What is the final step in an effective troubleshooting process?
You are a small business wireless network consultant and provide WLAN services for various companies. You receive a call from one of your customers stating that their laptop computers suddenly started experiencing much slower data transfers while connected to the WLAN. This company is located in a multi-tenant office building and the WLAN was
designed to support laptops, tablets and mobile phones. What could cause a sudden change in performance for the laptop computers?
What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?
When antenna gain is reported in dBi, the gain of the antenna is compared to what theoretical radiator?
To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.
What WLAN feature would allow the network administrator to accomplish this task?
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?
What statement about 802.11 WLAN bridges is true?
What phrase defines Equivalent Isotropically Radiated Power (EIRP)?
When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?
You are troubleshooting a client issue on a Windows laptop. The laptop can see and connect to 2.4 GHz APs, but is does not even see 5 GHz APs. While evaluating the issue, you determine that this problem is happening for all of the laptops of this model in the organization. Several other tablets connect on channel 48 and channel 52 in the same work areas. What is the likely problem?
A non-802.11 device is suspected of causing interference on the WLAN. You are not certain of the location or type of device. What is the best solution for locating this non-802.11 device?
You are attempting to explain RF shadow and how it can cause lack of coverage. What common building item frequently causes RF shadow and must be accounted for in coverage plans?
Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?
When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease?
What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?
You must plan for POE in an office environment. Which one of these devices is least likely to be a POE PSE?
You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.
Your manager suggests implementing these security practices. What response should you give to this suggestion?
You are deploying a WLAN with the access points configured for 10 mW of output power on the 2.4 GHz radios and 20 mW of output power on the 5GHz radios. Some semi-directional antennas are also in use. What kind of deployment is described?
Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter. What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?
The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using which other 802.11 physical layer specifications (PHYs)?
Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?
What statement about 802.11 WLAN performance is true?
Which one of the following channels can be used for VHT transmissions according to the 802.11 specification?
What is always required to establish a high quality 2.4 GHz RF link at a distance of 3 miles (5 kilometers)?
What is appended to the end of each 802.11 data frame after the payload?
When using a spectrum to look for non Wi-Fi interference sources, you notice significant interference across the entire 2.4 GHz band (not on a few select frequencies) within the desktop area of a users workspace, but the interference disappears quickly after just 2 meters. What is the most likely cause of this interference?
In a long-distance RF link, what statement about Fade Margin is true?
You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reporting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)
802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?
You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating.
What common spectrum analyzer view should you use for this analysis?
What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?
What factor does not influence the distance at which an RF signal can be effectively received?
In which plane of the three networking planes is an access point configured by a WLAN controller?
A dual-band 802.11ac AP must be powered by PoE. As a class 4 device, what power level should be received at the AP?
A client complains of low data rates on his computer. When you evaluate the situation, you see that the signal strength is -84 dBm and the noise floor is -96 dBm. The client is an 802.11ac client and connects to an 802.11ac AP. Both the client and AP are 2x2:2 devices. What is the likely cause of the low data rate issue?