A non-802.11 device is suspected of causing interference on the WLAN. You are not certain of the location or type of device. What is the best solution for locating this non-802.11 device?
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?
You support a WLAN using dual-band 802.11ac three stream access points. All access points have both the 2.4 GHz and 5 GHz radios enabled and use 40 MHz channels in 5 GHz and 20 MHz channels in 2.4 GHz. A manager is concerned about the fact that each access point is connected using a 1 Gbps Ethernet link. He is concerned that the Ethernet link will not be able to handle the load from the wireless radios. What do you tell him?
You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIDs, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?
A client complains of low data rates on his computer. When you evaluate the situation, you see that the signal strength is -84 dBm and the noise floor is -96 dBm. The client is an 802.11ac client and connects to an 802.11acAP. Both the client and AP are 2x2:2 devices. What is the likely cause of the low data rate issue?
When using a spectrum to look for non Wi-Fi interference sources, you notice significant interference across the entire 2.4 GHz band (not on a few select frequencies) within the desktop area of a users workspace, but the interference disappears quickly after just 2 meters. What is the most likely cause of this interference?
When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease?
You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.
Your manager suggests implementing these security practices. What response should you give to this suggestion?
What factor will have the most significant impact on the amount of wireless throughput available to each station within a BSS?
You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.
What kind of application is described?
You administer a small WLAN with nine access points. As a small business, you do not run a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-Personal in all APs and clients. Several users are now reporting the inability to connect to the network at times and it is constrained to one area of the building. When using a WLAN scanner, you see that the AP covering that area is online and has a strong signal. No other changes have been made to the environment and all access points are the same model. What is the likely problem?
Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?
You are reconfiguring an AP to use the short guard interval. How long will the new guard interval duration be after the change?
Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?
The BSA of an AP covers the area used by the sales and marketing department. Thirty-five stations operate in this space. The user indicate that they need more throughput and all stations are 5 GHz capable 802.11ac clients. The current AP configuration uses 20 MHz channels in both 2.4 GHz and 5 GHz. What is the least expensive solution available for increasing throughput for these users without implementing configuration options that are not recommended?
XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.
As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, should be supported to provide the management frame protection and fast secure roaming security features?
A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?
You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?
You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?
Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?
When antenna gain is reported in dBI, the gain of the antenna is compared to what theoretical antenna?
What common feature of MDM solutions can be used to protect enterprise data on mobile devices?
An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop. What WLAN use case is represented?
You are troubleshooting a controller-based AP that is unable to locate the controller. DHCP is not used and the controller is located at 10.10.10.81/24 while the AP is on the 10.10.16.0/24 network. What should be inspected to verify proper configuration?
You are planning for PoE in a standard office deployment. Which one of these devices is least likely to be a PoE PD?
Three access points are used within a facility. One access point is on channel 11 and the other two are on channel 1. The two access points using channel 1 are on either side of the access point using channel 11 and sufficiently apart so that they do not interfere with each other when they transmit frames. Assuming no other APs are in the vicinity, is CCI still a possibility in this network and why?
Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive design software for the task, but the company insists on a pre-deployment site visit.
What task should be performed as part of the pre-deployment visit to prepare for a predictive design?
What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?
What standard is referenced in the 802.11-2016 specification and is recommended for robust WLAN client security?
You support a WLAN using dual- band 802.11ac three stream access points. All access points have both the 2.4 GHz and 5 GHz radios enabled and use 40 MHz channels in 2.4 GHz. A manager is concerned about the fact that each access point is connected using a 1 Gbps Ethernet link. He is concerned that the Ethernet link will not be able to handle the load from the wireless radios. What do you tell him?
You are troubleshooting a client problem with a 2.4 GHz WLAN connection. The client is experiencing surprisingly low data rates during the work day. You analyze the workspace outside of business hours and detect a strong signal with a typical noise floor at the client location. During working hours, the user works with a laptop in the area and uses an external USB hard drive for continuous data access. The user also states that the laptop works as expected on her home network. The user working approximately 8 feet away from this client experiences no problems.
Based on this information, what is the likely cause of the problem?
When a STA has authenticated to an AP (AP-1), but still maintains a connection with another AP (AP-2), what is the state of the STA on AP-1?
Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to-point WLAN bridge link?
Option 43 must be configured to allow access points to locate controllers. In what network service should this option be configured?
A natural disaster has occurred in a remote area that is approximately 40 miles from the response team headquarters. The response team must setup a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of network backhaul for communications across the Internet in this scenario?
What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?
You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?
You are configuring an access point to use channel 128. What important fact should be considered about this channels?
A standard PoE injector is used to power an access point requiring 802.3at. CAT6 cabling is in use. What is the maximum distance supported between the access point and the Ethernet switch with the use of a midspan power injector?