Wireless Technologies - Ch. 10, CWTS-11-Performing an RF Wireless LAN Site Survey, itsp215/itsp216

Ace your homework & exams now with Quizwiz!

When an IEEE 802.11g wireless LAN consists only of wireless client stations, the network is operating as what type of basic service set?

A. Active ~B. Independent~ C. Passive D. Infrastructure

Wireless LAN devices in an 802.11a peer-to-peer network will connect to which device(s)?

A. An access point B. 802.11g client devices ~C. 802.11a client devices~ D. A wireless switch

In order for a wireless client to become completely part of the basic service set, it must first _______ and then ______

A. Associate, authenticate ~B. Authenticate, associate~ C. Deauthenticate, authenticate D. Disassociate, authenticate

What is a valid logical IP address?

192.168.200.1

what is a valid IP address

192.168.200.1

802.11b capable of which of the following data rates?

1Mbps, 5.5Mbps, 11Mbps

FHSS uses which communication method to exchange data?

1mhz-wide subcarriers

802.11e-2005

2 MAC methods needed to meet the QoS requirements for time-sensitive applications over IEEE 802.11 WLANs

Interference from existing ______ may cause a problem with an IEEE 802.11 wireless network in a manufacturing company.

2.4 GHz ISM band devices

Wi-Fi certified network devices can operate in what frequency band(s)?

2.4 GHz and 5 GHz

WiFi certified network devices can operate in what frequency band(s)?

2.4 GHz and 5 GHz

HR/DSSS devices operate in which frequencyt rane?

2.4 ghz ISM

IEEE 802.11g WLANs operate in what frequency range?

2.4-2.5ghz

IEEE 802.11g wireless networks can operate in which unlicensed RF band?

2.400-2.500 GHz ISM

an 802.11b channel is how wide in MHz

22 MHz

An 802.11b channel is how wide in MHz?

22MHz

An HR/DSSS channel is how wide?

22mhz

In the 2.4 GHz range, what distance between the center frequencies (in megahertz) is required for two channels to be considered nonoverlapping for HR/DSSS?

25 MHz

In the 2.4 GHz range, what distance between the center frequencies is required to be considered non-overlapping for HR/DSSS?

25 MHz

New Modulation

256-QAM modulation 30 percent increase in speed

How many nonoverlapping channels are available in the unlicensed 2.4 GHz ISM band?

3

Question 1 : How many characters is the maximum limit of a service set identifier (SSID)?

32

Static output Transmit power of a SOHO access point is typically

32 dbm

802.11y-2008

3650 MHz-3700 MHz licensed band in the United States requires content-based protocol (CBP) dynamic STA enablement (DSE) procedures

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?

4

How many unlicensed UNII-1 band channels are available for wireless LANs?

4

The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage.

48

The 802.3-2005 clause 33 standard specifies ___ VDC as the nominal voltage.

48 VDC

The nominal voltage supplied to Power over Ethernet (PoE) devices and specified in the IEEE 802.3-2005 Clause 33 amendment.

48 VDC

What is the nominal voltage for PoE?

48 volts of DC or VDC

802.11a-1999

5 GHz frequency space Orthogonal Frequency Division Multiplexing (OFDM) less-crowded 5 GHz U-NII bands U-NII-1, U-NII-2, and U-NII-3 band data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps

802.11a operates in the _______ GHz frquency ranges and uses the ______- frequency bands.

5, UNII

802.11a operates in the __________ GHz frequency range and uses the ___________ frequency bands.

5, UNII

Which frequency randes are used in an IEEE 802.11a-compliant wireless LAN?

5.25 ghz UNII range 5.35 ghz UNII range

A wireless repeater can reduce the data throughput by up to _____ percent.

50

OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate of ___ mbps.

54

According to 802.11a amendment which of the following data rates are mandatory

6, 12, and 24 mbps

Wired Equivalent Privacy (WEP)

64-bit static encryption

802.11g is backward-compatible with which of the following IEEE wireless LAN standards?

802.11 DSSS 802.11b HR/DSSS

Question 33 : Which of the following standards is used by DSSS modulation technique?

802.11b

Stations operating in which two IEEE 802.11 amendments are interoperable?

802.11b and 802.11g

A, C, D

802.11b is capable of which of the following data rates? (choose 3) A. 1 Mbps B. 6 Mbps C. 5.5 Mbps D. 11 Mbps E. 12 Mbps

Which IEEE 802.11 standard and which wireless access point grade can support Wi-Fi multimedia certifications and QoS?

802.11e Enterprise-grade

You are hired by ABC Company to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ______ or ______ amendments to the 802.11 standard. (Choose 2)

802.11g 802.11n

DSSS and HR/DSSS

802.11g is backward-compatible with which IEEE wireless LAN standards? (choose 2)

You are hired by ABC Comapny to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ________ or ________ amendments to the 802.11 standard.

802.11g, 802.11n

Ratified in 2005, which IEEE 802.11 amendment covers security?

802.11i

WPA was developed as an interim solution for which amendment to the 802.11 standard?

802.11i

Devices compiant with which amendment to the IEEE standard use multiple radio chains and multiple antennas

802.11n

The IEEE ________ amendment specifies fast transition (FT) and the IEEE ________ amendment helps with this functionality.

802.11r 802.11k

Which IEEE 802.11 standard and which wireless access point grade can support fast BSS transition (FT)?

802.11r Enterprise-grade

The IEEE ___________ amendment to the IEEE 802.11 standard included wireless mesh networking in 2011.

802.11s

Which IEEE 802.11 standard and which wireless access point grade can support security management frames?

802.11w Enterprise-grade

This IEEE standard defines VLANs.

802.1Q

Which IEEE standard does PoE fall under?

802.3 Ethernet

Formerly IEEE 802.3af, an amendment to the Ethernet standard for Power over Ethernet (PoE). Addresses supplying both data and DC power over a single Ethernet cable.

802.3-2005 Clause 33

10. The physical address of a network adapter is the _____. A. MAC address B. Logical address C. Layer 3 address D. Mesh address

A

16. Which protocol is responsible for addressing and routing? A. IP B. TCP C. UDP D. ARP

A

19. Which layer of the OSI model uses physical addresses to deliver data to the destination? A. Physical B. Data Link C. Network D. Transport

A

8. Which topology may use a token passing access method? A. Ring B. Mesh C. Bus D. Star

A

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity

A

A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the OS C. Hardware to install a PCI card D. Hardware to install a client bridge

A

How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8

A

Six wired clients can connect to a wireless LAN by using which device? A. Workgroup bridge B. PCI bridge C. Mini-PCI adapter D. PCI adapter

A

Which component is required for a successful installation and operation of an 802.11n wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows WZC

A

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint

A

HR/DSSS devices operate in which frequency range?

A - 2.400 GHz ISM

DSSS uses which spreading code in 1 Mbps?

A - Barker

Which network access method attempts to avoid collision?

A - CSMA/CA

FM radio stations use what type of RF communication?

A - High power, narrow bandwidth

L2TP commonly uses which encryption method?

A - IPSec

You are a wireless network administrator monitoring the reports for the recently installed wireless intrusion prevention system. You receive an alert notifying you of high level of RF activity detected from an access point operating as a sensor and currently set to channel 6. Which problem could be causing the alert? (Choose two)

A - Interference from a neighboring access point C - RF DoS attack

Which functions does RBAC provide?

A - Restricts access to authorized users and groups

Which process is a VPN solution intended to provide for users connecting to a network?

A - Secure Layer 3 transmissions over a public network infrastructure

Which security methods do 802.11a/b/g access points support? (Choose three)

A - WPA Enterprise B - WEP E - MAC filtering

Both________and______________ are WLAN security methods that support shared key security. (Choose two)

A - WPA2 Personal D - WPA Enterprise

physical

A MAC address is a unique identifier of each device on the computer network and is known as the _____ address.

dynamic frequency selection (DFS)

A P will allow client stations to associate based on the supported channel AP can quiet a channel to test for the presence of radar AP may test a channel for the presence of radar before using the channel AP can detect radar on the current channel and other channels AP can cease operations af ter radar detection to avoid interference interference is detected, the AP may choose a different channel to transmit

Six wired clients can connect to a wireless LAN by using which device?

A workgroup bridge

Which IEEE ratified amendments were defined in 2012? Choose two. A) 802.3af B) 802.11.af C) 802.11at D) 802.3at E) 802.1at F) 802.1af

A) 802.3af D) 802.3at Note, it is also called PoE+

Which items describe a service set identifier (SSID)? (Choose two.) A. 32 characters maximum B. 64 characters maximum C. Is case sensitive D. Is not case sensitive

A. 32 characters maximum C. Is case sensitive

A service set identifier (SSID) has a maximum limit of how many characters or octets?

A. 8 B. 16 ~C. 32~ D. 128

A spectrum analyzer can be used to view what? A. Radio frequency B. Wireless packets C. Data rates D. Association frames

A. A spectrum analyzer can be used to view radio frequency. Wireless packets, data rates, and association frames can be viewed with a protocol analyzer.

A basic service set identifier (BSSID) is the unique identifying MAC address of the ____________. A. AP radio B. AP Ethernet port C. Router D. Client

A. AP radio

Powered amplifiers provide an increase in signal strength by using ____________ gain. A. Active B. Passive C. Positive D. Maximum

A. Active Active gain requires an external power source to provide an increase in signal strength. An amplifier is an example of a device that uses active gain. Antennas provide an increase in strength by using passive gain.

802.11s-2011

Access points can therefore act as portal devices to a wireless distribution system (WDS) proposes the use of a protocol for adaptive, autoconfiguring systems that support broadcast, multicast, and unicast traffic over a multihop mesh WDS

How does the book define a consumer-grade access point?

Access points that are usually equipped with an Internet port, several ports for Ethernet connections, and a wireless access point.

D

According to the 802.11a amendment, which of the following data rates are mandatory? A. 1, 2, 5.5 and 11 Mbps B. 6, 24, and 54 Mbps C. 6, 9, 12, 18, 24, 36, 48, 54 Mbps D. 6, 12, and 24 Mbps E. 1, 6, 12, and 24 Mbps

Which devices are abbreviated by the initialism STA?

According to the IEEE 802.11 standard all wireless devices, including access points.

An increase in signal strength from devices such as amplifiers. Devices that provide active gain require an external power source.

Active gain

Part of the original IEEE 802.11 standard defining power save features for wireless LAN client devices. In this mode, no power save features are enabled, and the wireless LAN client device does not suspend to a low-power or doze state.

Active mode

Question 17 : You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager, who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?

Active mode

Part of the discovery phase of a wireless LAN. Allows for probe request and probe response frames to be sent and received. Takes place prior to IEEE 802.11 authentication.

Active scanning

Another term for independent basic service set (IBSS), a wireless network in which no access points are used and only device-to-device communication takes place. This type of network is also called peer-to-peer.

Ad hoc

Which of the following is correct regarding 802.11e?

Addresses wireless quality of service

Data Link

At which layer of the OSI model are bits compiled into frames?

physical and data link

At which two layers of the OSI model do wireless LANs operate?

In order for a wireless client to become completely part of the basic service set, it must first _______ and then _______

Authenticate, associate

A way to validate or confirm the identity or credentials of a user, client, or device. Can be user based or hardware based.

Authentication

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN. What is this process of identity validation called?

Authentication

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN?

Authentication

Newer technology used with IEEE 802.11 wireless LAN client devices to extend battery life by using a trigger frame for wireless devices to receive data buffered from an access point during a low-power or doze state.

Automatic Power Save Delivery (APSD)

14. At which layer of the OSI model are bits compiled into frames? A. Physical B. Data Link C. Network D. Transport E. Application

B

18. The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP

B

20. Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF

B

3. The lower three layers of the OSI model are _____, _____, and _____. A. Data link, Physical, Transport B. Physical, Data Link, Network C. Session, Physical, Application D. Application, Presentation, Session

B

A _____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation? A. Notebook B. Desktop C. Tablet D. Barcode scanner

B

A wireless workgroup bridge will allow you to do which of the following? A. Connect two wireless LAN NICs together. B. Connect a wired LAN to an AP. C. Connect a PCI card to a WLAN. D. Connect two client bridges.

B

Most manufacturers recommend installing a wireless IEEE 802.11n USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process

B

Power sourcing equipment delivers which of the following? A. RF power to the access point B. DC power to the end device C. RF power to an antenna D. DC power to an antenna

B

Static output transmit power of a SOHO access point is typically: A. 32 dBm B. 15 dBm C. 23 mW D. 15 mW

B

The IP address of a network adapter is also known as which address? A. MAC address B. Logical address C. Layer 4 address

B

USB was designed as a replacement for which two legacy communication connections? A. Serial and PCI B. Serial and parallel C. Parallel and ISA D. Parallel and EISA

B

Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility

B

Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN? A. Mini-PCI card B. Device driver C. Third-party utility D. Enterprise utility

B

Which layer of the OSI model is responsible for addressing and routing? A. Physical B. Network C. Transport D. Application

B

Which layer of the OSI model is responsible for delivering data to a unique hardware address? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

B

Which of the following statements is true regarding a wireless LAN controller? A. Virtual local area networks (VLANs) involve physical separation of ports. B. Virtual local area networks (VLANs) involve a logical separation of ports. C. Virtual local area network (VLAN) is another name for a repeater. D. Virtual local area networks (VLANs) require Power over Ethernet (PoE).

B

You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 2.0 C. Half Mini-PCIe D. PCMCIA

B

What is the maximum data rate of HR/DSSS 802.11b device?

B - 11 Mbps

OFDM uses which communication channel width to exchange data?

B - 20 MHz-wide channel

The 802.1X standard identifies that authenticator as another term for the ____________in wireless networking

B - Access Point

A newly configured wireless intrusion prevention system will ___________

B - Automatically monitor the network for potential attacks

The security amendment to the 802.11 standard requires___________

B - CCMP

You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation you could provide?

B - Carefully plan a strategy using WEP and VLANs

Which two channels could be used so that the access points do not interfere with each other in an 802.11g/n wireless network? (Choose three)

B - Channel 1 and Channel 9 C - Channel 6 and Channel 11 D - Channel 2 and Channel 8

Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?

B - PIN

Which security feature provides one of the strongest security methods for home based wireless networks?

B - Passphrase

A weakness with MAC address filtering is that it allows an intruder to ______________.

B - Spoof an address

How many access points can be co-located without channel reuse in the same RF area to maximize total system throughput while minimizing RF interference in an 802.11g/n network?

