A string of characters and digits is entered into an AP a client STA for WPA2 security. The string is 8 characters long. What is this string called?
You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzers?
What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.
A natural disaster has occurred in a remote area that is approximately 40 miles from the response team headquarters. The response team must setup a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network backhaul for communications across the Internet in this scenario?
When antenna gain is reported in dBI, the gain of the antenna is compared to what theoretical antenna?
You support a WLAN using dual- band 802.11ac three stream access points. All access points have both the 2.4 GHz and 5 GHz radios enabled and use 40 MHz channels in 2.4 GHz. A manager is concerned about the fact that each access point is connected using a 1 Gbps Ethernet link. He is concerned that the Ethernet link will not be able to handle the load from the wireless radios. What do you tell him?
When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease?
What non-standard WLAN solution attempts to give a longer transmission windows to devices with higher data rates then devise with lower data rates?
You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?
In addition to coverage analysis result, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?
You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIDs, which are different that the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?
You are attempting to explain RF shadow and how it can cause lack of coverage. What common building item frequently causes RF shadow and must be accounted for in coverage plans?
What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?
You are evaluating access points for use in the 5 GHZ frequency band. What PHY supports this band and supports 80 MHz channels?
You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?
You administer a WLAN that offers a guest SSID of GUESTNWORK. User connect to the GUESTNWORK SSID, but report that they cannot browse the internet. The devices simply report no internet connection. What common problem causes this scenario?
ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3 PoE.
After hearing this information, what immediate concerns do you note?
What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?
You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.
What kind of application is described?
In WLAN security, what authentication method always creates Layer 2 dynamic encryption keys?
ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.11X Authenticator?
The BSA of an AP covers the area used by the sales and marketing department. Thirty-five stations operate in this space. The users indicate that they need more throughput and all stations are 5 GHz capable 802.11ac clients. The current AP configuration uses 20 MHz channels in both 2.4 GHz and 5 GHz. What is the least expensive solution available for increasing throughput for these users without implementing configuration options that are not recommended?