1.
As XYZ Company’s wireless specialist, you have been asked to troubleshoot some unexpected frame patterns in a wireless protocol capture. Your peers explain that the network’s beacon frames are inconsistent. That is, the BSSID is the same for all beacons, but the source address varies between three different addresses. What network configuration would cause this beacon frame behavior?
Correct Answer
B. The beacons are from an IBSS instead of a BSS
Explanation
The inconsistent beacon frames with the same BSSID but different source addresses indicate that the beacons are from an Independent Basic Service Set (IBSS) instead of a Basic Service Set (BSS). In an IBSS, also known as an ad hoc network, devices communicate directly with each other without the need for an access point. Each device acts as a peer and can take turns transmitting beacons with its own source address. This behavior is different from a BSS, where the access point is responsible for transmitting the beacons with a consistent source address.
2.
When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?
Correct Answer
C. VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.
Explanation
VHT TXOP power save improves battery life for devices on a WLAN by using the partial AID in the preamble to allow clients to identify frames targeted for them. This means that devices can selectively wake up and process only the frames that are intended for them, reducing the overall power consumption. By efficiently managing the power usage, VHT TXOP power save helps to extend the battery life of devices on a WLAN.
3.
As defined in the 802.11 specification, legacy Power Save requires an inefficient back-and-forth frame exchange process. Due to this inefficiency, many WLAN device implementations use a variation of 802.11 Power Save to accomplish the same function. What non-standard power save behavior is used by most Wi-Fi devices in actual legacy Power Save implementations?
Correct Answer
B. Clients send null data frames to the AP and switch the power management bit from 1 to 0 to receive queued data.
Explanation
In most Wi-Fi devices, the non-standard power save behavior used in actual legacy Power Save implementations is that clients send null data frames to the AP and switch the power management bit from 1 to 0 to receive queued data. This allows the clients to conserve power by entering a sleep mode while still being able to receive any data that is waiting for them. By sending null data frames and changing the power management bit, the clients can effectively control when they want to receive the queued data from the AP.
4.
What term correctly completes the following sentence? In an IEEE 802.11 frame, the IP packet is considered by the MAC layer to be a(n) _________.
Correct Answer
B. MAC Service Data Unit (MSDU)
Explanation
In an IEEE 802.11 frame, the IP packet is considered by the MAC layer to be a(n) MAC Service Data Unit (MSDU). This term refers to the data unit that is passed from the higher layer (network layer) to the MAC layer for transmission over the wireless medium. The MSDU includes the IP packet along with any necessary headers or trailers added by the MAC layer.
5.
What term correctly completes the following sentence? 802.11a/b/g used a mandatory 800ns guard interval. 802.11n introduced an optional short 400ns guard interval. Guard intervals (GI) are necessary in OFDM to reduce the likelihood of interference between two consecutive ____________.
Correct Answer
C. Symbols
Explanation
Guard intervals (GI) are necessary in OFDM to reduce the likelihood of interference between two consecutive symbols. In the context of the given question, 802.11a/b/g and 802.11n are wireless communication standards that use OFDM (Orthogonal Frequency Division Multiplexing) modulation. The guard interval is a period of time inserted between symbols to mitigate the effects of multipath interference. Therefore, the correct term to complete the sentence is "Symbols".
6.
Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association?
Correct Answer
B. Signal strength of access point beacons received
Explanation
802.11 client devices can measure and use the signal strength of access point beacons received to select the optimal access point for association. This is because the signal strength indicates the quality of the connection between the client device and the access point. A stronger signal strength suggests a better connection and therefore a more optimal access point for association.
7.
In an infrastructure Basic Service Set (BSS), how does the passive scanning process occur?
Correct Answer
C. Access points broadcast Beacons on a single channel for which they are programmed. Nearby client stations listen for Beacon frames and record information found in the Beacons for use in the association process.
Explanation
In an infrastructure Basic Service Set (BSS), the passive scanning process occurs when access points broadcast Beacon frames on a single channel for which they are programmed. Nearby client stations listen for these Beacon frames and record the information found in them. This information is then used by the client stations in the association process, allowing them to connect to the appropriate access point in the BSS.
8.
During the discovery and connectivity process, client and AP stations exchange information about their supported data rates. After the association, how do client and AP stations select the supported data rate that will be used to send an 802.11 data frame?