B - Three

Supported by WPA and WPA 2.0, RADIUS utilizes which type of authentication? A) 802.1X/WPA B) 802.1X/EAP C) 802.11X/WPA D) 802.11X/EAP E) 802.11AX/WPA F) 802.11AX/EAP

B) 802.1X/EAP

Enterprise-grade access points commonly include three types of antennas, choose the correct antennas from this list: A) Multi-directional B) Semi-directional C) Omnidirectional D) Mostly directional E) Highly directional F) Half-directional

B) Semi-directional C) Omnidirectional E) Highly directional

Which of these statements is true? Choose two. A) All SOHO-grade access points have adjustable RF output power B) Some SOHO-grade access points have adjustable RF output power C) Some consumer-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power E) All consumer-grade access points have adjustable RF output power

B) Some SOHO-grade access points have adjustable RF output power D) All enterprise-grade access points have adjustable RF output power

A basic service set (BSS) consists of how many access points? A. Zero B. At least one C. At least two D. At least four

B. At least one

In order for a wireless client to become completely part of the basic service set, it must first ____________ and ____________ then. A. Associate, authenticate B. Authenticate, associate C. Deauthenticate, authenticate D. Disassociate, authenticate

B. Authenticate, associate

A wireless workgroup bridge will allow you to do which of the following? A. Connect two WLAN NICs together B. Connect a wired LAN to an access point C. Connect a PCI card to a WLAN D. Connect two client bridges

B. Connect a wired LAN to an access point

Which is required in order to successfully install an IEEE 802.11ac WLAN adapter? A. Security profile B. Device driver C. Third-party client utility D. SOHO utility

B. Device driver

An azimuth chart shows which RF radiation pattern? A. Vertical B. Horizontal C. Positive D. Negative

B. Horizontal The horizontal RF radiation pattern of an antenna is displayed using an azimuth chart. The vertical radiation pattern is displayed using an elevation chart.

When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set? A. Active B. Independent C. Passive D. Infrastructure

B. Independent

Which of the following are benefits of a wireless repeater? (Choose two.) A. Higher data transfer rate. B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput. E. Extends cell size.

B. Larger cell size allows more devices to access the medium. E. Extends cell size.

You have been hired by a company to perform a wireless LAN site survey in a multitenant building. You discover numerous access points on channels 1, 6, and 11. To optimize the new deployment, what recommendation could you make to the customer? Assume that all new hardware will be purchased and backward compatibility is not required. A. Configure the access points to automatic channel selection for the 2.4 GHz ISM band. B. Configure the access points to operate in the 5 GHz band. C. Perform a spectrum analysis to find space in the 2.4 GHz band. D. Perform a predictive modeling site survey to determine which channels to use.

B. Since new hardware will be purchased and backward compatibility is not required, you could recommend using wireless network hardware that works in the 5 GHz band. This will eliminate interference from the other tenants that are using the 2.4 GHz ISM band. Automatic channel selection, spectrum analysis, and predictive modeling site survey will not help because surrounding access points already use the entire band.

Wireless bridges must be configured with and . (Choose 2.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy

BC

Which of the following is a benefit of a wireless repeater? (Choose 2.) A. Higher data transfer rate B. Larger cell size allows more devices to access the medium. C. Smaller cell size allows fewer devices to access the medium. D. Less data throughput E. Extends cell size

BE

DSSS uses which spreading code at 1mbps

Barker

When implementing a wireless LAN, what is the area covered by an AP and usable by a client station called?

Basic Service Area

The area of radio frequency coverage surrounding an access point or other wireless infrastructure device and the associated wireless LAN client devices.

Basic service area (BSA)

One access point connected to a distribution system.

Basic service set (BSS)

The MAC address or physical address of a wireless access point radio card. Should not to be confused with service set identifier (SSID).

Basic service set identifier (BSSI)

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _________ frames, and active scanning, where a client sends and receives _________ frames.

Beacon ; Probe

Which of the following frames is used in the passive scanning mechanism?

Beacon management frame

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _______ frames, and active scanning, where a client sends and receives ________ frames.

Beacon; Probe

Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge only mode B. Repeater only mode C. Root access point mode D. Access mode

C

Which client device will allow a user to connect several Ethernet devices on a common segment to an access point? A. PCMCIA B. PCI bridge C. Wireless workgroup bridge D. Ethernet bridge

C

You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter. Which card would work best in this case? A. PCI B. Half Mini-PCIe C. PCMCIA D. ISA

C

Which frequency range are used in an 802.11a compliant WLAN? (Choose two)

C - 5.25 GHz UNII range D - 5.35 GHz UNII range

The length of a WEP key is typically _____________ or __________

C - 64-bit, 128-bit

RADIUS requires users on a wireless network to perform what functions?

C - Enter a username and password that will be centrally administered

Which WLAN technology can be used to obtain the highest data transfer rate possible?

C - HR-OFDM

802.11a/b/g/n/ac devices use what type of communication?

C - Half Duplex

What type of wireless network device is PIN based security most commonly used with?

C - SOHO brands that support WPS

What technology is used to send WLAN data over a wireless medium using many sub-carrier frequencies?

C - Spread Spectrum

Which 802.11 PHY technology specifies an 80 MHz-wide channel for transmitting and receiving data?

C - VHT-OFDM

You need to attend a business meeting out of town that requires air travel. You are in the airport and have some extra time. While waiting to board your plane you decide to check your office email using an 802.11g/n wireless hotspot access point at the airport. In order to provide a secure connection, you would enable your notebook computer to use_____________

C - VPN to the corporate network

You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term? A. Dynamic frequency selection B. Transmit power control C. Dynamic rate switching D. Transmit save mode

C. Dynamic rate switching

Protocol using mechanisms that attempt to avoid collisions. This protocol is required with IEEE 802.11 wireless networking because the wireless devices have no way of detecting a collision. Instead, devices will use a method that may involve reserving the wireless medium for a specified period of time, attempting to avoid collisions.

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)

Which weather element would commonly have an effect on a WLAN system? A. Rain B. Snow C. Wind D. Hail

C. Wind Of the answers listed, wind would have the biggest impact on a WLAN system. Rain, snow, and hail do not affect wireless transmission unless the weather is severe. In this case, the collection of the elements may have an impact on the WLAN signal transmitted or received.

Data Integrity

CCMP uses a much stronger MIC - Message Integrity Check (MIC) in the trailer of all 802.11 frames is a 32-bit CRC known as the frame check sequence (FCS)

In Europe radio Frequencies are managed by

CEPT

Which network access method attempts to avoid collisions?

CSMA/CA

With respect to IEEE 802.11 wireless networking, the capacity is how many wireless client devices or users that an access point can service effectively, offering the best performance.

Capacity

Which two channels could be used so that the access points do not interfere with each other in an 802.11b wireless network?

Channel 2, 3, 6, 8, 9, and 11

The area or cell of radio frequency that surrounds a wireless access point.

Coverage

11. The term encapsulation means to _____. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload

D

15. Which protocol is used to guarantee delivery? A. UDP B. IP C. ARP D. TCP E. HTTP

D

17. Which layer of the OSI model allows physical addresses to be converted to logical addresses? A. Application B. Session C. Transport D. Network E. Data Link

D

9. Which layer of the OSI model provides an interface to the user? A. Physical B. Network C. Transport D. Application E. Data Link F. Presentation

D

Enterprise-grade IEEE 802.11g client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey

D

In addition to wireless networking, which adapter was designed for flash memory storage and can be used in a digital camera? A. PCI B. PCMCIA C. ISA D. SDIO

D

In computer network terminology, the definition of half duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time

D

Of all the devices listed, Secure Digital Input Output (SDIO) cards are most likely to be installed in which? A. Desktop computer B. Access point C. Notebook computer D. Pocket PC

D

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors? A. Application B. Transport C. Network D. Data Link E. Physical

D

Which wireless adapter may require some disassembly of a notebook computer to install? A. PCI B. PCMCIA C. PC Card D. Mini-PCI

D

You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wireless LAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0

D

In computer network terminology, the definition of half-duplex is closest to which of the following? A. One-way communication only B. One-way communication one way at a time C. Two-way communication both directions simultaneously D. Two-way communication one way at a time

D. Two-way communication one way at a time

RF line of sight is required for which type of IEEE 802.11 WLAN installation? (Choose two.) A. Point-to-point B. Scattered C. Point-to-multipoint D. Reflected E. Refracted

A. Point-to-point C. Point-to-multipoint Point-to-point and point-to-multipoint both require RF line of sight to be able to effectively communicate. Scattering, reflection, and refraction are all behaviors of RF.

A performance condition that occurs when two or more access point radios are providing RF coverage to the same physical area using overlapping frequencies. Simultaneous RF transmissions by two or more of these access point radios in the same physical area can result in corrupted IEEE 802.11 frames due to the frequency overlap. Also called adjacent overlapping channel interference. This definition may vary depending on the source.

Adjacent-channel interference

Enterprise access points may contain which of the following features? (Choose three.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment

A. WPA 2.0 support B. RADIUS server D. Repeater mode

A basic service set (BSS) consists of how many access points?

A. Zero ~B. At least one~ C. At least two D. At least four

Access points work at which layers of the OSI model? (Choose 2.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

AB

Which of the following are midspan PoE devices? (Choose 2.) A. Single-port injectors B. Multiport injectors C. Endpoint injectors D. Endspan injectors

AB

Enterprise access points may contain which of the following features? (Choose 3.) A. WPA 2.0 support B. RADIUS server C. Static output power D. Repeater mode E. Power sourcing equipment

ABD

Wireless LAN controllers may contain which of the following features? (Choose 3) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing

ABD

SOHO access points are typically configured by using and _____. (Choose 2.) A. HTTP B. FTP C. HTTPS D. CLI E. SMTP

AC

SOHO access points commonly support which of the following features? (Choose 3.) A. WPA 2.0 support B. CLI configuration C. Static output power D. Wi-Fi certifications

ACD

A basic service set identifier (BSSID) is the unique identifying MAC address of the _______.

AP Radio

Which one of the following adjustments can most benefit a high density environment?

APs with lower output power

An actual power measurement, not a ratio or a relative value; examples include watt (W), milliwatt (mW), and decibel relative to one milliwatt (dBm).

Absolute measure of power

Occurs when material absorbs an RF signal. None of the signal penetrates through the material.

Absorption

Technology introduced in the IEEE 802.11n amendment to describe various HT-OFDM data rates depending on the wireless LAN technology in use such as 20/40 MHz wide radio frequency channels or short guard interval.

Modulation and coding scheme (MCS)

Radio frequency channels that do not occupy the same part of the radio spectrum. In IEEE 802.11 wireless networking, there must be a separation of five channels or 25 MHz to be considered nonoverlapping.

Nonoverlapping channels

A data frame that contains no frame body and therefore has no data. It is used by a wireless station to inform an access point of a change in power save status.

Null function frame

The Capacity of an access point is dependent upon which two factors?

Number of Users Software Applications

What factor usually determines whether a wireless LAN site survey is required?

Number of access points

Which of the following is a main factor in determining the number of access points required for an IEEE 802.11n wireless LAN deployment?

Number of client devices

IEEE 802.11a uses which PHY technology

OFDM

application, presentation, session, transport, network, data link, physical

OSI levels

Which item has an effect on RF line of sight?

Obstacles

Tube shaped Antenna forms what type of direction of connection?

Omnidirectional

Which would be the best antenna choice for a general office that requires complete coverage throughout the entire location?

Omnidirectional

An antenna connected to an access point and commonly used indoors to provide 360-degree horizontal coverage. It can also be used with outdoor installations for point-to-multipoint connections.

Omnidirectional antenna

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

One or more

Question 11 : Which of the following is the default authentication method used by the 802.11 devices?

Open System authentication

An automatic authentication process defined by the IEEE 802.11 standard to give wireless LAN client devices the capability to connect to an access point. It consists of two wireless frames.

Open system authentication

IEEE 802.11

Original IEEE 802.11 Standard published in June 1997 - IEEE Std 802.11-1997 revised in 1999 reaffirmed in 2003 - IEEE Std 802.11-1999 (R2003) On March 8, 2007 - IEEE Std 802.11-2007 March 29, 2012 - IEEE Std 802.11-2012

A technology designed to transmit many signals simultaneously over one transmission path in a shared medium; it is used in wireless networking with IEEE 802.11a/g/n networks.

Orthogonal frequency division multiplexing (OFDM)

9, 18, 36, 48, 54 Mbps

Orthogonal frequency division multiplexing data rates supported but not required

6,12,24 Mbps

Orthogonal frequency division multiplexing required data rates

In what type of WiFi deployment is an antenna mounted using a pole mounting kit, as shown in the exhibit?

Outdoor Bridging

A newer term for the PCMCIA adapter. The PC Card has been replaced with ExpressCard technology.

PC Card

Personal Computer Memory Card International Association, a standards organization that defines and promotes PC card technology. Also used as the name of the card.

PCMCIA

You need to select a wireless LAN card for a notebook computer to connect to an IEEE 802.11n network. The notebook has an interface or slot on the side that will accept one of three physical types of adapter which card would work best in this case?

PCMCIA

Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way?

PCMCIA/USB 2.0

Identifies the Physical layer (Layer 1) of the OSI model, which consists of bit-level data streams and computer network hardware connecting the devices together.

PHY

Directional Dish Bowl shaped

Parabolic Dish

A highly directional (high-gain) antenna typically used outdoors for long-range point-to-point links.

Parabolic dish antenna

The result of focusing isotopic energy into a specific radiation pattern. Using an antenna to achieve passive gain results in an increase or change in RF coverage.

Passive gain

Question 15 : When a wireless LAN device listens for beacon frames, it is participating in which phase?

Passive scanning

The process in which IEEE 802.11 wireless LAN client devices "listen" to the RF medium for beacons that advertise the presence of an IEEE 802.11 wireless network.

Passive scanning

An antenna providing semidirectional coverage and a more specific radiation pattern than an omnidirectional antenna (but less specific than a highly directional antenna). This antenna can be used either indoors or outdoors.

Patch/panel antenna

Which WiFi vertical market applications are regulated by a government or industry group for security compliance?

Patient records in hospitals, Consumer payment information in retail stores

Another term for independent basic service set (IBSS), a wireless network in which no access points are used and only device-to-device communication takes place. This type of network is also called ad hoc.

Peer-to-peer

B

Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network

802.11ae-2012

QoS management quality-of-service management frame (QMF) service can be enabled

The WiFi Multimedia (WMM) certification, which is illustrated in the exhibit, pertains to which topic?

Quality of Service

Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification?

Quality of Service

Temporal Key Integrity Protocol (TKIP)

RC-4 stream cipher algorithm - enhancement of WEP encryption

What Layer of the OSI model is responsible for organizing the bit level data for communication of devices on a network and detecting and correcting physical level errors

Data Link

What layer of the OSI reference model is responsible for data framing for a given physical layer technology?

Data Link

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors.

Data Link

Circuitry that carries data between components such as the CPU, memory, and expansion boards or slots within a computer.

Data bus

Question 6 : As a device moves away from an access point, which of the following is true regarding dynamic rate switching?

Data rate decreases

The process of losing an IEEE 802.11 authentication from a system. In IEEE 802.11 wireless LAN technology, logging off or roaming from a basic service set will deauthenticate. It is a notification, not a request, and can be sent from either an access point or an associated wireless device.

Deauthentication

What unit of measurement is used to measure the power difference between two RF signals?

Decibel

A ____ computer requires the user to disassemble the computer case to install a wireless PCI network adapter. Which computer would be the best candidate in this situation?

