What best describes WPA2 in relation to 802.11 wireless networks?
A. WPA2 is specified in the 802.11 standard as implementing CCMP/AES.
B. WPA2 is the standard that defines security for WLANs.
C. WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/ AES.
D. WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.
Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter.
What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?
A. The use of cables longer than one meter in the RF system
B. High output power at the transmitter and use of a low-gain antenna
C. A Voltage Standing Wave Ratio (VSWR) of 1:1
D. An impedance mismatch between components in the RF system
What common feature of MDM solutions can be used to protect enterprise data on mobile devices?
A. Over-the-air registration
B. Onboarding
C. Containerization
D. Self-registration
What non-standard WLAN solution attempts to give a longer transmission windows to devices with higher data rates then devise with lower data rates?
A. AirTime Fairness
B. Band Steering
C. ARM
D. RRM
You are installing an AP to be used by 23 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?
A. Channel 6, because it is always best to use this channel
B. A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision
C. Channel 1, because it is best to use the channel with the lowest frequency
D. Channel 11, because channels 1 and 6 are in use nearby
You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzers?
A. Frames with the HN bit set to 1
B. Frames with the retry bit set to 0
C. Frames transmitted from the AP without acknowledgement
D. Retransmitted frames from multiple STAs at higher rates than other STAs
In addition to coverage analysis result, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?
A. Layer 4 protocol availability analysis results
B. Application Layer protocol availability analysis results
C. Capacity analysis results
D. WAN interface analysis results
You are troubleshooting an issue reported by several wireless users. The problem is contained to one cell (several users connected to the same AP). You manage the WLAN and no other network devices. After analysis it appears to be a switch problem. What action should be taken?
A. Create a plan of action and implement it
B. Escalate the problem to the network administration team
C. Document the results and close the case
D. Escalate the problem to the wireless vendor support staff
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?
A. Temporal Key Integrity Protocol
B. Extensible Authentication Protocol
C. Counter Mode with CBC- MAC Protocol
D. Wired Equivalent Privacy
What ID is typically mapped to an AP's MAC address if a single BSS is implemented?
A. VLAN ID
B. BSSID
C. Device ID
D. SSID
A non-802.11 device is suspected of causing interference on the WLAN. You are not certain of the location or type of device. What is the best solution for locating this non-802.11 device?
A. Access point spectrum analyzer
B. Laptop-based spectrum analyzer with an omni-directional antenna
C. Laptop-based spectrum analyzer with a directional antenna.
D. Laptop-based spectrum analyzer with an omni-directional antenna.
What statement about the beamwidth of an RF antenna is true?
A. Horizontal and vertical beamwidth are calculated at the point where the main lobe decreases power by 3 dB.
B. Vertical beamwidth is displayed (in degrees) on the antenna's Azimuth chart.
C. When antenna gain is lower, the beamwidth is also lower in both the horizontal and vertical dimensions.
D. The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops propagating.
A standard PoE injector is used to power an access point requiring 802.3at. CAT6 cabling is in use. What is the maximum distance supported between the access point and the Ethernet switch with the use of a midspan power injector?
A. 100 meters
B. 300 meters
C. 328 meters
D. 200 meters
You are configuring an access point to use channel 128. What important fact should be considered about this channels?
A. It is a 22 MHz channel so it will overlap with the channels above and below it
B. It is a 2.4 GHz frequency band 40 MHz channel, so it should not be used
C. It is a channel that is unsupported by most access points
D. It is a channel that likely requires DFS when used
Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?
A. VHT (802.11ac)
B. OFDM (802.11a)
C. DSSS (802.11-Prime)
D. HT (802.11n)