Correct Answer
C. The client and AP each choose the optimal data rate to use independently of one another, based on their own measurements related to the RF link.
Explanation
During the association process, both the client and AP stations independently select the optimal data rate to use for sending 802.11 data frames. This selection is based on their own measurements and observations of the RF link. The client and AP do not rely on each other to determine the data rate. They agree to use the same transmit rate initially, but either station can request a change at any time after the association.
9.
As a station moves away from the access point to which it is associated, it changes its data rate from 600 Mbps to 540 Mbps and then to 450 Mbps. What IEEE 802.11 term is used to describe this functionality?
Correct Answer
D. Dynamic Rate Switching
Explanation
Dynamic Rate Switching is the term used to describe the functionality where a station changes its data rate as it moves away from the associated access point. This feature allows the station to maintain a stable connection by adjusting the data rate based on the signal strength and quality.
10.
What statement about the IEEE 802.11e QoS facility is true?
Correct Answer
C. 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.
Explanation
The statement that is true about the IEEE 802.11e QoS facility is that 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention. This means that the high priority queues have a higher chance of accessing the wireless medium and transmitting their frames, resulting in improved quality of service for those queues.
11.
What distinguishes an independent basic service set (IBSS) from an infrastructure basic service set (BSS)?
Correct Answer
C. An IBSS does not have a distribution system (DS), but a BSS does.
Explanation
An independent basic service set (IBSS) is a type of wireless network where devices communicate directly with each other without the need for a centralized access point. In an IBSS, there is no distribution system (DS) which refers to the infrastructure that connects multiple access points together to form a larger network. On the other hand, an infrastructure basic service set (BSS) relies on a distribution system (DS) to connect multiple access points and create a larger network. Therefore, the distinguishing factor between an IBSS and a BSS is that an IBSS does not have a distribution system (DS), while a BSS does.
12.
What statements about the SSID are true? (Choose 2)
Correct Answer(s)
B. The SSID must be included in an association request frame.
D. The SSID is an alpHanumeric value with a maximum length of 32 octets.
Explanation
The SSID must be included in an association request frame because it is used to identify the network that a device wants to connect to. The SSID is an alphanumeric value with a maximum length of 32 octets, which means it can contain letters, numbers, and special characters and cannot exceed 32 characters in length. This limit is set to ensure compatibility and efficient communication between devices.
13.
In an enterprise WLAN, what condition will prevent a dual-band VHT/HT client device from performing a fast and seamless transition (i.e. latency-sensitive applications are not disrupted) between two access points that are managed by the same WLAN controller?
Correct Answer
C. The SSID of the current AP does not match the SSID of the new AP.
Explanation
If the SSID of the current AP does not match the SSID of the new AP, it will prevent a dual-band VHT/HT client device from performing a fast and seamless transition between the two access points. The SSID is the unique identifier of the wireless network, and if it does not match, the client device will not be able to connect to the new AP smoothly. This can cause disruptions in latency-sensitive applications as the device may experience a delay or loss of connection during the transition.
14.
When a client moves to a new BSS within an ESS, what steps are part of the 802.11 reassociation process? (Choose 2)
Correct Answer(s)
C. The new access point transmits a Reassociation Response to the client station with a status value.
D. The client and new access point create unicast encryption keys.
Explanation
When a client moves to a new BSS within an ESS, the 802.11 reassociation process involves the following steps:
1) The new access point transmits a Reassociation Response to the client station with a status value, indicating the success or failure of the reassociation.
2) The client and new access point create unicast encryption keys to establish a secure communication channel. These keys are used to encrypt and decrypt data between the client and the new access point.
15.
A Wi-Fi Alliance interoperability certificate indicates that a device is a/b/g/n certified. It further indicates one transmit and receive spatial stream for both the 2.4 GHz and 5.0 GHz bands. It further indicates support for both WPA and WPA2 Enterprise and Personal. Finally, it indicates support for EAP-TLS, EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2 and PEAPv1/EAP-GTC. Which one of the following statements is false?
Correct Answer
C. 300 Mbps is the maximum supported data rate for this device.
Explanation
The given statement is false because the question states that the device is a/b/g/n certified, which means it supports up to 600 Mbps data rates for both the 2.4 GHz and 5.0 GHz bands. Therefore, the maximum supported data rate for this device is not 300 Mbps.
16.