Desktop

Which component is required for a successful installation and operation of an 902.11n wireless USB adapter?

Device Driver

Which item is required for an IEEE 802.11g PCI card to communicate with a computer connected to an unsecured wireless LAN

Device Driver

Method in which traffic is handled by the edge device such as an access point, eliminating the need to send data through the infrastructure to a wireless LAN controller for processing.

Distributed data forwarding

An infrastructure, wired or wireless, connecting to an access point that allows data to be sent from wireless devices to resources on a network.

Distribution system (DS)

ABC Company would like to provide WiFi coverage to the are highlighted on the floorplan in the exhibit. If mounted at location-A, what type of antenna would provide a coverage pattern similar to the highlighted area?

Diversity Patch

____________________ delivers DC power directly over the same wire pairs that carry data over the unused wire pairs.

Endpoint injector

VPN solutions are often used in conjunction with WIFi networks for what purpose?

Endpoint secuirty for traveling users connected to unsecure WiFi hot-spots

A wireless infrastructure device with an extensive feature set; it is connected to a distribution system, allowing wireless LAN devices to access computer network resources. Contains at least two network interfaces, 10/100/1000 BaseT/Tx Ethernet (usually) and RF (wireless).

Enterprise access point

List the three interfaces typically available on a wireless branch router/remote access point.

Ethernet port(s) Internet port to connection to the WAN or an Internet connection Wireless port to allow IEEE 802.11 computers and devices to connect to a network through a wireless connection

The "next generation" of a PC card. Lower in cost, smaller in size, and higher in performance.

Express Card

802.11g-2003

Extended Rate Physical (ERP) transmit in the 2.4 GHz to 2.4835 GHz ISM ERP-OFDM - Extended Rate Physical OFDM Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps ERP-DSSS/CCK - used with support for the data rates of 1, 2, 5.5, and 11 Mbps

Protection mechanism used with IEEE 802.11g wireless LAN systems to allow backward compatibility and coexistence between ERP, DSSS, and HR/DSSS wireless devices.

Extended rate physical (ERP) protection

One or more interconnected basic service sets connected to a common distribution system.

Extended service set

Another term for service set identifier (SSID), used by manufacturers to identify the name of a wireless network.

Extended service set identifier (ESSID)

Given: You are recommending an AP for use in a warehouse environment. Some APs will require directional antennas and others will use dipole antennas. What feature must be supported by the APs in this installation?

External antennas

Given: You are recommending an AP for use in a warehouse environment. Some APs will reuqire diectional antennas and others will use dipole antennas. What feature must be supported by the APs in this installation?

External antennas

What organization is responsible for unlicensed frequency band regulation in the united states?

FCC

Bluetooth devices use ____ which an poentially cause interference with WLANs.

FHSS

It is unimportant to have knowledge existing network infrastructure forma wired and wireless perspective when deploying a new wireless network. (True/False)

False

True or False: An administrator should always configure an access point from the wireless network.

False

True or false, SOHO-grade access points usually have a more extensive feature set than enterprise-grade access points.

False

True or false: A benefit of a wireless LAN controller is distributed administration.

False

True or false: An administrator should always configure an access point from the wireless network.

False

True or false: a benefit of a wireless LAN controller is distributed administration.

False

True or false, PoE spends AC voltage and computer data over the same Ethernet cable, enabling a device to receive AC power and computer data simultaneously.

False, DC power

True or false, In a full mesh network all nodes connection together with one path for every node.

False, full mesh needs at least two paths for every node.

True or false, Centralized data forwarding reduces the amount of infrastructure traffic because the controller-managed access point is able to make more decisions, taking some of the load away from the wireless controller.

False, this describes distributed data forwarding

True or false, consumer-grade access points are typically equipped with NAT, DHCP, DNS services, and wireless repeater functionality.

False, wireless repeater functionality is typically not a feature of consumer-grade access points.

802.11ak

General Link (GLK) bridged networks

HT protection mode that allows only high throughput (HT) functionality. IEEE 802.11a/b/g stations on the same channel are not allowed to connect. These devices will not communicate with a Greenfield access point, and transmissions will collide, resulting in errors.

Greenfield mode (mode 0)

Directional antenna See through

Grid

What two types of antennas are used in point to point connections

Grid and Parabola

A metal rod driven into the earth 8 feet or more and used to direct electrical currents to earth ground that are caused by lightning strikes.

Grounding rod

HT protection mode used in IEEE 802.11n networks only if HT stations are associated in the BSS and at least one 20 MHz HT station is associated.

HT 20 MHz protection mode (mode 2)

HT protection mode used in IEEE 802.11n networks if one or more non-HT (IEEE 802.11a/b/g) stations are associated in the BSS. This is the most common mode used with IEEE 802.11n wireless networks to date.

HT mixed mode (mode 3)

HT protection mode used in IEEE 802.11n networks if there are non-HT stations (IEEE 802.11a/b/g) or access points using the primary or secondary channels.

HT nonmember protection mode (mode 1)

Which wirelessLAN technologycan be used to obtain the highest data transfer rate possible?

HT-OFDM

SOHO access points are typically configured by using and . (Choose 2.)

HTTP and HTTPS

SOHO access pints are typically configured by using ___ and ___

HTTP/HTTPS

IEEE 802.11a/b/g/n devices use what type of communication?

Half Duplex

The Half Mini-PCIe card is half the length of the Mini-PCIe card. The length is the only difference between the two.

Half Mini-PCIe

Two-way communication that occurs in only one direction at a time.

Half-duplex

Implementations that may have existing non-wireless LAN devices that will potentially interfere with a 2.4 GHz wireless LAN deployment most likely fall under what business model?

Healthcare

The amplitude of an RF signal is:

Height

Which of the following is the amplitude of an RF signal?

Height

FM radio stations use what type of RF communication?

High power, Narrow bandwidth

A spread-spectrum technology used in IEEE 802.11b and IEEE 802.11b/g with data rates of 5.5 and 11 Mbps set on a specific radio frequency channel.

High rate/direct-sequence spread spectrum (HR/DSSS)

Protection mechanism that allows IEEE 802.11n devices to be backward compatible and coexist with IEEE 802.11a/b/g devices. There are four HT protection modes.

High throughput (HT) protection

802.11b-1999

High-Rate DSSS (HR-DSSS) 2.4 GHz to 2.4835 GHz ISM band Complementary Code Keying (CCK) Barker code data rates of 1, 2, 5.5, and 11 Mbps

What is an accurate description of peer communication

Horizontal link and Logical Link

Operating system feature that allows for replacement of computer system components and devices without powering down the system.

Hot-plug

In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?

How will PoE be supplied to WiFi client devices?

In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?

How will Power over Ethernet (PoE) be supplied to Wi-Fi client devices?

Given: Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?

IBSS

A wireless LAN site survey and design includes defining and security requirements to help protect against RF jamming and protect the integrity of information.

Physical, Data

At which two layers of the OSI model do wireless LANs operate?

Physical/Data Link

Which scenario represents an improper installiation for an AP with low-gain omnidirectional antennas?

Place above the doorway, at one end of a long hallway

Which scenario represents an improper installation for an AP with low-gain omnidirectional antennas?

Placed above the doorway, at one end of a long hallway

Of all the devices listed Secure Digital Input Output (SDIO) cards are most likely to be installed in which?

Pocket PC

A Layer 3 VPN solution that uses the Microsoft 128-bit Point-to-Point Encryption (MPPE) protocol and provides both tunneling and encryption capabilities.

Point-to-Point Tunneling Protocol (PPTP)

three

Point-to-multipoint links consist of __________ or more connections.

semidirectional and highly directional antennas

Point-to-point links typically use which antenna types?

In order to extend network access from Building 1 to Building 2, ABC Company has implemented a WiFi solution. What type of WiFi solution is shown in the figure?

Point-to-point, Semidirectional, Bridge

Which communication amendments are commonly supported by consumer and SOHO-grade access points?

IEEE 802.11b IEEE 802.11g IEEE 802.11n IEEE 802.11ac

An amendment to the IEEE 802.11 standard that specifies operation in the 2.4 GHz ISM band for data rates of up to 54 Mbps and the OFDM Physical layer specification with Extended Rate Physical (ERP). IEEE 802.11g provides backward compatibility to IEEE 802.11b.

IEEE 802.11g

2.4-2.5 GHz

IEEE 802.11g WLANs operate in what frequency range?

An amendment to the IEEE 802.11 standard that specifies operation in the 2.4 GHz ISM band and the 5 GHz UNII band with data rates of up to 600 Mbps. IEEE 802.11n provides backward compatibility to IEEE 802.11a/b/g.

IEEE 802.11n

A

IEEE 802.11n devices use an enhanced radio technology known as multiple-input multiple-output (MIMO). Which statement correctly describes a benefit of MIMO? A. MIMO uses reflections to allow for increased throughput. B. MIMO rejects reflections to allow for increased throughput. C. MIMO uses a single radio with diversity technology for increased throughput. D. MIMO rejects data rates less than 54 Mbps for increased throughput.

Authentication

IEEE 802.1X authorization framework - Extensible Authentication Protocol (EAP) preshared keys (PSKs)

SOHO-grade access points also provide more advanced security features, such as user-based authentication ___________________ and _____________________.

IEEE 802.1X/EAP VPN pass-through

Formally known as the Mini-PCIe card, it became known as the Full Mini-PCIe card with the introduction of the Half Mini-PCIe card form factor.

Full Mini-PCIe

Identify the two configuration methods for access points.

GUI CLI

An increase in signal strength of an RF signal, caused by an increase in amplitude. See also active gain, passive gain.

Gain

An amendment to the Ethernet standard for Power over Ethernet (PoE) that addresses supplying both data and DC power over a single Ethernet cable. It allows for a maximum of 15.4 watts of power at the port and is also known as IEEE 802.3-2005 Clause 33.

IEEE 802.3af

IEEE Std 802.11-2007

IEEE consolidated 8 rati! ed amendments along with the original standard IEEE Std 802 .11-1999 (R 20 03) IEEE Std 802 .11a-1999 IEEE Std 802 .11b-1999 IEEE Std 802 .11d-20 01 IEEE Std 802 .11g-20 03 IEEE Std 802 .11h-20 03 IEEE Std 802 .11i-20 04 IEEE Std 802 .11j-20 04 IEEE Std 802 .11e-20 05

Which protocol is responsible for addressing and routing?

IP

Who manages the RF spectrum Globally

IRU-R(International Telecommunication Union-Radiocommunication)

Industrial, Scientific, Medical

ISM

Radio bands that are reserved internationally for the use of radio frequency for industrial, scientific, and medical (ISM) purposes.

ISM

The measurement of alternating current AC resistance, measured in ohms.

Impedance

What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?

In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other

The horizontal or vertical orientation of the E-field propagated from an antenna element.

Polarization

_________________ is an extension to the IEEE 802.3 Ethernet standard that allows direct current voltage to be supplied over Ethernet cable to wireless access points.

Power over Ethernet

What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?

In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other.

A method for supplying DC voltage and computer data together over a single Ethernet cable.

Power over Ethernet (PoE)

The capability of a wireless LAN client device to suspend to a low-power state, thereby extending the battery life and allowing for longer data communications.

Power save

A device that will supply DC voltage and computer data to wired computer network devices such as wireless access points, video cameras, and VoIP phones. PSE can be either an endpoint or a midspan device.

Power sourcing equipment (PSE)

A

In the 802.11a amendment, the UNII-3 band can be used for which of the following WLAN applications? A. Indoor and outdoor B. Outdoor only C. Indoor only D. The UNII-3 band cannot be used for WLANs.

Correct Question 27 : When an IEEE 802.11g wireless LAN consists only of wireless client stations, the network is operating as what type of basic service set?

Independent

A wireless network in which no access points are used and only device-to-device communication takes place. Other terms for this type of network are ad hoc and peer-to-peer.

Independent basic service set (IBSS)

In the 802.11i amendment the UNII-3 band can be used for which of the following WLAN applications?

Indoor and Outdoor

An architecture, developed by IBM, which allowed for expansion cards in early models of personal computers.

Industry Standard Architecture (ISA)

An operation mode that allows wireless LAN client devices to connect to resources on the wired network or to other wireless client devices by using an access point.

Infrastructure mode

A form of signal loss caused by RF connectors. It is minor but can contribute to overall loss in a system, thereby resulting in less signal and less throughput.

Insertion loss

Access point, VoIP phone, camera, or other computer network device that receives Power over Ethernet from the power source equipment.

Powered device (PD)

Given: You are performing a site survey software that simulates RF behavior in a defined environment. It uses a floor plan and materials information for its calculations. What kind of site survey is performed using this method?

Predictive

Given: You are performing a site survey using software that simulates RF behavior in a defined environment. It uses a floor plan and materials information for its calculations. What kind of site survey is performed using this method?

Predictive

A software-based site survey tool sold by your company allows your customers to determine access point coverage and optimum placement within a facility without visiting the facility. What is the term that most accurately describes this type of site survey?

Predictive Modeling

A software-based site survey tool sold by your company allows your customers to determine access point coverage and optimum placement within a facility without visiting the facility. What is the term that most accurately describes this type of site survey?

Predictive Modeling

A ______analysis allows a site surveyor to view areas or RF coverage as well as interference sources.

RF Spectrum

RF coverage is also known as the __________

RF cell or basic service area (BSA)

Unobstructed radio communication between a radio transmitter and receiver.

RF line of sight

Frequency Hopping Spread Spectrum (FHSS)

RF signal is considered spread spectrum when the bandwidth is wider than what is required to carry the data Clause 14 devices

Which Layer of the OSI model do wired Ethernet repeaters function?

Layer 1

Access points work at which layers of the OSI model?

Layer 1 and 2

Access points work at which layers of the OSI model?

Layer 1 and Layer 2

At which of the following layers of the OSI model does WLAN function?

Layer 1 and Layer 2

Which Layer of the OSI model do wireless Ethernet repeaters function?

Layer 2

Which layer of the OSI model is responsible for delivering data to a unique hardware address?

Layer 2

If a user with a wireless client device moves from one radio cell to another and maintains connectivity, ___________ occurs.

Layer 2 transition (roaming)

Layer 3 (Network)

Layer where the IP protocol resides

Device used to shunt electrical currents from indirect lightning strikes to the ground. Protects electronic devices connected to the system from damage.

Lightning arrestor

The ability of a transmitter and receiver to "see" each other (visual line of sight) or to transmit RF energy (RF line of sight). RF line of sight is the area of coverage around the visual line of sight.

Line of sight

In radio frequency technology terms, the shape of the RF energy emitted from an antenna element; it is in the form of main, side, and rear.

Lobe

Sixth layer of the OSI Model

Presentation

Question 10 : Which of the following frames is used in the active scanning mechanism?

Probe request frame

A specific connector used by a manufacturer to limit the type of antenna that can be connected to a device. This connector prevents the use of an antenna that would violate local RF regulations.

Proprietary connector

A set of rules that defines data communication between devices. TCP/IP is a common protocol set used in computer networking.

