An AP is advertised as a tri-band, 4x4:4, Wi-Fi 6, 802. 11ax AP. Based on this information and assuming it is correctly advertised, what can be determined as certainly true about this AP?
You are using a site survey tool for post-implementation validation. You have installed the appropriate adapter driver and imported a floor plan. Now, you want to take the next step in proper tool use. What must you do before gathering survey data after the floor plan is imported?
You are evaluating access points for use in the 5 GHz frequency band. What PHY supports this band and supports 80 MHz channels?
You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?
In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?
What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?
You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?
What statement about 802.11 WLAN bridges is true?
An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?
You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?
When considering data rates available in HT and VHT PHY devices, in addition to the modulation, coding, channel width, and spatial streams, what impacts the data rate according to the MCS tables?
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?
What facts are true regarding controllers and APs in a Split MAC architecture?
You must plan for POE in an office environment. Which one of these devices is least likely to be a POE PSE?
A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this
scenario?
Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?
What statement about the IEEE 802.11-2016 QoS facility is true?
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)
802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?
A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?
An 802.11 WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB of loss. The cable is connected to an antenna with 16 dBi of gain. What is the power level at the Intentional Radiator?
You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.
Your manager suggests implementing these security practices. What response should you give to this suggestion?
You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?
An RF signal sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?
You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?
You were previously onsite at XYZ’s facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey.
When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?
Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter. What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?
What feature of 802.1 lax (HE) may impact design decisions related to AP placement and the spacing between same-channel BSS cells (3SAs) because it is designed to reduce overlapping BSS contention?
You administer a WLAN that offers a guest SSID of GUESTNWORK. Users connect to the GUESTNWORK SSID, but report that they cannot browse the Internet. The devices simply report no Internet connection. What common problem causes this scenario?
You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?
A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?
You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?
What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?
What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?
You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating.
What common spectrum analyzer view should you use for this analysis?