m08 uCertify practice tests
In order to secure a SOHO WLAN access point, it has been decided that you would use 802.11i, WPA2 preshared key (passphrase) as a security solution. The access point and all client devices have been configured with the same passphrase. The passphrase represents which of the following?
Authentication
You are a WLAN support technician and have a desktop computer that needs to be connected to the wireless network. Which device would be a solution for this situation?
PCI
Client devices that support Wi-Fi Protected Setup must support which feature?
PIN
As defined by Wi-Fi Alliance WPS (Wi-Fi Protected Setup), which of the following security configurations are required for securing a wireless network for home-based users? Each correct answer represents a complete solution. Choose two.
PIN-based Push-button
Which of the following are common types of VPN (Virtual Private Networking) tunneling protocols? Each correct answer represents a complete solution. Choose two.
PPTP L2TP
Which tool would be best utilized to locate non-Wi-Fi sources of interference during a WLAN site survey process?
RF spectrum analyzer
Which process is required when a device transitions to a new WLAN access point?
Reassociating
IEEE 802.11n/ac MIMO technology uses which of the following RF behaviors to increase performance and throughput?
Reflection
Which phenomena causes multipath in WLANs?
Reflection
What occurs when an RF signal passes between mediums of different densities?
Refraction
A third-party client utility such as the Microsoft's Windows WLAN AutoConfig service can be used with ____________.
SOHO implementations Enterprise implementations
IEEE 802.11 WLAN access points that are part of ESS (extended service set) must have the same _______.
SSID
What parameter must match on all WLAN devices that wish to be part of the same wireless BSS (Basic Service Set)?
SSID
Which of the following allows WLAN-capable devices to identify and connect to a WLAN using the discovery phase?
SSID
A grid dish antenna typically falls under which category?
Highly directional
What is a common use for a public guest access IEEE 802.11 wireless hotspot?
Hotels
MIMO is used in which amendment to the IEEE 802.11 standard?
IEEE 802.11n/ac
What is responsible for global management of the RF spectrum?
IRU-R
Unlicensed RF bands used in IEEE wireless networking include which two bands?
ISM UNII
Which RF behavior would cause diffraction?
The RF signal passes around an obstruction and changes direction.
In which IEEE 802.11 operation mode is wireless data traffic passed through the access point?
Infrastructure
What is true about the security configuration for port-based authentication in the client utility of a WLAN adapter?
It is user-configurable.
Which of the following statements is true about the propagation of RF energy through a vertically polarized omnidirectional antenna?
It propagates horizontally in all directions.
Which of the following statements is true about a wireless client device when it is in active mode?
It will not enter a doze state to conserve battery power.
Wavelength is typically identified by which Greek symbol?
Lambda, λ
At which layer of the OSI model does VPN (Virtual Private Networking) operate?
Layer 3
You are troubleshooting an IEEE 802.11 wireless client device that cannot connect to the wireless network. You notice the client utility shows good signal strength but will not connect to the network. After opening a command prompt and typing the ipconfig command, you notice the IP address is 169.254.12.50. You suspect the IP address is not valid and could be causing the problem. What potential problem could cause this IP address?
The WPA/WPA2 passphrase is incorrect on the client device.
What effect will half-duplex communication have on a WLAN?
Less throughput
Which of the following is usually involved in load balancing in an IEEE 802.11 WLAN?
Limiting the number of client device associations to an access point
Which of the following statements are true about the logical address of a network device? Each correct answer represents a complete solution. Choose two.
Logical addresses are 32-bit dotted-decimal addresses. It is also known as IP (Internet Protocol) address.
IEEE 802.11 WLANs use which of the following for RF communication?
Low power, wide bandwidth
What is the cause of slow performance of an IEEE 802.11 WLAN client device?
Low received signal strength
Which statement is true about a site survey report?
This report includes only the business aspects of the wireless site survey.
What will improve as a result of enabling load balancing on an IEEE 802.11 wireless network?
Throughput
Controller-managed access points require which capability to operate?