Protocol

802.11aa-2012

QoS enhancements to the 802.11 Media Access Control (MAC) improved management, increased link reliability, and increased application performance

LAN

Local Area Network

The IP address of a network adapter is also known as which address.

Logical Address

The IP address of a network card is known as what address

Logical Address

A decrease in radio frequency power or energy, resulting in lower overall throughput in a wireless network.

Loss

PMD(Physical Medium Dependant)

Lower physical sublayer responsible for transmitting the data onto the wireless medium.

The physical address of a network adapter is the

MAC address

The physical address of a network card is called what

MAC address

The sublayer of the Data Link layer (Layer2) of the OSI model that handles the media access control.

MAC sublayer

Which of the following modulation techniques is defined in new 802.11n specifications?

MIMO

IEEE 802.11n devices use an enhanced radio technology known as multiple input multiple output (MIMO) Which statement correctly describes a benefit of MIMO?

MIMO uses reflections to allow for increased throughput.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

Management

What statement accurately descibes an advantage of manual RF site surveys over predictive site surverys?

Manual site surverys are useful for locating and identifying sources of RF interference while predictive site surveys are not capable of this task

What statement accurately describes an advantage of manual RF site surveys over predictive site surveys?

Manual site surveys are useful for locating and identifying sources of RF interference, while predictive site surveys are not capable of this task.

This operation mode for enterprise-grade access points connects access points together wirelessly without the use of a wired infrastructure.

Mesh Mode

MAN

Metropolitan Area Network

Which of the following devices is an in-line device that will inject DC voltage into Ethernet cable?

Midspan

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable?

Midspan

Usually a single port or multiple port injector; any device that injects DC power into Ethernet cable over the unused pairs of wires to allow both DC power and computer data to the end (powered) IEEE 802.3af device.

Midspan device

_____________________ injects DC power into the Ethernet cable over the unused wire pairs or over the data pairs, depending on the version of the standard in use.

Midspan injector

A measure of radio frequency power that is equal to 1/1000 watt.

Milliwatt (mW)

Variation of the PCI standard designed for laptops and other small-footprint computer systems.

Mini-PCI

Which wireless adapter may require some disassembly of a notebook computer tp install?

Mini-PCI

Identify three of the four PCI card types, as they're generally listed i.e. not worrying about the stupid IA, IB, types

Mini-PCI Mini-PCIe Full Mini-PCIe Half Mini-PCIe

Identify the wireless radio interface type depicted in the illustration.

Mini-PCIe

Replacement for the Mini-PCI card based on PCI Express. Available in three types: Type I, Type II, and Type III. Now called the Full Mini-PCIe card after the introduction of the Half Mini-PCIe.

Mini-PCIe

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

Mismatched SSID

In wireless networking, a wireless device that collects propagated RF energy from the air via an antenna. It demodulates and recovers any data included in the signal.

Receiver

What two devices use RF to communicate? (Choose two.)

Receiver Transmitter

What type of protection does a lightning arrestor provide to a Wi-Fi system?

Redirection of transient current due to nearby lightning strikes

What type of protection does a lightning arrestor provide to a WiFi system?

Redirection of transient current due to nearby lightning strikes

A feature that allows for fault-tolerant deployments and uninterrupted access in the event of access point or wireless LAN controller or other network device failure.

Redundancy

An effect that occurs when an RF signal bounces off a smooth, nonabsorptive surface such as a tabletop and results in the original signal changing direction.

Reflection

When an RF signal bounces off a smooth non-absorptive surface the behavior is called:

Reflection

An effect that occurs when an RF signal passes between mediums of different densities. The signal may change speed and also bend.

Refraction

When an RF signal passes between mediums of diff. densities and may change speed and bend, the behavior is

Refraction

A change in radio frequency power is a relative measure. Examples include loss of RF power due to a cable (dB) and passive gain of an antenna (dBi).

Relative measure of power

TCP is

Reliable

This advanced security feature allows for small- to medium-sized businesses to provide their own advanced authentication features without the need of an external server.

Remote Authentication Dial-In User Service (RADIUS)

An operation mode that allows a wireless access point to be set in an operation mode to extend the wireless RF cell for wireless client devices not within hearing range of a wireless access point.

Repeater mode

Open system authentication is in an IEEE 802.11-2012 wireless network.

Required

Which topology may use a token passing access method?

Ring

The process by which a wireless LAN client device moves between basic service sets, reassociating to a new access point based on various criteria and maintaining connectivity to the network.

Roaming

Which of the following is an element of 802.11i authentication and encryption algorithms to be used for communication between WAPs and wireless clients?

Robust Security Network (RSN)

ABC Company is comprised of four departments: sales, marketing engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _____________

Role Based Access Control (RBAC)

B

The Data Link layer of the OSI model is divided into which two sublayers? A. PLCP, PMD B. LLC, MAC C. TCP, UDP D. HTTP, FTP

power, range, speed

The IEEE 802.11 wireless networking standard define what some call the _____, ______, and ____ of the radio frequency and WLAN technology.

2.4-2.5, DSSS (HR/DSSS), 5.5, 11

The IEEE 802.11b amendment to the 802.11 standard works in the _______GHz ISM band. This amendment, released in 1999, specifies high rate _____ for ____ and ___ Mbps

802.11e

The IEEE _____ amendment defines enhancements for QoS in wireless LANs and introduced the hybrid coordination function

Logical address

The IP address of a network adapter is also known as which address?

Select the statement that correctly describes the Wi-Fi Alliance's primary role in the WLAN industry.

The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.

ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy Wi-Fi client devices in the 2.4 GHz ISM band?

The Wi-Fi client devices will experience performance degradation due to co-channel interference.

An antenna used to focus the isotropic energy into a specific radiation pattern. Available in various types, including patch/panel, sector, and Yagi.

Semidirectional antenna

USB was designed as a replacement for which two legacy communication connections?

Serial and Parallel

Which of the following allows a client to communicate with a particular base station?

Service Set Identifier

The name of a wireless network that identifies a basic service set and is used for segmentation. It can be broadcast in beacon frames as part of the passive scanning process to allow wireless LAN client devices to locate and join the network.

Service set identifier (SSID)

Select the statement that correctly describes the WiFi Alliance's primary role in the WLAN industry.

The WiFi Alliance tests and certifies product interoperability based upon standards created by the IEEE

ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy WiFi client devices in the 2.4 GHz ISM ban?

The WiFi client devices will experience performance degradation due to co-channel interference

UNII-2

The _______ band is for indoor or outdoor uses.

UNII-1

The _______ band is intended for indoor use only.

UNII-3

The _______ band may be used indoors or outdoors but was most commonly used outdoors.

What is a wireless bridge?

The ability to connect two or more wired LANs together wirelessly using IEEE 802.11

Fifth layer of the OSI Model

Session

The purpose of ___ is to allow application layer data communication between two stations

Session Layer

Layer 5 of the OSI model, which opens, closes, and manages sessions between end-user application processes.

Session layer

An authentication method defined by the IEEE 802.11 standard, used in legacy devices. It requires the use of Wired Equivalent Privacy (WEP) for IEEE 802.11 authentication and data encryption. This authentication method is flawed because it has several known vulnerabilities.

Shared-key authentication

A decrease in signal strength caused by attenuation, diffusion, or interference.

Signal loss

The RF noise value in dBm minus the received signal strength in dBm. The minimum recommended value for wireless networking is 20dB to 25dB or higher.

Signal-to-noise ratio (SNR)

The most basic wireless antenna technology used in a wireless LAN system. One antenna is used at the transmitter to transmit data and one antenna is used at the receiver to receive the data.

Single input/single output (SISO)

What are some examples of midspan PoE devices?

Single port injectors/Multiport injectors

Which of the following are midspan PoE devices? (Choose 2.)

Single-port and multiport injectors

Enterprise-Grade IEEE 802.11g client utilities typically contain which advance feature?

Site survey

The capacity of an access point is dependent on which factors? (Choose two.)

Software applications Number of users

device Driver can be used in wireless networking which is an example of a device driver

Software to control a wireless NIC

The radio spectrum is the radio frequency (RF) portion of the electromagnetic spectrum.

Spectrum

What tool is best suited for locating and identifying sources of RF interference, such as microwave ovens?

Spectrum analyzer

What echnolofy is used to send WLAN data over a wireless medium using subcarrier frequencies?

Spread-Spectrum

In wireless networking, technology that provides redundancy of the digital data as it traverses through the air by combining a set code with the digital data prior to the transmission.

Spreading code

A single-channel architecture management technique in which each floor or area of a building is assigned a channel to use. Spanning and blanketing are other terms used to identify managed areas based on channels.

Stacking

A separate signal carried on a main radio frequency transmission.

Subcarrier

Which protocol is used to guarantee delivery?

TCP

How many non-overlapping channels are available in the unlicensed 2.4 GHz ISM band?

THREE

802.11af-2014

TV white space (TVWS)

In what situation is an RF site survey LEAST needed?

Telecommuters using a single "remote AP" at home

What is the most likely cause of low throughput on a hotel's guest network?

The 1.5 Mbps internet connection is creating a bottleneck for the WiFi users

ERP-OFDM and DSSS

The 802.11g standard uses which two Physical layer technologies?

Device that prepares information to be sent across the air in the form of radio frequency.

Transmitter

What two devices use RF to communicate?

Transmitter Receiver

Fourth layer of the OSI Model

Transport

Layer 4 of the OSI model, which consists of both connectionless UDP and connection-oriented TCP protocols and provides end-to-end communication services for applications between devices on a computer network.

Transport layer

Layer 7 Application

This layer has protocols such as FTP, HTTP, and POP3.

Layer 5 Session

This layer opens, closes, and manages sessions between end-user application processes.

Layer 6 Presentation

This layer provides delivery and formatting of information for processing and display.

security

The 802.11i amendment to the standard addresses which technology?

True of false: Full-duplex allows two-way communication to occur between devices simultaneously

True

True or false, A cell is the area of RF coverage of the transmitter

True

True or false, Firewalls can be hardware-based, software-based, or a combination of the two.

True

True or false, It is common for SOHO-grade access points to be able to act as DHCP servers.

True

True or false, direct access point connectivity is defined as a direct connection to ports on the switch and is typically used with device connection layer hardware wireless controllers.

True

True or false, A wireless branch router/remote access point can build a Layer 3 VPN tunnel between devices allowing the router on each side will act as a VPN endpoint.

True, they can also be configured as a VPN pass-through device

Logical Link Control (LLC) and Media Access Control (MAC)

Two sublayers of Data Link Layer:

How many access points can be co-located without channel reuse in the same radio frequency area to maximize wtotal system throughput while minimizing RF interference in a n IEEE 802.11g network?

Three

Physical Layer Convergence Protocol (PLCP) and Physical Medium Dependent (PMD)

Two sublayers of PHY physical layer:

In computer Network Terminology, the definition of half duplex is closest to which of the following?

Two-way communication one way at a time

In computer network terminology, the definition of half duplex is closest to which of the following?

Two-way communication one way at a time

Unlicensed National Information Infrastructure (U-NII) is a radio frequency range used by IEEE-802.11a/n devices and for point-to-point or point-to-multipoint connections. The UNII band consists of a lower, middle, and upper band with four frequency ranges and is used for IEEE wireless LANs.

UNII

Point to Multipoint links consist of ___ or more connections

Three

The actual rate at which information is transferred, taking into consideration factors such as overhead, interference, and contention between devices.

Throughput

5.15-5.25 GHz

UNII-1 frequency band

5.25-5.35 GHz

UNII-2 frequency band

5.725-5.825 GHz

UNII-3 frequency band

Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for dektop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adpater would provide WiFi connectivity to these desktop computers?

USB 2.0

Given: ABC Company has asked you to recommend a solution that will provide wireless connectivity for desktop computers at various locations in their warehouse. The locations of the desktop computers prevent the use of Cat5e cabling. What type of client adapter would provide Wi-Fi connectivity to these desktop computers?

USB 2.0

Universal Serial Bus version 2, which incorporates several changes to USB, including connector types. Data rates allow for a maximum speed of 480 Mbps.

USB 2.0

You want to connect a desktop computer to an IEEE 802.11n wireless network. Which wireless LAN adapter would be the best solution if you do not want to disassemble the computer?

USB 2.0

UDP is

Unreliable

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling WiFi equipment. While evaluating the manufacturer's sepcifications for a specific WiFi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?

User Identity validation

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling Wi-Fi equipment. While evaluating the manufacturer's specifications for a specific Wi-Fi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?

User identity validation

What allows an administrator the ability to separate physical ports into logical networks?

VLAN technology

Which of the following statements is true regarding a wireless LAN controller?

VLANS seperate the network

Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concersn about wireless hot-spot usage. To address these concerns, what advice should you give to your traveling users with regard to wireless hot-spot usage?

Verify that personal firewall and antivirus software are both enabled before connecting, Always use company-provided VPN client software after connecting to the WiFi network

What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology?

WMAN

You support a wireless network for an office of five employees. The installation consists of one access point three notebook computers, and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fi WPA 2.0 certified you want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment?

WPA 2.0 personal/WPS

Enterprise access points may contain which of the following features?

WPA 2.0 support RADIUS server Repeater Mode

Enterprise access points may contain which of the following features? (Choose 3.)

WPA 2.0 support, RADIUS server, and repeater mode

SOHO access points commonly support which of the following features? (Choose 3.)

WPA 2.0 support, static output power, and wifi certifications

802.11i

WPA was developed as an interim solution for which amendment to the 802.11 standard?

The Wi-Fi Alliance certifications include several standards for security and QoS listed in the chapter, name them.

WPA/WPA 2.0 for security WMM and WMM-PS for QoS

Question 7 : Which wireless security protocol is also known as IEEE 802.11i?

WPA2

Identify the strongest passphrase-based secuirty mechanism for 802.11 wireless networks.

WPA2-Personal

SOHO access points commonly support which of the following features?

WPA2.0 support/Static output power/Wi-Fi certifications

In December 2011, a security flaw was reported with _______

WPS

B

Which is a valid logical IP address? A. 255.255.0.0 B. 192.168.200.1 C. AB.CD.EF12.34.56 D. 12.34.56.AB.CD.EF

Network (layer3)

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Network (layer 3)

Which layer of the OSI model allows physical addressing and routing?

Network Layer

Which layer of the OSI model is responsible for addressing and routing?

Data Link

Which layer of the OSI model is responsible for organizing bit-level data for communication between devices on a network and detecting and correcting Physical layer errors?

Application Layer

Which layer of the OSI model provides an interface to the user?

Physical Layer

Which layer of the OSI model uses physical addresses to deliver data to the destination?

B

Which of the following best describes the Wi-Fi Alliance? A. US-based standards organization B. Interoperability testing organization C. Works with the FCC to verify compliance D. Local regulatory body for Europe

D

Which of the following is addressed by the Wi-Fi Multimedia (WMM) certification? A. Security/encryption B. Fast transition C. Management frame protection D. Quality of Service

What is used as a relative measurement of signal strength at the receiving client on an 802.11 wireless LAN?

RSSI

Radio frequency signals from sources other than the transmitter and receiver that are in communication with each other.

