Which one of the statements regarding the Frame Control field in an 802.11 MAC header is true?
Which one of the following statements is not true concerning DTIMs?
Where would you look in a packet trace file to identify the configured Minimum Basic Rate (MBR) of a BSS?
When a data frame is encrypted with WPA2, to which portion of the frame is the encryption applied?
In what scenario is Open Authentication without encryption not allowed based on the 802.11 standard?
How is the length of an AIFS calculated?
When would you expect to see a Reassociation Request frame'
As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.
To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.
What do you conclude from this troubleshooting exercise?
After examining a Beacon frame decode you see the SSID Element has a length of 0. What do you conclude about this frame?
Which one of the following is not an 802.11 Management frame?
What is the function of the PHY layer?
You are analyzing a packet decode of a Probe Request and notice the SSID element has a length of zero. What do you conclude about the transmitting STA?
The network administrator at ABC Engineering has taken a large packet capture from one of their APs running in monitor mode. She has very little knowledge of 802.11 protocols but would like to use the capture file to evaluate the overall health and performance of their wireless network. When she asks your advice, which tool do you recommend she opens the packet capture file with?
Which one of the following is not a valid acknowledgement frame?
What interframe space would be expected between a CIS and a Data frame?
A manufacturing facility has installed a new automation system which incorporates an 802.11 wireless network. The automation system is controlled from tablet computers connected via the WLAN. However, the automation system has not gone live due to problem with the tablets connecting to the WLAN. The WLAN vendor has been onsite to perform a survey and confirmed good primary and secondary coverage across the facility. As a CWAP you are called in to perform Spectrum Analysis to identify any interference sources. From the spectrum analysis, you did not identify any interference sources but were able to correctly identify the issue. Which of the following issues did you identify from the spectrum analysis?
Which common feature of a Spectrum Analyzer would be the best to help you locate a non-802.11 interference source?
In the 2.4 GHZ band, what data rate are Probe Requests usually sent at from an unassociated STA?