WLAN controller
Which Wi-Fi Alliance certification was designed as a proactive certification for the IEEE 802.11e amendment (QoS) to the 802.11 standard?
WMM
When an antenna focuses emitted isotropic RF energy into a specific radiation pattern, it is known as ________ gain.
passive
IEEE 802.11b networks can operate at what data rate?
11 Mbps
Non-Wi-Fi devices that use FHSS (frequency-hopping spread spectrum) are capable of causing interference with WLANs in which frequency range?
2.4 to 2.5 GHz ISM
Which of the following channels in the 2.4 GHz ISM band used for HR/DSSS IEEE 802.11 wireless networking are considered as nonoverlapping channel?
6, 11
Which behavior of RF would have the most significant effect in a warehouse that stores one-gallon cans and five-gallon buckets of paint?
Absorption
Which component of a WLAN infrastructure allows a wireless workgroup bridge to connect to an Ethernet segment containing wired devices?
Access point
Which of the following connections are possible using RF connectors? Each correct answer represents a complete solution. Choose three.
Access point to antenna Cable to cable Antenna to cable
Which process will help to improve the throughput of a WLAN for users who are currently experiencing low throughput problems?
Add more access points.
Which service set uses only one access point for communication?
BSS
You are an office administrator for a small insurance firm with five employees and approximately 1,500 square feet of office space. You were given an assignment to determine the best IEEE 802.11 WLAN solution to be used in this office. Which service set would be an adequate solution?
BSS
Which of the following are types of IEEE 802.11 management frames? Each correct answer represents a complete solution. Choose three.
Beacon Probe response Association response
Which technology is the solution to hidden node problem in wireless client devices?
CSMA/CA
IEEE 802.11b devices are capable of which spread spectrum technology? Each correct answer represents a complete solution. Choose two.
DSSS HR/DSSS
Early wireless networking technology was typically installed to serve which purpose?
Extension of an existing wired network
Data rates of 1 Mbps and 2 Mbps are used by which spread spectrum technology?
FHSS
Legacy Bluetooth devices use _____ for data communications and can potentially cause interference with IEEE 802.11 Wireless LANs.
FHSS
During the manual WLAN RF site survey process, what purpose does a protocol analyzer serve?
Find other IEEE 802.11 WLANs in the area.
What information is essential to have as part of the RF WLAN site survey planning process and questioning regarding the business use of a WLAN?
Floor plans
Which steps accurately describe the generic IEEE 802.1X/EAP authentication process?
Supplicant to authenticator to authentication server
A user has contacted the help desk and notifies them that they cannot use the mapping services on their device in order to locate a business meeting. Which of the following could be a potential cause of the problem?
The device has location-based services disabled.
Which device is used to connect two or more dissimilar types of LANs together?
Translational bridge
Which is an example of an external WLAN adapter?
USB 2.0
Which of the following methods provides the strongest IEEE 802.11 security?
WPA2-PSK
Which of the following statements is true regarding IEEE 802.11 WLAN security certifications?
Wi-Fi Protected Access is a certification for security allowing a secure wireless network exchange of information.
Which device allows Ethernet devices on an Ethernet segment to connect to an infrastructure through a wireless access point?
Wireless workgroup bridge
You are performing a manual WLAN RF site survey in a location that has several long hallways with small offices on both sides. Your objective is to minimize the number of WLAN access points while maximizing coverage. Which antenna would be a good choice based on these conditions?
Yagi
Third-party manufacturers' client software utilities for IEEE 802.11 WLAN adapters:
allow for additional configuration.
The RF output of an IEEE 802.11 WLAN access point is usually measured in which unit?
dBm
What are absolute units of power measurement? Each correct answer represents a complete solution. Choose three.
mW dBm W
The main purpose of RF regulatory bodies is to:
provide management of RF such as maximum power and frequency.
The physical ______ of a building may determine whether a complete Wireless LAN RF site survey is necessary.
size
With respect to antennas used in IEEE 802.11 WLAN technology, the elevation is:
vertical coverage of an antenna radiation pattern.