Radio frequency noise

The distance that a radio frequency will travel, which is based on the wavelength. The higher the frequency is the shorter the wavelength will be and the result will be shorter range.

Range

The process in which a wireless LAN client connection moves from one access point to another is called _______.

Reauthentication

The measurable amount of radio frequency signal usable by a receiver.

Receive sensitivity

An arbitrary number assigned by the radio chipset or device manufacturer. There is no standard for this value, and it will not be comparable between devices from different manufacturers.

Received signal strength indicator (RSSI)

A and C

Which of the following is an accurate description of peer communication (choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network

D

Which of the following is correct regarding 802.11e? A. Only operates in the 5 GHz frequency range B. Only operates at 1, 2, 5.5, and 11 Mbps C. Addresses wireless security D. Addresses wireless quality of service

E

Which of the following organizations is responsible for standards compliance? A. FCC B. ETSI C. IEEE D. WPA2 E. Wi-Fi Alliance

TCP

Which protocol is used to guarantee delivery?

Ring topolgy

Which topology may use a token passing access method?

personal mode w/passphrase and enterprise mode using 802.1X/EAP

Which two options are available for Wi-Fi Protected Access 2 (WPA 2.0)?

An organization formed to promote IEEE standards for wireless LAN technology and manufacturer interoperability testing.

Wi-Fi Alliance

SOHO

Wi-Fi Protected Setup was designed for which wireless application?

A wireless networking device used to extend a corporate network to a remote location such as a home, conference room, or branch office through a secure connection using a wide area network or the Internet. It may contain Ethernet switch capabilities and a wireless access point.

Wireless branch router

A device used to connect two or more local area networks together using radio frequency. It can be configured in either point-to-point or point-to-multipoint configurations.

Wireless bridge

A device used in wireless LAN technology allowing centralized administration and control of access points, including radio management, security, VLANs, and redundancy.

Wireless controller

A system that connects basic service sets together, making an extended service set using RF instead of physical cabling such as Ethernet.

Wireless distribution system (WDS)

ABC Company has recently deployed a WiFi network in their corporate facility. After deployment, the considered a solution for monitoring and enforcing their wireless secuirty policy. What type of system can perform this task?

Wireless intrusion Prevention System (WIPS)

A software and/or hardware solution designed to monitor wireless networking RF signals using sensors or access points and to record events to a centralized database. It has the capability to react and prevent intrusion.

Wireless intrusion prevention system (WIPS)

A self-forming, self-healing, intelligent network used to route data frames between access points or "nodes" with one or more of the access points connected to a network infrastructure.

Wireless mesh networking

The process of a wireless client device looking for wireless networks and to identify the parameters of the network, including the SSID, supported data rates, and security settings.

Wireless network discovery

A wireless network management system (WNMS) is a software-based, hardware-based, or cloud-based solution that allows for centralized management and control of a wireless network and may allow work with wired networks.

Wireless network management system

A network that connects wireless devices within the immediate area of individual people. This type of network allows a user to connect various devices wirelessly to their own personal area network, including but not limited to computer keyboards, mice, and headsets. Bluetooth is a common technology used with WPANs.

Wireless personal network (WPAN)

Point-to-multipoint

_________ WANs are often called "clouds".

Encapsulation

__________ allows for Application layer data communication between two stations using lower layers as a support system.

MIMO

_____is a big part of what makes IEEE 802.11n such an amazing technology

Point Coordination Function (PCF)

access point briefly takes control of the medium and polls the clients

mesh point portal (MPP)

acts as a gateway to one or more external networks

Cloud-managed access points are able to function on their own should connectivity with the controller be temporarily lost, the description of this technology includes the term:

adaptive access point

The term encapsulation means to

add later header and trailer information to a payload

Hybrid Coordination Function (HCF)

additional coordination function that is applied in an 802.11e QoS wireless network

Self-contained units with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the device have permission to use.

autonomous access points

The angle of measurement of the main RF lobe measured at what is called the half-power point or -3 dB point. Beamwidth is measured both horizontally and vertically, in degrees.

beamwidth

robust security network (RSN)

better hide the data flying through the air while at the same time placing a bigger guard at the front door

Separating the intelligence from the access point and placing it into the wireless controller can cause ______________ with the higher data rates of IEEE 802.11n and 801.11ac

bottlenecks

Wider Channels

capability of 80 MHz and 160 MHz channels

A mesh point (MP)

capable of using a mandatory mesh routing protocol called Hybrid Wireless Mesh Protocol (HWMP)

A common feature in hardware WLAN controllers and cloud-managed systems that is used to obtain payment information, a simple agreement to terms and conditions for a hotspot or account credentials.

captive web portal

WLAN controller solutions consist of two common types of architectures, name them.

centralized (split-MAC) distributed

In WLAN controllers and cloud-managed controller-less solutions, this gives an administrator complete control over the wireless network from a single physical location.

centralized administration

Identify three popular types of autonomous access points:

consumer SOHO enterprise

Distributed Coordination Function (DCF)

contention-based method determining who gets to transmit on the wireless medium next

Two main objectives of a wireless site survey are to determine areas of RF ______ and the amount of RF ______.

coverage, interference

Decibel (dB) is a relative expression representing a change in radio frequency power.

dB

Which two are relative measurements of RF Power?

dB dBi are relative measurements of RF power

A decibel referenced to a dipole antenna, representing the passive gain of a dipole antenna and a relative expression of radio frequency power.

dBd

A decibel referenced against an isotropic radiator, representing the passive gain of an antenna as an increase in power and a relative expression of radio frequency power.

dBi

What is the gain of an antenna measured in?

dBi

Which are relative measures of RF power? (Choose two.)

dBi and dB

Which of the following formulas can be used to derive dBi values from dBd values?

dBi=dBd+2.14

A decibel referenced to one milliwatt (mW), and an absolute measure of radio frequency power.

dBm

Hybrid Wireless Mesh Protocol (HWMP)

default path selection metric

802.11ad-2012

defines Very High Throughput (VHT) enhancements Galois/Counter Mode Protocol (GCMP)

802.11v-2011

defines methods of retrieving information from client stations Wireless Network Management (WNM)

802.11aq

delivery of network service information prior to the association of stations on an 802.11 network allow advertisement of services to stations prior to the stations' actual association to the network

When RF passes or bends around an obstacle such as a building or column, the behavior is:

diffraction

If one connects access points that are not directly plugged into a port on the WLAN controller, they are using a feature known as ______________________

distributed access point connectivity

802.11i-2004

encryption protection from modification identity verification

Identify the two ways that power sourcing equipment deliver power to the device.

endpoint injector midspan injector

Which grade of access points allow the user to change the transmit power?

enterprise and some SOHO

802.11z-2010

establish and standardize a Direct Link Setup (DLS) mechanism

Wireless Network Management (WNM)

exchange location information, provide support for the multiple BSSID capability, and offer a new WNM-Sleep mode

Hybrid Coordination Function Controlled Channel Access (HCCA)

extension of PCF gives the access point the ability to provide for "prioritization of stations." certain client stations will be given a chance to transmit before others

Enhanced Distributed Channel Access (EDCA)

extension to DCF prioritization of frames based on upper-layer protocols

True or false: A benefit of a wireless LAN controller is distributed administration.

false

True or false: An administrator should always configure an access point from the wireless network.

false

802.11r-2008

fast basic service set transition (FT) fast secure roaming troublesome when using a WPA-Enterprise or WPA2- Enterprise security solution bypassing 802.1X authentication when roaming to a new access point

802.11ai

fast initial link setup (FILS) secure link setup in less than 100 ms

Neighbor Reports

gives client stations the ability to learn from access points or W LAN controllers about other access points where the client stations might potentially roam

802.11n-2009

greater throughput - High Throughput (HT) use multiple-input, multiple-output (MIMO)

Controller-managed access points are centrally managed from the _____________ _______________ ______________.

hardware WLAN controller

As seen in a two-dimensional (X/Y) view, the amplitude of an RF signal is:

height

When a wireless device is connected to an access point, it is known to be in _____________ mode.

infrastructure mode

When a wireless device is connected to an access point, it is said to be in ____________.

infrastructure mode

Which of the following best describes the Wi-Fi alliance?

interoperability testing organization

802.11u-2011

interworking issues between an IEEE 802.11 access network and any external network to which it is connected Wireless Interworking with External Networks (WIEN) basis for the Wi-Fi Alliance's Hotspot 2.0 specification and its Passpoint certification

In infrastructure mode, what happens to wireless data traffic that passes through an access point?

it is passed through to it's intended destination, crazy huh

mesh access point (MAP)

provides both mesh functionalities and AP functionalities simultaneously

Broadcast/Multicast Integrity Protocol (BIP)

provides data integrity and replay protection using AES-128 in Cipher-Based Message Authentication Code (CMAC) mode

802.11k-2008

radio resource measurement (RRM) Transmit Power Control (TPC) Client Statistics Channel Statistics Neighbor Reports

Transmit Power Control (TPC)

reduce interference

When an RF signal bounces off a smooth nonabsorptive surface, the behavior is:

reflection

dBi is a(n) ___________ measurement of gain introduced by ___________?

relative; an antenna

dBi is a(n) ____________ measurement of gain introduced by _____________?

relative; an antenna

802.11w-2009

robust management frames delivering management frames in a secure manner, therefore preventing the management frames from being able to be spoofed provides protection for unicast, broadcast, and multicast management frames Broadcast/Multicast Integrity Protocol (BIP)

802.11ah

se of Wi-Fi in frequencies below 1 GHz sensor networks along with backhaul for sensor networks and with extended range Wi-Fi Internet-of-Things (IoT) or Machine-to-Machine (M2M)

Client Statistics

signal-to-noise ratio, signal strength, and data rates can all be reported information such as frame transmissions, retries, and errors may all be reported

IEEE Std 802.11-2012

single document containing all the amendments that had been published at that time

What are the two types of midspan devices?

single-port and multiport injectors

Direct Sequence Spread Spectrum (DSSS)

spread spectrum technology that uses ! xed channels Clause 16 device

Question 4 : Which of the following is used to identify a particular 802.11 wireless LAN?

ssid

Which of the following security options is used to identify and connect to a wireless network?

ssid

802.11aj

support for operating in the Chinese Milli-Meter Wave (CMMW) frequency bands 59- 64 GHz

Without any regulatory domain taken into consideration

the 2.4 ghz frequency range allows for how many channels using 802.11b? ,14

10BaseT and 100BaseT implementations use ______ pair(s) of wire(s) to carry data.

two

Half-duplex is defined as a ______-way communication that occurs in _______ direction at a time.

two one

802.11p-2010

upport Intelligent Transportation Systems (ITS) applications Wireless Access in Vehicular Environments (WAVE)

Channel Statistics

use this information for channel management decisions

Replacing an antenna on a wireless access point will also change the __________ and ________________ beamwidths

vertical horizontal

What allow a variety of wireless devices access to any network resources that the device or user may have permissions for.

wireless access points

What allows a variety of wireless client devices to access any network resources that the device or user may have permissions for?

wireless access points

This device can be used to extend a corporate network to a remote location through a secure connection using a WAN or the Internet.

wireless branch router or remote access point, the book uses both terms

802.11d-2001

written for compliance with the regulatory domains Country code informatio - beacons and probe responses

An independent basic service set (IBSS) consists of how many access points?

~A. 0~ B. 1 C. 2 D. 4

Which items describe a service set identifier (SSID)? (Choose two)

~A. 32 character maximum~ B. 64 character maximum ~C. Is case sensitive~ D. Is not case sensitive

A basic service set identifier (BSSID) is the unique identifying MAC address of the ________.

~A. AP radio~ B. AP Ethernet port C. Router D. Client

The IEEE 802.11 association process happens after which phase?

~A. Authentication~ B. Distribution C. Deauthentication D. Re-authentication

As a device moves away from an access point, which of the following is true regarding dynamic rate switching?

~A. Data rate decreases~ B. Output power decreases C. Data rate increases D. Output power increases

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets?

~A. One ore more~ B. Two or more C. Three or more D. Four or more

In order to set up an ad hoc network, a user must know which two parameters? (choose two)

~A. SSID~ B. BSSID ~C. Channel~ D. Mac address E. Protection Mode

Which of the following configurations for wireless LANs has many access points?

ESS

OFDM

IEEE 802.11a uses which PHY technology?

Static output transmit power of a SOHO access point is typically:

15 dbm

Question 16 : An independent basic service set requires a minimum of how many access points?

0

What is the minimum number of access points required for an independent basic service set?

0

What is the relationship between Decibel Relative to a Milliwatt (dBm) and milliwatt (mW)?

0 dBm = 1 mW

How many access points does a basic service set (BSS) consist of?

1

How many data bits does serial communication transmit at a time?

1

Which of the following channels are considered non-overlapping in the 2.4 GHz band?

1 and 6

Which two channels are considered nonoverlapping in the 2.4 GHz band?

1 and 6

Which of the following data rates are specified by the 802.11b standard for DSSS technology?

1, 2, 5.5, and 11 Mbps

Which two channels are considered non-overlapping in the 2.4 GHz band

1, 6

How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band

11

How many channels are available for wireless LAN use in the unlicensed middle UNII-2e band?

11

What is the maximum data rate of HR/DSSS 802.11b devices?

11mbps

How many channels are available for wireless LAN use in the unlicensed 2.4 GHz ISM band?

14

How many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?

14

What is the typical RF transmit power of a SOHO-grade access point?

15 dBm or 32 mW

Bus

A high-speed linear topology is defined as a ______.

What devices, tools, or programs can be used in a manual site survey? (Choose two.) A. Spectrum analyzer B. Passive scanning utility C. Predictive site analyzer D. Association analyzer E. Authentication analyzer

A, B. A spectrum analyzer and a tool that passively scans for wireless networks such as NetStumbler can be used for a manual site survey. The other options' association and authentication can be viewed using a protocol analyzer and are not "standalone" tools.

You are using a wireless client adapter with a site survey utility and a notebook computer to perform a manual site survey in a very small office building. Which values are important to record to verify proper RF coverage for the location? (Choose two.) A. Signal strength B. SNR C. Packet retries D. Signal loss E. Propagation loss

A, B. The signal strength and SNR are two important values to record during the manual site survey process. Signal loss and propagation loss have different effects, and packet retries are more of an issue with dynamic rate selection.

The manual site survey consists of which possible methods? (Choose two.) A. Passive B. Scanning C. Active D. Spectrum E. Packet

A, C. Manual site surveys can be either passive or active. Scanning is a method of locating wireless LANs. A spectrum analyzer will allow you to see the RF. A packet is information that carries computer data from one device to another.

A main objective of a wireless LAN site survey is to determine _____ and _____ . (Choose the best two options.) A. Areas of RF interference B. Applications to be used C. Access point locations D. Wiring closet locations E. Security implementations

A, C. The main objectives of a wireless site survey are to determine areas of RF interference and RF coverage as well as locations of access points and other infrastructure devices. The applications used have more to do with capacity planning. Wiring closet locations and security implantations are factors that need to be taken into account but are not the main objectives.