Which data rate is supported by 802.11g radios that is not supported by 802.11a radios?
Correct Answer
C. 11 Mbps
Explanation
802.11g radios support a data rate of 11 Mbps, which is not supported by 802.11a radios. The 802.11a standard supports data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps, while the 802.11g standard supports data rates of 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, and 54 Mbps. Therefore, the correct answer is 11 Mbps.
17.
Which of the following frequency ranges are specified for use by IEEE 802.11 radios? (Choose all that apply.)
Correct Answer(s)
B. 2.4000 – 2.4835 GHz
C. 5.15 – 5.25 GHz
D. 5.470 – 5.725 GHz
E. 5.725 – 5.875 GHz
Explanation
The frequency ranges specified for use by IEEE 802.11 radios are 2.4000 – 2.4835 GHz, 5.15 – 5.25 GHz, 5.470 – 5.725 GHz, and 5.725 – 5.875 GHz. These frequency ranges are commonly used for Wi-Fi communication and are regulated by the IEEE 802.11 standard.
18.
The OSI model is a 7-layer model for understanding the functions of a communication system. What OSI sublayers are specifically addressed by the IEEE 802.11-2012 standard? (Choose 2)
Correct Answer(s)
A. PLCP
C. MAC
Explanation
The IEEE 802.11-2012 standard specifically addresses the PLCP (Physical Layer Convergence Protocol) and MAC (Media Access Control) sublayers of the OSI model. These sublayers are essential for the functioning of a communication system using the IEEE 802.11-2012 standard. The PLCP sublayer is responsible for providing a reliable physical connection between devices, while the MAC sublayer handles the access to the shared communication medium and manages the data transmission.
19.
What features were introduced in the IEEE 802.11h amendment in order to uphold regulatory requirements for 5 GHz operation? (Choose 2) .
Correct Answer(s)
C. Dynamic Frequency Selection (DFS)
D. . Transmit Power Control (TPC)
Explanation
The IEEE 802.11h amendment introduced Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) features in order to uphold regulatory requirements for 5 GHz operation. DFS allows devices to detect and avoid interference from radar systems by dynamically selecting and switching to available frequency channels. TPC enables devices to adjust their transmit power levels to comply with regulatory limits and avoid interference with other devices operating in the same frequency band. These features help ensure efficient and interference-free operation in the 5 GHz spectrum.
20.
The IEEE 802.11a/n/ac physical layer technologies utilize the 5 GHz frequency band. What is true of the channels in this frequency spectrum?
Correct Answer
B. DFS may be required in some regulatory domains on some channels
Explanation
The correct answer is that DFS (Dynamic Frequency Selection) may be required in some regulatory domains on some channels. This means that in certain regions or countries, certain channels within the 5 GHz frequency band may require DFS to avoid interference with radar systems. DFS allows devices to detect radar signals and switch to a different channel if necessary. However, it is important to note that DFS is not required in all regulatory domains or on all channels, hence the use of "may be required" in the answer.
21.
When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?
Correct Answer
D. Each AP responds in turn after preparing a probe response and winning contention
Explanation
When a client station sends a broadcast probe request frame with a wildcard SSID, each AP responds in turn after preparing a probe response and winning contention. This means that each AP will wait for its turn to respond, ensuring that there is no collision in the transmission. After waiting a SIFS (Short Interframe Space), the designated AP sends an ACK (Acknowledgement) to confirm the receipt of the probe request. Then, each AP prepares a probe response and checks if it has won contention, meaning it has the right to respond. Only one AP will be selected to send the probe response to the client station.
22.
In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network bandwidth (e.g. 130 Mbps) for user data throughput when multiple clients are actively exchanging data with the AP? (Choose 2)
Correct Answer(s)
B. WLAN devices cannot detect collisions and must receive positive frame acknowledgment
E. The DCF and EDCA coordination functions require backoff algorithms
Explanation
WLAN devices cannot detect collisions and must receive positive frame acknowledgment because collisions can occur when multiple devices attempt to transmit data at the same time, causing data loss and decreased network efficiency. The DCF and EDCA coordination functions require backoff algorithms to manage access to the shared medium and prevent collisions. These algorithms introduce a random delay before retransmitting data, allowing other devices to have a chance to transmit and reducing the likelihood of collisions.
23.