What maximum amount of power per port is allocated in the IEEE 802.3-2012 Clause 33 (802.3af) Power over Ethernet amendment?
15.4 watts
What is the radio frequency value for the ISM (Industrial, Scientific, and Medical) band, which is specified in the IEEE 802.11-2016 standard?
2.4 GHz
IEEE 802.11g/n wireless network devices operate in which frequency band?
2.4 GHz ISM band
Interference from which device may cause a problem with an IEEE 802.11 wireless network in a manufacturing company?
2.4 GHz ISM band devices
What is the width of an ERP-OFDM channel in the 2.4 GHz ISM band?
20 MHz
What is the width of an IEEE HR/DSSS (802.11b) channel?
22
An HR/DSSS access point set to 50 mW of output power and channel 1 has a frequency bandwidth of _______.
22 MHz
Which IEEE 802.11n protection mode allows backward compatibility to non-802.11n devices?
3
SSID (Service Set Identifier) has a maximum of ____________ ASCII characters and is ____________.
32, case-sensitive
What is the maximum transmission rate of a USB 3.0 adapter that is capable of IEEE 802.11 WLAN connectivity?
4.8 Gbps
IEEE 802.11a/g networks use OFDM (Orthogonal Frequency-Division Multiplexing) to transmit data. How many total subcarriers are used for transmission with OFDM technology?
52
You are a WLAN consultant hired by XYZ Company. You are assigned the task of evaluating the network and notice support of a minimum of 6 Mbps. What IEEE 802.11 standard or amendment is in use on XYZ Company's WLAN?
802.11a
Your WLAN supports a maximum data rate of 54 Mbps. Which two of the following IEEE 802.11 standards or amendments are in use on your WLAN?
802.11a and 802.11g
You are a WLAN consultant hired by a hospital to assist with troubleshooting some performance issues with the IEEE 802.11 WLAN in a small office area of the records department. You determine the WLAN is experiencing interference from other devices that also use ISM (Industrial, Scientific, and Medical) RF bands. What IEEE standard or amendment devices are less susceptible to interference from other devices that also use the ISM RF bands and could be used in this office area?
802.11a/n/ac
You are a network administrator evaluating the possibility of deploying an IEEE 802.11 WLAN in an area that contains a large amount of 2.4 GHz ISM interference. Backward compatibility is not needed, as public access is not required and no legacy devices will be used with this wireless network. Devices conforming to which IEEE amendment would be good for this installation?
802.11a/n/ac
Your IEEE 802.11 WLAN operates in the 5 GHz frequency range. Which standard or amendment is in use on your WLAN?
802.11a/n/ac
The IEEE ______ standard addresses WPANs and includes Bluetooth and Zigbee networks.
802.15
The azimuth of sector antennas used with IEEE 802.11 wireless networks typically ranges from ____________.
90 to 180 degrees
Which of the following devices causes non-Wi-Fi interference in the 2.4 GHz ISM band? Each correct answer represents a complete solution. Choose three.
Bluetooth devices Wireless video cameras Microwave ovens
On which factor do the utilization and performance of an IEEE 802.11 WLAN access point depend?
Number of devices associated
Which of the following antenna types does wireless point-to-multipoint connection usually consist? Each correct answer represents a complete solution. Choose two.
Omnidirectional Multiple semi- or highly directional
What is the formula for calculating power?
P=E*I
______ is a way of restricting wireless network access such as available bandwidth or time of day to only authorized groups of users.
RBAC
Which of the following is an optional cipher method based on the IEEE 802.11i security amendment to the IEEE standard?
RC4
Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network?
Data Link
The ___________ layer of the OSI model is responsible for organizing the bit-level data for communication between devices on a network and detecting and correcting ____________ layer errors.
Data Link, Physical
Which antenna technology will help lessen the effects of multipath?
Diversity
What supply DC power and computer data directly at the Ethernet port?
Endpoint injectors
Which of the following access points support all communication standards by using the 5 GHz IEEE 802.11a/n/ac and the 2.4 GHz IEEE 802.11b/g/n dual-band radios?