Which guidelines are recommended when performing a manual site survey? (Choose two.) A. Walkthrough of location B. Predictive analysis C. Equipment purchase D. Client device configuration E. Spectrum analysis

A, E. A walkthrough of the location and spectrum analysis are both recommended guidelines when performing a manual site survey. Equipment purchase and client device configuration are additional factors to consider but are not part of the manual site survey. A predictive analysis is a software-based site survey solution that does not require manual testing.

12. Which of the following is an accurate description of peer communication (Choose 2)? A. The horizontal link between devices on the network B. The vertical link between devices on the network C. The logical link between devices on the network D. The physical link between devices on the network

A,C

An independent basic service set (IBSS) consists of how many access points? A. 0 B. 1 C. 2 D. 4

A. 0

How many data bits does serial communication transmit at a time? A. 1 B. 3 C. 4 D. 8

A. 1

You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?

A. Association B. Authentication ~C. ERP protection~ D. HT protection

The IEEE 802.11 association process happens after which phase? A. Authentication B. Distribution C. Deauthentication D. Reauthentication

A. Authentication

WLAN controllers may contain which of the following features? (Choose three.) A. Centralized administration B. Captive portal C. Network Address Translation (NAT) D. Built-in RADIUS services E. IP routing

A. Centralized administration B. Captive portal D. Built-in RADIUS services

Co-channel interference is caused by access points on _____ . A. Channels 1 and 1 B. Channels 1 and 2 C. Channels 1 and 6 D. Channels 1, 6, and 11

A. Co-channel interference is caused by two access points operating on the same radio frequency channel. Access points operating on channels 1 and 2 may cause adjacent channel interference. Channels 1, 6, and 11 are nonoverlapping channels and will not interfere with one another.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame?

A. Data B. Control ~C. Management~ D. Detail

As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases

A. Data rate decreases

Which component is required for a successful installation and operation of an 802.11ac wireless USB adapter? A. Device driver B. Client utility C. Profile software D. Windows AutoConfig

A. Device driver

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

A. Different RF channel ~B. Mismatched SSID~ C. Different BSSID D. Mismatches association

A controller-managed access point connected to a port on the WLAN controller and not to an intermediate device is considered to have which of the following? A. Direct connectivity B. Distributed connectivity C. Decentralized connectivity D. Centralized connectivity

A. Direct connectivity

You are a sales engineer connected to an IEEE 802.11a access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

A. Dynamic frequency selection B. Transmit power control ~C. Dynamic rate switching~ D. Transmit Save Mode

Access points work at which layers of the OSI model? (Choose two.) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

A. Layer 1 B. Layer 2

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable? A. Midspan B. Midpoint C. Endspan D. Endpoint

A. Midspan

An IEEE 802.11g access point requires a minimum of how many antennas to move data? A. One B. Two C. Four D. Six

A. One 802.11g access points require only one antenna to function. Systems that support antenna diversity will require two antennas to correctly operate.

The open system authentication process uses how many frames?

A. One ~B. Two~ C. Three D. Four

According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets? A. One or more B. Two or more C. Three or more D. Four or more

A. One or more

Horizontal beamwidth is ____________ to the earth's surface. A. Parallel B. Perpendicular C. Positive D. Negative

A. Parallel Horizontal beamwidth is parallel to the earth's surface. This is based on how the E-field propagates away from the antenna element. Vertical beamwidth is perpendicular to the earth's surface.

You are a network engineer troubleshooting a WLAN weak signal complaint. While moving a handheld WLAN device, you notice that the signal strength increases when the device is moved from a horizontal to a vertical position. This is because the ____________is changing. A. Polarization B. Wavelength C. Frequency D. Diffusion

A. Polarization Changing the orientation of a device or antenna will change the polarization and affect the received signal strength. The signal strength may either increase or decrease depending on how the polarization is changed from the original position. Wavelength, frequency, and phase are characteristics of RF.

When a wireless LAN device listens for beacon frames, it is participating in which phase?

A. Power save B. Passive Scanning C. Active scanning ~D. Authentication~

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager, who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter?

A. Power save mode D. Association Mode ~C. Active mode~ D. Passive mode

The process in which a wireless LAN client connection moves from one access point to another is called _________.

A. Re-authentication ~B. Roaming~ C. Rebuilding D. Roving

In order to set up an ad hoc network, a user must know which two parameters? (Choose two.) A. SSID B. BSSID C. Channel D. MAC address E. Protection mode

A. SSID C. Channel

A patch antenna is an example of which type of antenna? A. Semidirectional B. Omnidirectional C. Highly directional D. Dipole-directional

A. Semidirectional A patch antenna provides semidirectional coverage. The amount of coverage depends on the design and gain of the antenna. Parabolic dishes are highly directional.

A device driver can be used in wireless networking. Which is an example of a device driver? A. Software to control a wireless NIC B. Software to control the operating system C. Hardware to install a PCI card D. Hardware to install a client bridge

A. Software to control a wireless NIC

In wireless LAN technology, the strength or the amount of power of a radio frequency signal.

Amplitude

Two characteristics of RF signals are:

Amplitude Phase

Two characteristics of RF signals are?

Amplitude and Phase

logical

An IP address is a ______ address.

What symptom would indicate the presence of a hidden node in a WiFi network?

An increase in retransmisions

Which explanations of antenna usage are the most accurate?

An omni-directional antenna is well suited to provide wireless coverage in most homes A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions

Which explanations of antenna usage are the most accurate?

An omni-directional antenna is well-suited to provide wireless coverage in most homes. A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions.

A technology designed to mitigate the problems associated with multipath in a wireless LAN system.

Antenna diversity

Seventh layer of the OSI Model

Application

Which layer of the OSI model provides an interface to the user?

Application

The final step to becoming part of a basic service set; allows wireless LAN client devices to pass traffic across an access point. Allows for association request and association response frames to be sent and received. Takes place after IEEE 802.11 authentication.

Association

A value assigned to an IEEE 802.11 wireless client device by the wireless access point to identify the associated device. The AID value is identified in association response frames.

Association ID (AID)

A self contained Intelligent access point is

Autonomous

A self-contained intelligent access point is:

Autonomous

A self-contained intelligent access point that can function as an independent wireless network device.

Autonomous access point

A self-contained unit with all the intelligence necessary to provide devices with wireless access to a wired network infrastructure and access to the resources the devices have permission to use.

Autonomous access point

As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing _______ access points, and they could consider ________ to ease the management burden.

Autonomous; a WLAN controller-based architecture

As a salesperson, you have been contacted by an automobile dealership that currently manages each of their 5 SOHO-class access points individually. The owner of the dealership contracts his nephew for the dealership's network administration, but the nephew admits to a limited knowledge of WLAN technology. The dealership owner and his nephew want you to advise them on how they can simplify the management of their wireless network. You tell them that they are currently managing __________ access points, and they could consider _____________ to ease the management burden.

Autonomous; a WLAN controller-based architecture

In RF terminology, the angle of measurement for the horizontal radiation pattern of an antenna element.

Azimuth

13. Physical addresses on a network device are responsible for which of the following? A. To identify the logical location on the network B. To identify which device should receive the information C. To identify the routing information on the network D. To identify the protocol in use on the network

B

Non-Wi-Fi interference for an 802.11g network can be caused by _____ and _____ . (Choose two.) A. AM radios B. Microwave ovens C. 802.11b networks D. Cordless phones E. Radar systems F. Digital TV systems

B, D. Non-Wi-Fi interference is interference by anything other than wireless LANs that operates in the same frequency range. AM radios and digital TV systems do not operate in the license-free bands. 802.11b interference is wireless LAN interference. Radar systems operate in the 5 GHz UNII band.

Operational Modes of an 802.11g

B-Only Mode - ata rates of 11, 5.5, 2, and 1 Mbps support for DSSS, HR-DSSS, and ERP-DSSS/CCK technology G-Only Mode - data rates of 6-54 Mbps ERP-DSSS/CCK, HR-DSSS, and DSSS is disabled B/G Mode - throughput from 20 Mbps down to as little as 8 Mbps both ERP-DSSS/CCK and ERP-OFDM is enabled

The curvature of the earth will have an impact on the WLAN signal after how many miles? A. 2 B. 7 C. 10 D. 25

B. 7 The curvature of the earth or earth bulge will have an impact on a WLAN signal after seven miles. If the signal needs to travel farther than seven miles, the antenna will have to be installed in a higher location.

Which of the following is true of a predictive modeling survey? A. It takes more time than a passive survey to get accurate results. B. It takes less time than a passive survey to get accurate results. C. It finds areas of interference from neighboring wireless LANs. D. It helps you choose the manufacturer's equipment to be used for the wireless LAN.

B. A predictive modeling site survey will take less time than a passive survey because a passive survey requires a manual analysis. On-site protocol analysis or scanning utility will determine areas of RF interference from wireless LANs. The predictive modeling survey does not help you choose manufacturers' equipment to be used in a deployment.

When a device associates to an access point during a site survey, it is performing what type of survey? A. Predictive B. Active C. Passive D. Required

B. An active site survey requires the survey device to associate to an access point. A passive site survey monitors all access points in the area. A predictive modeling site survey does not involve associating to an access point. Associating to an access point is not a required part of manual testing.

802.11a access points support which antenna technology to help reduce the effects of multipath? A. Adjustable gain B. Antenna diversity C. Adjustable polarization D. Antenna multiplexing

B. Antenna diversity 802.11a access points can use antenna diversity. Gain and polarization are considered RF concepts.

The process in which a WLAN client connection moves from one access point to another is called ____________. A. Reauthentication B. Roaming C. Rebuilding D. Roving

B. Roaming

What device is used to shunt transient current to ground in the event of an indirect lightning strike? A. Lightning striker B. Lightning arrestor C. Lightning prevention D. Lightning breaker

B. Lightning arrestor A lightning arrestor is used to protect a WLAN system from an indirect lightning strike. A lightning arrestor will direct transient or induced electrical current to earth ground as a result of a lightning strike.

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association

B. Mismatched SSID

You are performing a protocol analysis in order to determine potential interference from other wireless LANs in the immediate area of the site survey. You discover several wireless LANs that can potentially cause interference with the proposed installation. Which technology in use would not have an impact on the 802.11g wireless network you are surveying for? A. FHSS B. OFDM C. DSSS D. ERP-OFDM E. PBCC

B. OFDM networks operate in the 5 GHz UNII band and would not affect an 802.11g network that operates in the 2.4 GHz ISM band. FHSS, DSSS, and ERP-OFDM all operate in the 2.4 GHz ISM band and could cause interference with an 802.11g network.

Antennas provide an increase in RF coverage by using ____________ gain. A. Active B. Passive C. Positive D. Maximum

B. Passive Antennas provide an increase in RF coverage by means of passive gain. Passive gain occurs when isotropic RF energy is focused into a specific radiation pattern. Active gain requires the use of an external power source.

When a WLAN device listens for beacon frames, it is participating in which phase? A. Power save B. Passive scanning C. Active scanning D. Authentication

B. Passive scanning

Wireless bridges must be configured with ____________and____________. (Choose two.) A. A null SSID B. The same SSID C. The same RF channel D. Channel scanning E. Wired Equivalent Privacy

B. The same SSID C. The same RF channel

The open system authentication process uses how many frames? A. One B. Two C. Three D. Four

B. Two

IEEE 802.11a/b/g access points require ____________ antennas on each radio for diversity functionality. A. One B. Two C. Three D. Six

B. Two An IEEE 802.11a or IEEE 802.11b/g access point will require two antennas for diversity. Although there are two antennas, a single input/single output access point will have only one radio. The access point provides additional intelligence to determine which antenna to use. Other WLAN technologies, such as IEEE 802.11ac MIMO, may use multiple antennas.

Which WLAN adapter can be installed in a computer without the need to disassemble the computer in any way? A. PCI B. USB 3.0 C. PCIe D. Mini-PCI

B. USB 3.0

You want to connect a desktop computer to an IEEE 802.11ac wireless network. Which WLAN adapter would be the best solution if you do not want to disassemble the computer? A. Mini-PCI B. USB 3.0 C. Half Mini-PCIe D. PCMCIA

B. USB 3.0

Most manufacturers recommend installing a wireless IEEE 802.11ac USB adapter at what point? A. When the computer is not powered on B. When instructed by the setup utility C. After calling technical support D. Before starting the setup process

B. When instructed by the setup utility

Which two wireless LAN adapters can be installed in a computer without the need to disassemble the computer in any way? (Choose 2.) A. PCI B. PCMCIA C. USB 2.0 D. PCIe E. Mini-PCI

BC

7. _____ allows for Application layer data communication between two stations using lower layers as a support system. A. Logical addressing B. Physical addressing C. Data encapsulation D. Data encryption E. Point-to-point

C

A self-contained intelligent access point is: A. Controller-based B. Heavyweight C. Autonomous D. Thin

C

An operation mode that allows a wireless access point to be set in an operation mode for wireless point-to-point or point-to-multipoint configurations connecting two or more LANs together.

Bridge mode

A ___ Topology Consist of multiple devices connected by a single shared medium

Bus

A high speed linear topology is defined as a ___?

Bus

You are a wireless LAN consultant contracted to assist in a site survey for a retail outlet that will deploy an 802.11n WLAN. You've been asked to participate in an initial meeting with top management to determine the details of a site survey. What topics would most likely be discussed at this meeting?

Business requirements, Purpose of the wireless LAN

After your city implemented a municiapl WIFI network using 802.11g on channels 1, 6, and 11 near your office, your users have been complaining about poor performance on their 802.11b VoWifi phones. The best solution for optimizing your 802.11a/g network to support VoWiFi in this scenario is to _________

Buy new 5 GHz capable VoWiFi phones

2. A high-speed linear topology is defined as a _____? A. Ring B. Mesh C. Bus D. Star

C

CompactFlash (CF) cards are available in two types. What is the main difference between the two types? A. Length B. Width C. Thickness D. Height

C

The 802.3-2005 Clause 33 standard specifies VDC as the nominal voltage. A. 32 B. 57 C. 48 D. 12

C

At which two layers of the OSI model do wireless LANs operate? (Choose 2.) A. Session B. Network C. Physical D. Application E. Data Link

C, E

A service set identifier (SSID) has a maximum limit of how many characters or octets? A. 8 B. 16 C. 32 D. 128

C. 32

Wireless network cables and devices have impedance (AC resistance) of ____________ ohms. A. 10 B. 25 C. 50 D. 75

C. 50 WLAN cables and devices are rated at 50 ohms impedance. Cable and satellite television is rated at 75 ohms.

WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch

C. 802.11a client devices

A type of site survey that is software-based, requires minimum time on-site, and takes into consideration the attenuation value of materials such as the type of walls and doors is _____. A. Active B. Passive C. Predictive D. Optional

C. A predictive modeling site survey is software-based and takes the attenuation values of the building and other materials into consideration. Active and passive are forms of manual site surveys and record actual information about the site.