What answers correctly complete the following sentence? ____________ and ____________ carrier sense functions are used to determine if the wireless medium is busy. (Choose 2)
Correct Answer(s)
C. Virtual
F. . pHysical
Explanation
Virtual and Physical carrier sense functions are used to determine if the wireless medium is busy. Virtual carrier sense is a mechanism used in wireless networks to detect the presence of other devices on the network by listening to the medium. Physical carrier sense, on the other hand, involves sensing the actual physical properties of the medium, such as signal strength or energy levels, to determine if it is being used by another device. Both of these functions are important in ensuring that devices can access the wireless medium without causing interference or collisions.
24.
The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz). What is the center frequency of channel 4
Correct Answer
A. 2.427 GHz
Explanation
The center frequency of channel 4 in the 2.4 GHz band is 2.427 GHz. This can be determined by adding 5 MHz to the center frequency of channel 1 (2.412 GHz), since each channel in the 2.4 GHz band is spaced 5 MHz apart.
25.
What facts are true regarding controllers and APs in a Split MAC architecture? (Choose 2)
Correct Answer(s)
B. An IP tunnel is established between the AP and controller for AP management and control functions.
E. In a distributed data forwarding model, the AP handles frame encryption and decryption.
Explanation
In a Split MAC architecture, an IP tunnel is established between the AP and controller for AP management and control functions. This allows the controller to manage and control the AP remotely. Additionally, in a distributed data forwarding model, the AP handles frame encryption and decryption. This means that the AP is responsible for securing the data frames by encrypting and decrypting them before transmitting them over the network.
26.
In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping? (Choose 2)
Correct Answer(s)
B. Channels 2 and 8
E. Channels 5 and 10
Explanation
In an 802.11 2.4 GHz system, channels 2 and 8 are considered non-overlapping because they have a separation of 6 channels between them. Similarly, channels 5 and 10 are also non-overlapping as they have a separation of 5 channels between them. The non-overlapping channels are used to minimize interference between neighboring wireless networks operating on the same frequency band.
27.
What are two channel modes specified by the 802.11n (High Throughput) pHY? (Choose 2)
Correct Answer(s)
B. . 20/40 MHz
F. 20 MHz
Explanation
The 802.11n (High Throughput) PHY specifies two channel modes: 20/40 MHz and 20 MHz. These channel modes determine the width of the channel used for wireless communication. The 20/40 MHz mode allows for the use of both 20 MHz and 40 MHz channel widths, providing increased bandwidth and throughput. The 20 MHz mode, on the other hand, uses a narrower channel width, which may be preferred in certain situations where interference or congestion is a concern.
28.
What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)
Correct Answer(s)
B. The number of client stations associated to the BSS
D. The data rates at which nearby client stations are transmitting and receiving data
Explanation
The number of client stations associated to the BSS will have a significant impact on the amount of wireless bandwidth available to each station because as the number of stations increases, the available bandwidth will be divided among them, resulting in lower bandwidth for each station.
The data rates at which nearby client stations are transmitting and receiving data will also have a significant impact on the available bandwidth. If nearby stations are using high data rates, it can reduce the available bandwidth for other stations in the BSS.
29.
What factors are likely to cause the greatest impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS? (Choose 3)
Correct Answer(s)
A. Increasing or decreasing the number of spatial streams in use by the client station and AP
C. Use of WEP or TKIP for encryption instead of CCMP
D. RF interference from more than 10 nearby Bluetooth transmitters
Explanation
Increasing or decreasing the number of spatial streams in use by the client station and AP can have a significant impact on the application layer throughput of an 802.11n client station. Spatial streams are a key feature of 802.11n that allow for multiple data streams to be transmitted simultaneously, increasing the overall throughput. By increasing or decreasing the number of spatial streams, the client station and AP can adjust the data transmission rate to optimize performance.
The use of WEP or TKIP for encryption instead of CCMP can also impact the application layer throughput. WEP and TKIP are older and less secure encryption methods, which can introduce additional overhead and reduce the overall throughput compared to the more efficient CCMP encryption.
RF interference from more than 10 nearby Bluetooth transmitters can also cause a significant impact on the application layer throughput. Bluetooth operates in the same frequency range as 2.4 GHz Wi-Fi, and the interference from multiple Bluetooth devices can degrade the Wi-Fi signal, leading to reduced throughput and performance.
30.