Enterprise-grade
Which of the following software utilities allows a user to install the device driver and client utility simultaneously?
Enterprise-grade
The wireless bandwidth requirements are determined during which part of the WLAN site survey process?
Gathering of information
A spreading code is used with which IEEE 802.11 WLAN technology? Each correct answer represents a complete solution. Choose two.
HR/DSSS DSSS
You are performing a WLAN site survey in an environment that uses many microwave ovens. These ovens could cause interference with which IEEE 802.11 WLAN technologies? Each correct answer represents a complete solution. Choose two.
HR/DSSS ERP-OFDM
An 802.11n WLAN will support which protection mechanism?
HT
Which of the following factors should be taken into consideration when choosing antennas? Each correct answer represents a complete solution. Choose three.
Physical geometry of location Number of wireless access points Environmental conditions
You are a technical support engineer for an IEEE 802.11 wireless network in a small office complex. You are called in to check with a user who has been complaining that the wireless network is running slowly. As you change the orientation of the user's notebook computer, you notice the signal strength varies. Change in which of the following results in this variation in signal strength?
Polarity
Which amendment to the IEEE 802.11 standard addresses wireless mesh networking?
IEEE 802.11s
What is the area of radio frequency coverage called surrounding the visual line of sight? Each correct answer represents a complete solution. Choose two.
Fresnel zone RF line of sight
If a client device is showing a low receive signal strength, what would be the solution to improve the signal? Each correct answer represents a complete solution. Choose two.
Increase the transmit output power Adding more access points
With hidden node distance, client-device to client-device RF communication cannot occur because the client devices are too far apart and not in radio range of each other. What can be the resolution of this issue? Each correct answer represents a complete solution. Choose two.
Increasing the client transmit power Moving the client devices closer together
The overall performance expectations of a WLAN are considered which part of a site survey?
Information gathering
You are a computer network technician called in to help determine the best solution for a small WLAN installation. The office has 10 users with desktop and notebook computers, which are a combination of IEEE 802.11b and IEEE 802.11g devices, and a few legacy IEEE 802.11b print servers, which cannot be upgraded. The customer requires centralized management of the WLAN. Of the solutions listed, which would best satisfy the needs of the customer?
Install an IEEE 802.11n/ac BSS and allow for protection mechanisms.
Using which of the following devices may result in insertion loss in a WLAN system?
RF connectors
What can be a reason for low received signal strength at a receiver such as an IEEE 802.11 WLAN client device?
RF obstructions
In an IEEE 802.11g/n WLAN, coverage can be affected by ____________ and ____________. Each correct answer represents a complete solution. Choose two.
RF range in use propagation aspect of obstacles
A ______analysis allows a site surveyor to view areas or RF coverage as well as interference sources.
RF spectrum
Which of the following indicates that an IEEE 802.11 network experiences a hidden node problem?
Presence of excessive retransmissions
Which tool used with the RF WLAN site survey process would help to specifically identify existing IEEE 802.11 wireless networks in a proposed location for a new IEEE 802.11 WLAN deployment?
Protocol analyzer
Which modulation technique does an IEEE 802.11g/n WLAN will use when transmitting data at up to 600 Mbps?
QAM
A wireless bridge can be used to connect two or more LANs together. Which of the following are benefits of using a wireless bridge over a leased line from a service provider? Each correct answer represents a complete solution. Choose two.
Lower total cost of ownership More flexible
The unique physical address of a WLAN client network adapter is also known as what?
MAC (Media Access Control) address
While troubleshooting a problem on an IEEE 802.11 WLAN, you notice the two antennas on a single-input, single-output access point are at a 90-degree angle to each other. What potential effect would this have on the access point?
Reduce the advantage of antenna diversity.
An antenna is a device that focuses RF energy into specific radiation patterns. The gain of an antenna represents which type of power measurement?
Relative
The Wi-Fi Alliance is an organization that offers WLAN certifications. What statement is true with respect to the Wi-Fi Alliance?