You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager who wants to know how power save operations should be set up on her notebook computer to optimize the system performance. The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode

C. Active mode

A self-contained intelligent access point is ____________. A. Controller-managed B. Heavyweight C. Autonomous D. Thin

C. Autonomous

Which can cause a loss of signal strength? (Choose two.) A. Antenna B. Amplifier C. Cable D. Connector E. Transmitter

C. Cable D. Connector Cables and connectors can both result in a loss of signal strength. Antennas and amplifiers will add gain or increase signal strength. A transmitter outputs an absolute amount of power.

You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection

C. ERP protection

Highly directional antennas are typically used for ____________ connectivity. A. Short-range B. Omnidirectional C. Long-range D. Dipole

C. Long-range Highly directional antennas are typically used for long-range point-to-point connectivity, such as bridge links. Omnidirectional antennas are used as part of an access point system or to provide point-to-multipoint links.

A beacon frame advertises information about the wireless network. A beacon frame is what type of frame? A. Data B. Control C. Management D. Detail

C. Management

You have been hired by a company to perform a manual site survey. When explaining the difference between a manual and predictive modeling site survey, you let the customer know the advantages and disadvantages of each. A manual site survey has which advantage? A. Speed B. No hardware required C. Accuracy D. Facility access not required

C. Manual site surveys can be very accurate because actual readings are taken at the site using test access points and a wireless client. This can take quite some time to complete depending on the size of the location. Wireless hardware is required to perform the site survey, and access to the whole facility is required.

You are a network consultant hired to perform a manual site survey for a small office building. The wireless network to be installed will use data and voice. For backward compatibility, the customer needs to support 2.4 GHz equipment. To provide the highest quality of service for the voice application, you recommend that the received signal strength be a minimum ___ of for a data rate of 54 mbps. A. -20 dBm B. -25 dBm C. -67 dBm D. -76 dBm

C. Recommended received signal strength for voice applications in the 2.4 GHz ISM band at a data rate of 54 mbps is about -67 dBm. A recommended signal-to-noise ratio is more than 20 to 25 dB.

Which access point mode involves connecting the access point to a distribution system for user access to the LAN? A. Bridge-only mode B. Repeater-only mode C. Root access point mode D. Access mode

C. Root access point mode

A method used with IEEE 802.3 Ethernet networking; it is a contention-based media access control method that Ethernet devices use to share the medium. This method allows for only one device to transmit at any one time. If a collision is detected, the transmitting devices will need to back off for a random period of time and retransmit.

Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

Area of RF coverage extending from an antenna in wireless infrastructure and wireless client devices.

Cell

Wireless LAN Controllers commonly have what abilities?

Centralized Administration Captive Portal Built-In RADIUS services

Configuration of many devices such as wireless access points from one central device, software application, or location.

Centralized administration

Wireless LAN controllers may contain which of the following features? (Choose 3)

Centralized administration, captive portal, and built in RADIUS services

Tunneling of all traffic to a controller from the access point for handling, usually using proprietary methods.

Centralized data forwarding

Radio frequency range assignment varying in frequency based on the use of the device.

Channel

Question 32 : In order to set up an ad hoc network, a user must know which two parameters? (Choose two.)

Channel SSID

A method used in the design of wireless networks so that overlapping cells are on different or nonoverlapping channels and minimize interference.

Channel planning

When supported by the manufacturer, a classification signature determines the maximum amount of DC power a device requires, thereby allowing the power sourcing equipment to better manage the amount of DC power delivered to a specific physical port.

Classification signature

The physical carrier sensing performed constantly by all stations that are not currently transmitting or receiving data. CCA is used to determine whether the medium is available for RF transmissions.

Clear channel assessment (CCA)

After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a Wi-Fi network? (Choose 2)

Client Utility Device Driver

After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a WiFi network?

Client Utility, Device Driver

The transmit power control (TPC)

Client can associate with an A P based on their transmit power AP can specify the transmit power of any or all stations A P can change transmission power on stations

Given: In Single-Channel Architecture (SCA) systems multiple access points can use the same BSSID. This feature allows for the creation of a network-wide virtual access point that can be applied across multiple physical access points operating on the same channel.

Client stations do not have to make roaming decisions

Given: In Single-Channel Architecture (SCA) systems, multiple access points can use the same BSSID. This feature allows for the creation of a network-wide virtual access point that can be applied across multiple physical access points operating on the same channel. What benefit does this solution offer?

Client stations do not have to make roaming decisions

CWNP terminology defines co-channel interference as a performance condition that occurs when two or more independently coordinated access point radios are providing RF coverage to the same physical area using the same IEEE 802.11 channel. Additional RF medium contention overhead occurs for all radios using this channel in this physical area, resulting in throughput degradation and latency.

Co-channel interference

In wireless networking, multiple devices or access points in the same RF space and usually on different channels.

Co-location

Operating system feature that allows extensive and detailed configuration of a device such as a wireless access point or wireless LAN controller by using specific commands set by the device manufacturer.

Command-line interface (CLI)

Originally designed as a mass storage device format used in portable electronic devices; now used for a variety of devices and technologies, including Ethernet networks, Bluetooth, digital cameras, RFID, and Wi-Fi networks.

Compact Flash

A wireless workgroup bridge will allow you to do which of the following?

Connect a wired LAN to an AP

Data Privacy

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Advanced Encryption Standard (AES) algorithm

A WLAN bridge is best-suited for which scenario?

Connecting a portable classroom to a school network

bus topology

Consists of multiple devices connected along a single shared medium with two defined endpoints:

Access points that are used with wireless LAN controllers and not as standalone devices. Usually have limited functionality and require a wireless LAN controller to operate.

Controller-based access points

What is one difference between autonomus access points and controller-based access points?

Controller-based access points associate to a WLA?N controller, but autonomous access points do not

What is one difference between autonomous access points and controller-based access points?

Controller-based access points associate to a WLAN controller, but autonomous access points do not.

Different from autonomous access points, these access points are used with hardware WLAN controllers but not as stand-alone devices.

Controller-managed access points

Access points used to provide a wireless infrastructure without the use of a hardware wireless LAN controller. This technology uses a software management system for configuration, and decisions are at the network edge rather than being tunneled through the network.

Cooperative access points

Which statement best defines SNR?

The difference between the noise floor and a signal's strength

A point-to-point wireless link requires what percent of the Fresnel zone to be clear in order to be considered to have an acceptable RF line of sight? A. 0 B. 20 C. 40 D. 60

D. 60 It is recommended that at least 60 percent of the Fresnel zone be free of obstruction in order to have acceptable RF line of sight. Up to 40 percent of the zone can be blocked by obstructions without affecting the signal.

Without any regulatory domain taken into consideration, the 2.4 GHz frequency range allows for how many channels using 802.11b/g/n?

D - 14

An HR/DSSS channel is how wide?

D - 22 MHz

OFDM that is used with 802.11a and 802.11g stations supports a maximum data rate pf_________Mbps

D - 54

Stations operating in which two 802.11 amendments are interoperable?

D - 802.11b and 802.11g

Devices compliant with whcih two amendments to the IEEE standard use multiple radio chains and multiple antennas? (Choose two)

D - 802.11n E - 802.11/ac

Bluetooth devices use___________, which can potentially cause interference with WLANs.

D - Frequency-Hopping Spread Spectrum (FHSS)

Hiding the SSID of a WLAN will require a user to ___________in order to gain access to the wireless network

D - Know the SSID and enter it manually

Which WLAN technology in wireless networking uses the effects of multipath to provide data rates of 600 Mbps in the 2.4 GHz ISM band?

D - MIMO

Which data encryption/authentication method is identified in the original 802.11 standard?

D - WEP

IP addresses are logical addresses on which layer of the OSI model? A) Transport B) Data-Link C) Internet D) Network E) Session

D) Network Note, the Internet Layer is from the TCP/IP Model

Omnidirectional antennas have a horizontal beamwidth ____________ of degrees. A. 90 B. 180 C. 270 D. 360

D. 360 Omnidirectional antennas have a horizontal beamwidth of 360°. The vertical beamwidth will vary depending on the design and the gain of the antenna.

When considering the use of antennas for wireless LAN deployment during a site survey, which antenna could be tested to verify proper coverage for a long hallway or corridor? A. High-gain omnidirectional B. Low-gain omnidirectional C. Parabolic dish D. Yagi

D. A semidirectional antenna such as a Yagi is a good choice for an application requiring coverage down a long hallway or corridor. Low- or high-gain omnidirectional antennas will provide 360-degree horizontal coverage. Parabolic dish antennas are typically used for outdoor long-range bridging.

When using a predictive modeling site survey approach, which of the following is true about manual verification? A. Manual verification never has to be performed. B. Manual verification is always required. C. Manual verification should be performed only at the customer's request. D. Manual verification should be performed, but it is not required.

D. A verification of the predictive survey should be performed to verify that the survey meets the customer's requirements. Although not required, it should be considered.

You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-story building. Which characteristic must be considered while performing a site survey? A. All omnidirectional antennas should be vertically polarized. B. Multiple floors require the same channel. C. Each floor should be treated as an individual site survey. D. The channel plan should take all three floors into consideration.

D. Because of RF propagation, site surveys are really three-dimensional. Therefore in a three-story building all fl oors need to be taken into consideration. Omnidirectional antennas may be polarized either vertically or horizontally. Single-channel architectures use the same channel for multiple floors.

When performing a manual site survey, choose the best way to identify areas that lack RF coverage. A. Mark them with tape so they can be located at a later time. B. Use a camera to take a photograph and document it in the report. C. Show the site manager the areas that lack coverage. D. Document on the floor plans or blueprints.

D. Dead spots (areas that lack RF coverage) should be identified on floor plans or blueprints. This is part of standard documentation practices. Marking them with tape, taking a photograph, and showing the site manager in person are not the best ways to document dead spots.

You need to perform a site survey for a small real estate office that currently has no wireless network. Which factors must be considered as part of the site survey? A. Spectrum analysis B. Packet analysis C. Environmental conditions D. Correct antenna selection

D. In this situation, correct antenna selection is important to provide optimal coverage as well as proper aesthetics. In this example, a spectrum analysis or protocol analysis could be performed but is not required. Environmental conditions are typically not an issue in a small office deployment.

Enterprise-grade IEEE 802.11n/ac client utilities typically contain which advanced feature? A. PCI configuration B. Spectrum analyzer C. Setup wizard D. Site survey

D. Site survey

You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLAN card or a PC card interface. You do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution? A. Wireless PCI B. Wireless PCMCIA C. Wireless Full Mini-PCIe D. Wireless USB 2.0

D. Wireless USB 2.0

Power sourcing equipment delivers which of the following?

DC power to the end device

power sourcing equipment delivers which of the following?

DC power to the end device

___ allows for application layer data communication between two stations using lower layers as a support system.

Data Encapsulation

At which layer of the OSI model are bits compiled into frames?

Data Link

Second layer of the OSI Model

Data Link

A method that allows wireless client devices to compete for the time to transmit frames across the medium. In wireless networking this medium is the air.

Distributed coordinated function (DCF)

Software that allows components such as network adapters, keyboards, mice, video cards, and all other attached devices to communicate with a computer operating system.

Device driver

Which is required in order to successfully install an IEEE 802.11n wireless LAN adapter

Device driver

Effect that occurs when an RF signal passes an obstacle, such as a building. The RF wave changes direction by bending around the obstacle.

Diffraction

When RF passes or bends around an obstacle like building or column, the behavior is ?

Diffraction

Effect that occurs when the RF signal naturally widens as it leaves an antenna element, resulting in attenuation of the radio frequency signal. Diffusion is the underlying cause of free space path loss.

Diffusion

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate device is considered to have which of the following?

Direct connectivity

A controller-based access point connected to a port on the wireless LAN controller and not to an intermediate Device is considered to have which of the following?

Direct connectivity

A spread-spectrum technology used in IEEE 802.11 and IEEE 802.11b/g with data rates of 1 and 2 Mbps set on a specific radio frequency channel.

Direct-sequence spread spectrum (DSSS)

No longer being associated or able to pass traffic across an access point. It is a notification, not a request, and can be sent from either an access point or an associated wireless device.

Disassociation

A protocol used to automatically distribute Internet Protocol (IP) addresses and other TCP/IP information to devices connected to a local area network.

Dynamic Host Configuration Protocol (DHCP)

You are a sales engineer connected to an IEEE 802.11a access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term?

Dynamic rate switching

The ability to change data rates based on signal quality and strength within a basic service area. Also known as dynamic rate selection or adaptive rate selection.

Dynamic rate switching (DRS)

A______________filter is used to allow or deny wireless barcode scnners access to an 802.11b/g/n network

E - MAC

You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer?

ERP protection

802.11g standard uses what two physical layer Technologies

ERP-OFDM

The 802.11g standard uses which two physical layer technologies

ERP-OFDM

ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is suing WEP security with a 128-bit key. You have been asked to provide feedback about the strngth of their security. You tell ABC Company that ________.

Each currently-used security mechanism is weak, and the network is insecure

The earth curvature has an effect after seven miles in distance; additional height needs to be added to the antenna in order to lessen the impact. Also known as earth bulge.

Earth curvature

Which of the following is not an advantage of an IBSS network?

Easy to secure

In RF terminology, the angle of measurement for the vertical radiation pattern of an antenna element.

Elevation

In a typical office building, WiFi clients are likely to experience poor WiFi coverage in what locations?

Elevators, Stairwells

ABC Corporation has decided to deploy their first WiFi netowrk in their corporate headquarters. ABC prepared for adding a WiFi network by installing PoE-capable Ethernet switches in their wiring closets. What type of PoE implementation is this?

Endpoint

A wireless LAN controller or an Ethernet switch that delivers DC voltage directly to connected devices to supply both DC voltage and computer data.

Endpoint device

View the figures and correctly identify the antenna types illustrated in the figures.

Figure 1: Parabolic Dish Figure 2: Grid

What site specific information should be gathered prior to a site survey?

Floor plans, Electrical Specifications

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band

Four

Caused by diffusion, it is the weakening of a radio frequency signal as it travels through open air with no obstructions.

Free space path loss

The number of complete cycles of an alternating current (AC) signal that will occur in a period of one second.

Frequency

What is the term defining the amount of times a cycle of an RF signal will oscillate in one second

Frequency

What is the term defining the number of times a cycle of an RF signal will oscillate in one second?

Frequency

What two factors are used to calculate the wavelength of an RF wave? (Choose 2)

Frequency Speed of light

What two factors are used to calculate the wavelength of an RF wave?

Frequency, Speed of light

The area of usable RF coverage between a transmitter and receiver in outdoor wireless LAN communications. The area must be clear of obstacles by at least 60 percent. The size is calculated using distance between endpoints and the frequency in use.

Fresnel zone

Public access networks including hotspots, and hospitality may need to accept connections from a wide variety of client devices except?

IEEE 802.11b

Given: Several users are required to transfer files among themselves in a conference room. No APs are availbale for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?

IBSS

Manufacturers design hardware used for wireless LANs based on a common set of criteria or rules known as standards. The name of the organization responsible for creating 802.11 WLAN standards is what?