In addition to throughput enhancements, what other improvements does a dual-band 802.11ac AP provide when compared with 802.11a/g APs? (Choose 2)
Correct Answer(s)
A. Improves service quality for real-time applications at greater distances
D. Better link reliability between 802.11a/b/g client devices and 802.11ac APs
Explanation
A dual-band 802.11ac AP provides improvements in service quality for real-time applications at greater distances. This means that users can experience better performance and reliability when using applications that require real-time data transmission, such as video streaming or online gaming, even when they are farther away from the access point. Additionally, a dual-band 802.11ac AP offers better link reliability between 802.11a/b/g client devices and the access point. This means that devices using older Wi-Fi standards can still maintain a strong and stable connection with the access point, ensuring a seamless user experience.
31.
The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using which other 802.11 physical layer specifications (pHYs)? (Choose 2)
Correct Answer(s)
B. HT
D. OFDM
Explanation
The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using the HT and OFDM physical layer specifications. This means that VHT capable devices should be able to communicate with devices that use the HT and OFDM PHYs, ensuring compatibility and interoperability between different generations of devices. This requirement allows for a smooth transition and coexistence between older and newer devices in a wireless network.
32.
Which IEEE 802.11 physical layer (pHY) specifications include support for and compatibility of both OFDM and HR/DSSS? (Choose 2)
Correct Answer(s)
B. HT (802.11n)
F. ERP (802.11g)
Explanation
The correct answer is HT (802.11n) and ERP (802.11g). These two IEEE 802.11 physical layer specifications include support for and compatibility of both OFDM and HR/DSSS. OFDM is a modulation scheme used in 802.11a and 802.11n, while HR/DSSS is used in 802.11b. HT (802.11n) supports both OFDM and HR/DSSS, making it compatible with both 802.11a and 802.11b. Similarly, ERP (802.11g) also supports both OFDM and HR/DSSS, making it compatible with both 802.11a and 802.11b.
33.
As a consultant, you’ve been hired by XYZ Company to provide recommendations about client device selection, operation, and interoperability. What information should be considered to help them choose the right WLAN client devices?
Correct Answer
A. 802.11ac devices support the features of the VHT pHY only in the 5 GHz frequency band.
Explanation
The correct answer is that 802.11ac devices support the features of the VHT PHY only in the 5 GHz frequency band. This information is important for XYZ Company to consider when choosing the right WLAN client devices because it indicates that if they want to take advantage of the higher speeds and capabilities offered by the VHT PHY, they will need to ensure that their client devices are operating in the 5 GHz frequency band. This may influence their decision on which devices to select and how to configure their wireless network.
34.
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) in IEEE 802.11 WLANs?
Correct Answer
B. 802.11ac VHT-OFDM utilizes 256-QAM, which increases the data rate significantly over 64QAM available in HT-OFDM.
Explanation
802.11ac VHT-OFDM utilizes 256-QAM, which increases the data rate significantly over 64QAM available in HT-OFDM. This means that 802.11ac can transmit more data per symbol, resulting in higher data rates.
35.
What statements accurately describe the RF cables and connectors that are used in an 802.11 WLAN system? (Choose 3)
Correct Answer(s)
B. RF cables have upper and lower frequency range specifications.
C. Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications. D. Every RF connector
D. Every RF connector causes insertion loss.
Explanation
RF cables have upper and lower frequency range specifications, meaning that they can only transmit signals within a certain frequency range. Two RF connectors of the same type, but manufactured by different companies, may vary in specifications, which can affect their compatibility and performance. Every RF connector causes insertion loss, which refers to the decrease in signal strength when it passes through the connector.
36.
When using an RF splitter to connect one transceiver to sector antennas loss is incurred. What is this loss called?
Correct Answer
A. Through loss
Explanation
When using an RF splitter to connect one transceiver to sector antennas, some signal loss occurs. This loss is known as "through loss."
37.
XYZ Corporation is experiencing connectivity problems with their existing building-to-building bridge link. A concrete wall on the roof of one building is partially blocking the Fresnel Zone, and the connection is dropping many frames. The administrator moves the antenna to an area not obstructed by the concrete wall and then realizes the RF cable cannot reach the new location. If an extension cable is added to move the antenna, what are the likely results?