The Wi-Fi Protected Access 2.0 certification is compliant with the IEEE 802.11i amendment.
What task is an important part of determining coverage requirements for the installation of an IEEE 802.11 wireless network?
Site survey planning
The capacity of an IEEE 802.11a/n/ac WLAN can be affected by which characteristic?
Software applications in use
Intended as a fix for IEEE 802.11 security weaknesses, which of the following was designed as a firmware upgrade?
TKIP
Which of the following protocols should be required for WLAN equipment to create an RSN? Each correct answer represents a complete solution. Choose two.
TKIP CCMP
Which of the following statements are true about SOHO-grade access points? Each correct answer represents a complete solution. Choose two.
These are best used in home environment. They usually have a limited number of connections for computers and devices.
Which statement is true regarding IEEE 802.11-compliant autonomous wireless access points?
They can be managed independently.
L2TP (Layer 2 Tunneling Protocol) is used in which type of security solution?
VPN
Which WLAN security solution would be best for users remotely connecting to a corporate network from a wireless hotspot?
VPN
Advanced IEEE 802.11 WLAN security solutions are addressed in which post-amendment Wi-Fi Alliance interoperability certification?
WPA 2.0
What software settings on an IEEE 802.11 WLAN access point could help with the hidden node problem caused by an obstruction?
RTS/CTS
Which of the following is a software solution for the hidden node problems?
RTS/CTS
An IEEE 802.11a/n/ac WLAN access point can be set to RF channels that will avoid interference from which sources?
Radar
When a wireless access point is in infrastructure mode, the access point will:
allow devices to IEEE 802.11 authenticate and associate.
Hiding the SSID (service set identifier) means to:
remove it from beacons.
Accuracy of a predictive modeling wireless site survey depends on:
the information that is input by a wireless surveyor.
The process in which a wireless LAN device connection moves from one access point to another is known as ______.
transitioning
PIN-based security is:
used for home and other small installations.
A _____ would be the best device to test the roaming features of an IEEE 802.11a/b/g/n/ac wireless computer network during a verification site survey.
voice handset
Which amendment to the standard supports antenna diversity to help reduce the effects of multipath?
IEEE 802.11a
With respect to IEEE 802.11 wireless networking and for antennas, what is the angle at which beamwidth is measured?
-3 dB point
DCF (Distributed Coordinated Function) mode is used in IEEE 802.11 wireless networking. This access method uses a contention period for devices competing to send data on the network. The following steps are involved: Detect RF energy. Announce how much time is required for the frame exchange. Back off and retry if the medium is busy. Wait for a predetermined period of time between frames. What is the order of the steps that the DCF mode uses to transmit a wireless frame?
1, 2, 4, 3
The IEEE 802.11g amendment to the standard supports which data rates?
1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
What maximum data rate does USB 1.0 support?
12 Mbps
How many channels are available for use with IEEE 802.11 wireless networking in the 2.4 GHz band without taking any regulatory domain into consideration?
14
You need to upgrade the firmware on a WLAN access point. Other than a software file downloaded from the manufacturer's website, what else will be needed to perform this function?
A TFTP server running on a computer
Which device will produce active gain?
Amplifier
Which statements are true regarding the co-location of HR/DSSS and ERP-OFDM systems? Each correct answer represents a complete solution. Choose two.
Both operate in the 2.4 GHz ISM band. Both have three non-overlapping channels.
Most enterprise-grade IEEE 802.11 wireless access points can operate in which modes? Each correct answer represents a complete solution. Choose two.
Bridge Root
What topology consists of multiple devices connected along a single shared medium with two defined endpoints?
Bus
Which of the following best describes the process that any and all modifications to the IT infrastructure will meet the company requirements, conform to company policy, and maintain a high standard of functionality and reliability?
Change management
Which of the following channels are considered as nonoverlapping channels in the 2.4 GHz ISM band? Each correct answer represents a complete solution. Choose three.
Channel 1 Channel 6 Channel 11
What does an IEEE organization create?
Computer networking standards
Which access points are commonly connected to and managed by WLAN controllers?