IEEE

The Institute of Electrical and Electronics Engineers, a nonprofit organization responsible for generating a variety of technology standards, including those related to information technology.

IEEE

Which of the following organizations are responsible for standards compliance?

IEEE

Which organization is responsible for creating standards for wireless computer networking?

IEEE

802.11 b/g/n

IEEE 802.11 iterations that support amendment b

802.11 , 802.11b, 802.11g, 802.11n

IEEE 802.11 iterations that use the 2.4 GHz ISM band.

802.11a, 802.11n

IEEE 802.11 iterations that use the 5 GHz UNII bands

An amendment to the IEEE 802.11 standard that specifies operation in the 5 GHz Unlicensed National Information Infrastructure (UNII) band with data rates of up to 54 Mbps and the orthogonal frequency division multiplexing (OFDM) Physical layer specification.

IEEE 802.11a

Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main buildings network for web browsing. The main building has an existing 802.11g WiFi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main buildings network?

Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs

Given: To manage increasing enrollment and budget constraints, a school has temporarily parked classroom trailers near the main building on its campus. Students and teachers in the trailers are using desktop computers and have an occasional need to connect to the main building's network for web browsing. The main building has an existing 802.11g Wi-Fi network. What would be the most cost-effective and easily-deployable solution to allow the desktop computers in the temporary classrooms to access the main building's network?

Install wireless workgroup bridges in each trailer through which the wired desktops can connect to the main building's APs.

Two or more RF signals interacting with each other and causing a degradation of performance.

Interference

Question 19 : Which items describe a service set identifier (SSID)? (Choose two.)

Is case sensitive 32 characters maximum

In radio frequency terminology, energy broadcast equally in all directions in a 360 degree spherical manner.

Isotropic

A theoretical concept used in reference and calculations. Assumes that RF energy is broadcast equally in all directions in a spherical manner. An isotropic radiator is an imaginary, perfect antenna.

Isotropic radiator

The data layer of the OSI model is divided into which two sublayers

LLC/MAC

Two sublayers of Data Link layer

LLC/MAC

Which of the following is a benefit of a wireless repeater?

Larger cell size allows more devices to access the medium

Which of the following is a benefit of a wireless repeater?

Larger cell size allows more devices to access the medium and extends cell size

Where is the use of a Wireless Internet Service Provider (WISP) most appropriate?

Last mile wireless data delivery to homes and businesses

As an RF signal propagates, it reflects off an object. The reflected signal and the signal following a direct path arrive at the receiver at different points in time. What is the term used to describe this RF behavior?

Multipath

Simple antenna diversity mitigates the adverse effects caused by which common Wi-Fi problem?

Multipath

Simple antenna diversity mitigates the adverse effects caused by which common WiFi problem?

Multipath

Which Wi-Fi technology simultaneously uses multiple radio chains to transmit or receive data?

Multiple Input, Multiple Output (MIMO)

Which WiFi technology simultaneously uses multiple radio chains to transmit or receive data?

Multiple Input, Multiple Output (MIMO)

A technology using multiple radio chains and multiple antennas, allowing for high throughput up to 600 Mbps in IEEE 802.11 wireless networks.

Multiple input/multiple output (MIMO)

Layer 3 of the OSI model; this layer is where the Internet Protocol (IP) protocol resides and is responsible for the addressing and routing of computer data.

Network layer

As a general rule, where is the most appropriate location to install a dipole antenna?

Near the center of the coverage area

Third layer of the OSI Model

Network

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

Network

Which layer of the OSI model is responsible for addressing and routing?

Network

In order to assess your customer's WiFi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting?

Network Administrator, Facilities manager

The way in which devices connected to a common infrastructure communicate and transmit data across a network medium from one device to another, as in CSMA/CD and CSMA/CA.

Network access method

In order to assess your customer's Wi-Fi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting? (Choose 2)

Network administrator Facilities manager

A standard for computer interface cards developed by Intel. Cards are inserted into an available slot (interface) in a desktop computer, allowing for the attachment of peripheral devices.

Peripheral Component Interconnect (PCI)

PAN

Personal Area Network

Which two of the following options are available for Wi-Fi protected Access 2 (WPA 2.0)?

Personal Mode Enterprise mode

A particular point in the time of a cycle; measured from some arbitrary zero and expressed as an angle and measured in degrees.

Phase

First layer of the OSI Model

Physical

Which layer of the OSI model uses physical addresses to deliver data to the destination?

Physical

The lower three layers of the OSI model are?

Physical Data Link Network

What level of the OSI model Consist of bit level data streams and Computer network Hardware connecting the devices together

Physical Layer

The default operation mode for enterprise-grade access points.

Root Access Point Mode

This operation mode involves connecting the access point to a distribution system.

Root Access Point Mode

The default mode of most access points; it allows wireless LAN client devices to connect to a wireless network and use computer network resources.

Root access point mode

Which access point mode involves connecting the access point to a distribution system for user access to the LAN?

Root access point mode

Which access point mode involves connecting the access point to a distribution system for user access to the LAN

Root access point mode

In addition to wireless networking which adapter was designed for flash memory storage and can be used in a Digital camera?

SDIO

Small office, home office; in wireless LAN terms, SOHO defines a smaller network with fewer client devices than in a large or enterprise deployment.

SOHO

Wi-Fi protected setup was designed for which o f the following wireless applications?

SOHO

The logical name of a WLAN is

SSID

An effect that occurs when an RF signal strikes an uneven surface. Wavefronts of the signal will reflect off the uneven surface in several directions.

Scattering

Semi-Directional Antenna

Sector Antenna

Semidirectional antenna that can be configured in a group to provide omnidirectional coverage. Useful in communities and campuses, or for wireless ISPs.

Sector antenna

Designed as a flash memory storage device with storage capacities from 8 MB to 4 GB. Now allows for connection of other devices such as cameras, global positioning system (GPS) units, FM radios, TV tuners, Ethernet networks, and Wi-Fi networks.

Secure Digital Input Output (SDIO)

The 802.11i amendment to the standard addresses which of the following technologies?

Security

Point to Point links typically use which antenna types?

Semidirectional and Highly Directional

Media Access Control (MAC)

The bit-level communication is accomplished through _____ addressing.

Which of the following statements is true about active scanning?

The client sends 802.11 Probe Request frames to query available APs.

54Mbps, OFDM

The data rates for IEEE 802.11a are up to _____ using____.

After successfully connecting to the WiFi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that ask for your name, room number, and a secret key. What has most likely happened?

The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network

physical, data link, network

The lower three layers of the OSI model are ______, _____, and __________.

MAC address

The physical address of a network adapter is the __________.

Given: In ABC Company's branch office, there are three 802.11n access points serviing 20 WiFi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the builiding during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time.

The picnic tables are located at the edge of the effective range of WiFi coverage

IEEE 802.11n

The release of this document opened the doors for manufacturers of IEEE 802.11 wireless LAN equipment, giving them the opportunity to move forward with new technology that allows for better performance, higher throughput, and several other benefits.

Wireless bridges must be configured with ____ and _____,

The same SSID The same RF channel

Wireless bridges must be configured with _______ and _______.

The same SSID and RF channel

D

The term encapsulation means to ____________. A. Add an IP address to a network adapter B. Add a MAC address to a network adapter C. Add topology information to a frame D. Add layer header and trailer information to a payload

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in WiFi networks because ___________.

The wireless transmission medium is half-duplex, thus shared by all users

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol is necessary in Wi-Fi networks because ___________.

The wireless transmission medium is half-duplex, thus shared by all users.

CompactFlash (CF) cards are available in two types. What is the main difference between the two types?

Thickness

802.11k

This IEEE 802.11 amendment addresses radio resource management.

802.11w

This IEEE 802.11 amendment designed to mitigate DoS or Hijacking attacks.

802.11r

This IEEE 802.11 amendment specifies fast secure roaming or fast transition technology for VoIP with wireless LAN technology

802.11 g

This amendment addresses extended data rates with OFDM technology.

802.11 y

This amendment allows for the use of high-powered wireless LAN equipment to operate in the 3.65-3.7 GHz band.

Physical addresses on a network device are responsible for which of the following?

To identify which device should receive the information

ring topology

Topolgy still widely used by ISPs for high-speed, resilient backhaul connections over fiber-optic links

The layout or physical design and interconnection of a computer network. A topology includes the cabling and devices that are part of the network.

Topology

A device used to connect two or more dissimilar types of LANs together, such as wireless (IEEE 802.11) and Ethernet (IEEE 802.3).

Translational bridge

Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP. What do you tell them is a benefit of using multiple antennas?

Transmit and receive diversity that addresses multipath problems.

What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology

WMAN

FCC

What organization is responsible for unlicensed frequency band regulation in the United States?

802.11ac-2013

Very High Throughput (VHT) enhancements below 6 GHz 5 GHz frequency bands Wider Channels New Modulation More Spatial Streams Improved MIMO and Beamforming

A logical separation of ports to define broadcast domains in a Layer 2 network, independent of their physical location.

Virtual local area networks (VLANs)

Which of the following statements is true regarding a wireless LAN controller?

Virtual local area networks involve a logical separation of ports

Technology that allows for private communications over a public network infrastructure such as the Internet. A VPN creates a secure tunnel for the user and the connected endpoint.

Virtual private network (VPN)

The ability of the transmitter and receiver to see each other.

Visual line of sight

Disruption common in a wireless LAN system, caused by a mismatch in the impedance.

Voltage standing wave ratio (VSWR)

The basic unit of measurement for radio frequency power.

Watt (W)

Which are absolute measurements of RF Power

Watt and mW

The distance of one complete cycle or one oscillation of an AC signal. Wavelength is typically identified by the Greek symbol lambda.

Wavelength

The range of a 2.4 GHz signal is mostly dependent on which RF characteristic?

Wavelength

direct sequence spread spectrum

What does DSSS stand for?

orthogonal frequency division multiplexing

What does OFDM stand for?

How do Wi-Fi routers differ from Wi-Fi access points?

Wi-Fi routers are comprised of both a router and an access point within the same hardware.

As an alternative to using leased lines to connect two offices on the same campus, your customer wants to implement a WiFi solution. When asked by your customer, what advantages do you cite regarding use of a WiFi infrastructure instead of a leased line?

WiFi implementations have a lower total cost of ownership than leased lines, WiFi implementations offer more flexibility and easier expansion than leased lines.

How do WiFi routers differ from WiFi access points?

WiFi routers are comprised of both a router and an access point within the same hardware

WAN

Wide Area Network

The effect of the force of wind on an antenna or other structure. In the case of an antenna, wind blowing at high speeds causes the antenna to move. Antennas designed for use in outdoor installations usually have a wind loading specification.

Wind loading

This operation mode for enterprise-grade access points can connect two or more LANs.

Wireless Bridge Mode

Mesh Mode has made this obsolete.

Wireless Distribution System (WDS)

ABC Manufactoring currently has 35 access points throughout their main facility, and each Friday afternoon two adminitrators walk the premises with specturm and protocol analyzers to detect unauthroized devices and network activity. You have noted several problems with this approach. To address the inefficiencies with this approach and to provide the most robust preventative security, you have set aside a portion of the department's budget to install a ______.

Wireless Intrusion Prevention System (WIPS)

A ________ will help determine and have the potential to mitigate certain levels of wireless intrusions or attacks on the network.

Wireless Intrusion Prevention Systems (WIPS)

What can help detect a rogue access point?

Wireless Intrusion Prevention Systems (WIPS)

Your customer has asked you to recommend a Wi-Fi solution that includes the following features: • Role Based Access Control • Stateful Firewall • Quality of Service What device type can perform all of these functions?

Wireless LAN Controller

Your customer has asked you to recommend a WiFi solution that includes the following features: 1. Role Based Access Control 2. Stateful Firewall 3. Quality of Service

Wireless LAN Controller

A device that usually consists of an Internet port, small Ethernet switch, and wireless access point. It allows SOHO and residential users to connect devices to the network and access the Internet. Also known as wireless broadband router or wireless residential gateway.

Wireless LAN router

This operation mode for enterprise-grade access points can act to extend the RF cell.

Wireless Repeater Mode

You have a notebook computer and wish to connect to an IEEE 802.11n wireless network the computer does not have a built in wireless LAN card or a pc card interface you do not want any peripherals connected to the notebook that use wires and do not want to disassemble the computer. Which wireless adapter would be the best solution?

Wireless USB 2.0

semidirectional or highly directional

Wireless point-to-point links typically call for ________antennas.

As part of a pre-deployment manual RF site survey, your manager has assigned to you the task of documenting security and interference details about exisiting WLANs in the building. What is the best tool for locating and collecting information about existing APs in the building?

Wireless protocol analyzer

As part of a pre-deployment manual RF site survey, your manager has assigned to you the task of documenting security and interference details about existing WLANs in the building. What is the best tool for locating and collecting information about existing APs in the building?

Wireless protocol analyzer

A device used to extend a radio frequency cell, it allows users located beyond the connection distance of a wireless access point to connect to a wireless LAN by repeating the signal to an access point.

Wireless repeater

A wireless client device that allows several Ethernet devices on an Ethernet segment to associate and connect to a wireless infrastructure through an access point. Also known as a wireless client bridge.

Wireless workgroup bridge

Which client device will allow a user to connect several Ethernet devices on a common segment to an access point?

Wireless workgroup bridge

Directional Antenna Tree shaped

Yagi

A semidirectional antenna typically used outdoors for short-range bridging or indoors for long hallways and corridors to provide RF coverage to a specific area.

Yagi antenna

Hybrid coordination function

_____ defines traffic classes and assigns a priority to the information to be transmitted.

Why is it better to configure access points from the wired side of the network?

You are not sending secure information over the internet.

B and C

You support a wireless network for an office of five employees. The installation consists of one access point, three notebook computers, and two desktop computers. The access point and computers i the office have wireless adapters that are Wi-Fi WPA 2.0 Certified. You want to use the highest level security possible without additional cost or administration. Which of the following solutions would be best for this deployment? (choose 2) A. WEP B. WPA 2.0 personal C. WPS D. WMM E. WPA 2.0 enterprise

Which are absolute measures of RF power? (Choose two.)

mW and Watt

802.11h-2003

mechanisms for dynamic frequency selection (DFS) and transmit power control (TPC) capability for 802.11 radios to transmit in a new frequency band called U-NII-2 Extended with 11 more channels

Robust Security Network (RSN)

method of establishing authentication, negotiating security associations, and dynamically generating encryption keys for client stations and access points

Improved MIMO and Beamforming

multi-user MIMO (MU-MIMO) technology simplified beamforming method called null data packet (NDP) beamforming

More Spatial Streams

ould be built to transmit and receive up to eight spatial streams

According to the PoE amendments, what is the term for an apparatus that delivers power?

power sourcing equipment (PSE)

According to the PoE amendments, what is the term for an apparatus that receives power?

powered device (PD)


Related study sets

Chap 6 - Bones & Skeleton Tissues (definitions, concepts & practice questions)

View Set

Investment Management Quiz 3 Review

View Set