Correct Answer
D. The Equivalent Isotropically Radiated Power (EIRP) will decrease.
Explanation
If an extension cable is added to move the antenna, the Equivalent Isotropically Radiated Power (EIRP) will decrease. This is because the extension cable will introduce additional loss and attenuation, reducing the overall power output of the antenna. As a result, the signal strength and coverage area will be reduced, impacting the connectivity and data throughput rate. The other options mentioned in the question, such as the size of the Fresnel zone, antenna's azimuth beamwidth, data throughput rate, and likelihood of a direct lightning strike, are not directly affected by adding an extension cable.
38.
What is the intended use for the WLAN hardware known as a pole or mast mount unit?
Correct Answer
A. Mounting an omnidirectional antenna to a mast
Explanation
The intended use for the WLAN hardware known as a pole or mast mount unit is to mount an omnidirectional antenna to a mast. This allows for better signal coverage and range in all directions, as the antenna can be elevated and positioned for optimal performance.
39.
Which answer correctly completes the following sentence? The WMM certification, created by the Wi-Fi Alliance, is based on the ___________ coordination function with support for ___________ QoS priority.
Correct Answer
B. Hybrid, contention-based
Explanation
The correct answer is "Hybrid, contention-based". The sentence is discussing the WMM certification, which is based on a hybrid coordination function. This means that it combines both scheduled and contention-based methods for coordinating access to the wireless medium. The certification also supports QoS (Quality of Service) priority, which ensures that certain types of data traffic receive higher priority for transmission.
40.
What component of the 802.11 standard allows stations to reserve access to the RF medium for a specified period of time?
Correct Answer
B. RTS or CTS frames
Explanation
RTS (Request to Send) or CTS (Clear to Send) frames are used in the 802.11 standard to allow stations to reserve access to the RF (Radio Frequency) medium for a specified period of time. When a station wants to transmit data, it sends an RTS frame to the access point, requesting permission to transmit. The access point responds with a CTS frame, granting permission and reserving the medium. This mechanism helps to avoid collisions and ensures that the medium is available for the transmitting station for the specified duration.
41.
In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use?
Correct Answer
B. Mode 3: Non-HT mixed mode
Explanation
In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, the BSS will use Mode 3: Non-HT mixed mode. This mode is used to provide backward compatibility for older devices that do not support HT (High Throughput) rates. It allows the BSS to operate in a mixed mode, supporting both non-HT devices and HT devices. This ensures that all devices can communicate effectively within the WLAN network.
42.
What statement about 802.11 WLAN performance is true?
Correct Answer
B. Use of larger frame sizes results in greater throughput in low interference environments.
Explanation
The statement that says "Use of larger frame sizes results in greater throughput in low interference environments" is true. In a low interference environment, using larger frame sizes allows for more data to be transmitted in each frame, resulting in higher throughput. This is because larger frames have less overhead compared to smaller frames, which improves the efficiency of data transmission. However, in high interference environments, larger frames may be more prone to errors and may result in lower throughput.
43.
The 802.11 protocol specifies a fundamental channel access method that is required for all stations and is used in all IBSS and BSS networks. What is this fundamental channel access method called?
Correct Answer
C. DCF
Explanation
The fundamental channel access method specified by the 802.11 protocol is called DCF (Distributed Coordination Function). This method is required for all stations and is used in both IBSS (Independent Basic Service Set) and BSS (Basic Service Set) networks. DCF uses a contention-based approach where stations contend for access to the channel by sensing its availability and waiting for a clear channel before transmitting data. This method helps ensure fair and efficient access to the wireless channel for all stations in the network.
44.
What mechanisms are specified by the IEEE 802.11 standard to attempt to prevent multiple radios from transmitting on the RF medium at a given point in time? (Choose 3)
Correct Answer(s)
B. Random backoff timer
C. Clear channel assessment
E. Network allocation vector
Explanation
The IEEE 802.11 standard specifies three mechanisms to prevent multiple radios from transmitting on the RF medium at the same time.
1. Random backoff timer: This mechanism introduces a random delay before a station attempts to retransmit after a collision. It helps to avoid repeated collisions by ensuring that stations do not attempt to transmit simultaneously.
2. Clear channel assessment: This mechanism allows a station to sense the medium before transmitting. It checks if the channel is busy or idle, and if it detects activity, it waits until the channel is clear before transmitting.
3. Network allocation vector: This mechanism is used in the Distributed Coordination Function (DCF) of the IEEE 802.11 standard. It is a counter that is used to schedule transmissions and prevent multiple stations from transmitting simultaneously. Stations must wait until their allocated time slot before transmitting.