Controller-managed
Which device operates in 2.4 GHz band and may use either FHSS or DSSS for communication?
Cordless phones
Which of the following are advantages of an IBSS network? Each correct answer represents a complete solution. Choose two.
Easy to configure No need for access point hardware
Which intrusion activity cannot be detected by a wireless intrusion protection system?
Eavesdropping
A WLAN controller is an example of which type of PoE (Power over Ethernet) device?
Endpoint device
Which site-specific information should be gathered prior to a site survey? Each correct answer represents a complete solution. Choose three.
Floor plans Blueprints Electrical specifications
When an IEEE 802.11 WLAN device sends a probe request in an attempt to join a wireless network, it is participating in which phase?
IEEE 802.11 active scanning
In order for a WLAN client device to pass data traffic, it must first ____________, and then ____________.
IEEE 802.11 authenticate, IEEE 802.11 associate
You are a computer support technician contracted to help determine the best IEEE 802.11 WLAN solution for a small office installation. The office is located in a multitenant building on the fifth floor of an eight-story building. Another business in an adjoining office is using an IEEE 802.11b WLAN operating on channels 1 and 6. The customer wants maximum throughput and does not need backward compatibility to IEEE 802.11b. Of the following, which is the best solution for this installation?
Install an IEEE 802.11n/ac MIMO WLAN, disable ERP protection, and set the access point to channel 11.
Which feature of the built-in RADIUS server makes it a good solution for SMB (Server Message Block) or remote office locations?
It allows for limited number of users that can be created in the user database.
What is the function of a wireless repeater?
It extends the basic service area.
Which statement is true regarding WPA 2.0?
It is a Wi-Fi Alliance certification addressing security.
Which of the following are advantages of a manual site survey? Each correct answer represents a complete solution. Choose two.
It is accurate because it is based on actual readings. It allows verification of actual RF signal coverage and interference.
FM radio stations use what type of RF communication?
Narrowband
What are the actions involved in verification of an adequate AC power supply to wireless network? Each correct answer represents a complete solution. Choose two.
Perform calculations and verify that the power supply to the wiring closet will be adequate to support the powered infrastructure. Upgrade the electrical components of a wiring closet to support a new wireless network deployment.
Using a software-assisted manual WLAN site survey program consists of which task?
Performing a manual walkthrough of the environment
You are a consultant hired to provide occasional computer network support to a small accounting office. You are asked to install and configure security for a new WLAN access point. You choose to use the Wi-Fi Protected Setup configuration. What are required features of the Wi-Fi Protected Setup certification? Each correct answer represents a complete solution. Choose two.
Personal identification number Push-button configuration
What defines the start and end of two different overlapping sine waves?
Phase
Which layer connectivity is required to provide successful communications for IEEE 802.11 wireless networks?
Physical
At which of the following layers of the OSI model does IEEE 802.11 WLAN technology operate? Each correct answer represents a complete solution. Choose two.
Physical Data Link
Which of the following are considered as MDM (Mobile Device Management) solutions? Each correct answer represents a complete solution. Choose two.
SaaS On-premises
Which of the following section provide an overview of whom the policy will apply to, the use of the wireless spectrum, the acceptable use policy, and the importance of compliance.
Scope
A yagi antenna is considered as which type of antenna?
Semidirectional antenna
You are called in to troubleshoot a WLAN problem in a small office for an accounting firm. None of the employees can access the Internet; however, they do show a connection to the SOHO wireless router. Users were able to access the Internet prior to your being called in. You start by testing one user's workstation and issue a ping command to the wireless router. You do get a ping response, but you cannot ping across the router to a valid IP address on the Internet. Which could be a possible problem based on the symptoms you experienced?
The wireless router is not receiving a DHCP address from the ISP.
Which of the following can be defined as the distance of one complete 360-degree cycle of an AC (Alternating Current) signal in IEEE 802.11 WLAN RF technology?
Wavelength
The device driver for a USB WLAN adapter is either installed _________ or _________. Each correct answer represents a complete solution. Choose two.
manually automatically