference details about exisiting WLANs in the building. What is the best tool for locating and collecting information about existing APs in the building?
Wireless protocol analyzer
A device used to extend a radio frequency cell, it allows users located beyond the connection distance of a wireless access point to connect to a wireless LAN by repeating the signal to an access point.
Wireless repeater
A wireless client device that allows several Ethernet devices on an Ethernet segment to associate and connect to a wireless infrastructure through an access point. Also known as a wireless client bridge.
Wireless workgroup bridge
Which client device will allow a user to connect several Ethernet devices on a common segment to an access point?
Wireless workgroup bridge
Directional Antenna Tree shaped
Yagi
Why is it better to configure access points from the wired side of the network?
You are not sending secure information over the internet.
B and C
You support a wireless network for an office of five employees. The installation consists of one access point, three notebook computers, and two desktop computers. The access point and computers i the office have wireless adapters that are Wi-Fi WPA 2.0 Certified. You want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment? (choose 2) A. WEP B. WPA 2.0 personal C. WPS D. WMM E. WPA 2.0 enterprise
Hybrid coordination function
_____ defines traffic classes and assigns a priority to the information to be transmitted.
Point Coordination Function (PCF)
access point briefly takes control of the medium and polls the clients
mesh point portal (MPP)
acts as a gateway to one or more external networks
Hybrid Coordination Function (HCF)
additional coordination function that is applied in an 802.11e QoS wireless network
Self-contained units with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the device have permission to use.
autonomous access points
robust security network (RSN)
better hide the data flying through the air while at the same time placing a bigger guard at the front door
Separating the intelligence from the access point and placing it into the wireless controller can cause ______________ with the higher data rates of IEEE 802.11n and 801.11ac
bottlenecks
Identify three popular types of autonomous access points:
consumer SOHO enterprise
Distributed Coordination Function (DCF)
contention-based method determining who gets to transmit on the wireless medium next
Wider Channels
capability of 80 MHz and 160 MHz channels
A mesh point (MP)
capable of using a mandatory mesh routing protocol called Hybrid Wireless Mesh Protocol (HWMP)
A common feature in hardware WLAN controllers and cloud-managed systems that is used to obtain payment information, a simple agreement to terms and conditions for a hotspot or account credentials.
captive web portal
WLAN controller solutions consist of two common types of architectures, name them.
centralized (split-MAC) distributed
In WLAN controllers and cloud-managed controller-less solutions, this gives an administrator complete control over the wireless network from a single physical location.
centralized administration
Decibel (dB) is a relative expression representing a change in radio frequency power.
dB
Which two are relative measurements of RF Power?
dB dBi are relative measurements of RF power
A decibel referenced to a dipole antenna, representing the passive gain of a dipole antenna and a relative expression of radio frequency power.
dBd
A decibel referenced against an isotropic radiator, representing the passive gain of an antenna as an increase in power and a relative expression of radio frequency power.
dBi
What is the gain of an antenna measured in?
dBi
Which grade of access points allow the user to change the transmit power?
enterprise and some SOHO
Hybrid Coordination Function Controlled Channel Access (HCCA)
extension of PCF gives the access point the ability to provide for "prioritization of stations." certain client stations will be given a chance to transmit before others
Enhanced Distributed Channel Access (EDCA)
extension to DCF prioritization of frames based on upper-layer protocols
802.11r-2008
fast basic service set transition (FT) fast secure roaming troublesome when using a WPA-Enterprise or WPA2- Enterprise security solution bypassing 802.1X authentication when roaming to a new access point
When a wireless device is connected to an access point, it is known to be in _____________ mode.
infrastructure mode
When a wireless device is connected to an access point, it is said to be in ____________.
infrastructure mode
Which of the following best describes the Wi-Fi alliance?
interoperability testing organization
802.11u-2011
interworking issues between an IEEE 802.11 access network and any external network to which it is connected Wireless Interworking with External Networks (WIEN) basis for the Wi-Fi Alliance's Hotspot 2.0 specification and its Passpoint certification
In infrastructure mode, what happens to wireless data traffic that passes through an access point?
it is passed through to it's intended destination, crazy huh
Which are absolute measures of RF power? (Choose two.)
mW and Watt
802.11h-2003
mechanisms for dynamic frequency selection (DFS) and transmit power control (TPC) capability for 802.11 radios to transmit in a new frequency band called U-NII-2 Extended with 11 more channels
Robust Security Network (RSN)
method of establishing authentication, negotiating security associations, and dynamically generating encryption keys for client stations and access points
Improved MIMO and Beamforming
multi-user MIMO (MU-MIMO) technology simplified beamforming method called null data packet (NDP) beamforming
More Spatial Streams
ould be built to transmit and receive up to eight spatial streams
According to the PoE amendments, what is the term for an apparatus that delivers power?
power sourcing equipment (PSE)
According to the PoE amendments, what is the term for an apparatus that receives power?
powered device (PD)
mesh access point (MAP)
provides both mesh functionalities and AP functionalities simultaneously
Broadcast/Multicast Integrity Protocol (BIP)
provides data integrity and replay protection using AES-128 in Cipher-Based Message Authentication Code (CMAC) mode
dBi is a(n) ____________ measurement of gain introduced by _____________?
relative; an antenna
802.11w-2009
robust management frames delivering management frames in a secure manner, therefore preventing the management frames from being able to be spoofed provides protection for unicast, broadcast, and multicast management frames Broadcast/Multicast Integrity Protocol (BIP)
802.11ah
se of Wi-Fi in frequencies below 1 GHz sensor networks along with backhaul for sensor networks and with extended range Wi-Fi Internet-of-Things (IoT) or Machine-to-Machine (M2M)
Client Statistics
signal-to-noise ratio, signal strength, and data rates can all be reported information such as frame transmissions, retries, and errors may all be reported
IEEE Std 802.11-2012
single document containing all the amendments that had been published at that time
What are the two types of midspan devices?
single-port and multiport injectors
Direct Sequence Spread Spectrum (DSSS)
spread spectrum technology that uses ! xed channels Clause 16 device
802.11aj
support for operating in the Chinese Milli-Meter Wave (CMMW) frequency bands 59- 64 GHz