45.
The client devices that connect to your network include a mix of dual-band 802.11n and 802.11ac, single-band 802.11b/g/n, and some 802.11a/g/n. Your access points are configured with the same SSID on both the 2.4 and 5 GHz bands. The APs are also configured to prioritize client connectivity to 5 GHz. How does an AP perform band steering to encourage clients to use 5 GHz?
Correct Answer
C. The AP may ignore the initial probe requests or 802.11 authentication requests sent in the 2.4 GHz band by dual-band clients
Explanation
The AP may ignore the initial probe requests or 802.11 authentication requests sent in the 2.4 GHz band by dual-band clients. This means that when a client device sends a probe request or authentication request in the 2.4 GHz band, the AP will not respond or acknowledge these requests. By ignoring these requests, the AP is essentially discouraging the client from using the 2.4 GHz band and encouraging them to connect to the 5 GHz band instead. This helps to steer clients towards the 5 GHz band, which typically offers faster speeds and less interference compared to the 2.4 GHz band.
46.
What information is transmitted in the Beacon management frames of an HT access point to communicate about backward compatibility with ERP and HR/DSSS stations? (Choose 2)
Correct Answer(s)
C. HT Protection mode
D. Non-ERP Present field
Explanation
The Beacon management frames of an HT access point transmit information about backward compatibility with ERP and HR/DSSS stations through the HT Protection mode and Non-ERP Present field. The HT Protection mode is used to indicate whether the access point supports protection mechanisms for legacy stations. The Non-ERP Present field is used to indicate the presence of non-HT stations in the network, allowing the access point to adjust its behavior accordingly to maintain compatibility.
47.
What feature(s) are most likely to be supported by 802.11 enterprise-class WLAN controllers? (Choose 4)
Correct Answer(s)
B. Link aggregation / port trunking
C. 802.1p and DSCP QoS
D. Captive web portals
E. IGMP snooping
Explanation
802.11 enterprise-class WLAN controllers are likely to support link aggregation/port trunking, 802.1p and DSCP QoS, captive web portals, and IGMP snooping. Link aggregation/port trunking allows multiple network links to be combined to increase bandwidth and provide redundancy. 802.1p and DSCP QoS enable prioritization and quality of service for different types of network traffic. Captive web portals are used for guest authentication and access control. IGMP snooping helps manage multicast traffic by allowing the controller to listen in on IGMP messages and forward multicast traffic only to the appropriate devices.
48.
ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system. What network functions are performed by the enterprise-class WNMS? (Choose 3)
Correct Answer(s)
A. Management of WLAN controller configuration and provisioning of firmware updates
B. RF pre-deployment planning and post-deployment reporting of access point locations on a floor plan
D. Performance and security monitoring of WLAN controllers with alarms and notifications for
administrative staff
Explanation
The enterprise-class WNMS performs three network functions: management of WLAN controller configuration and provisioning of firmware updates, RF pre-deployment planning and post-deployment reporting of access point locations on a floor plan, and performance and security monitoring of WLAN controllers with alarms and notifications for administrative staff. These functions allow ABC Company to efficiently manage their WLAN network, ensure proper deployment and coverage of access points, and monitor the performance and security of the network for optimal user experience.
49.
In a Wi-Fi client configuration utility, what feature is most likely to be user configurable?
Correct Answer
E. EAP Authentication Type
Explanation
In a Wi-Fi client configuration utility, the feature that is most likely to be user configurable is the EAP Authentication Type. This is because the EAP (Extensible Authentication Protocol) is used for secure authentication in Wi-Fi networks, and different types of EAP methods can be used depending on the network's security requirements. Therefore, the user would need to configure the EAP Authentication Type to match the authentication method used by the network they are connecting to.
50.
What is a common feature of an 802.11 WLAN client utility? (Choose 2)
Correct Answer(s)
B. AP Signal strength meter
E. Link statistics display
Explanation
A common feature of an 802.11 WLAN client utility is the AP signal strength meter, which allows the client to measure and display the strength of the signal from the access point. This helps the client determine the quality of the connection and choose the best access point to connect to. Another common feature is the link statistics display, which provides information about the performance of the wireless link, such as the data rate, signal quality, and error rate. This helps the client monitor the health of the connection and troubleshoot any issues.