Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Where would you look in a packet trace file to identify the configured Minimum Basic Rate (MBR) of a BSS?

A.

Supported Rates & Extended Supported Rates elements in a Beacon frame

B.

In the MBR Action frame

C.

In the MBR Information Element in an Association Response frame

D.

In the Minimum Basic Rate Element in a Beacon frame

As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.

To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.

What do you conclude from this troubleshooting exercise?

A.

The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network

B.

The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below

C.

The customers APs are misbehaving and a technical support case should be open with the vendor

D.

The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power

Which one of the following is not a valid acknowledgement frame?

A.

RTS

B.

CTS

C.

Ack

D.

Block Ack

Prior to a retransmission what happens to the CWmax value?

A.

Increases by 1

B.

Reset to 0

C.

Set to the value of the AIFSN

D.

Doubles and increases by 1

What is the function of the PHY layer?

A.

Convert PPDUs to PSDUs for transmissions and PSDUs to PPDUs for receptions

B.

Convert MSDUs to PPDUs for transmissions and PPDUs to MSDUs for receptions

C.

Convert PPDUs to MSDUs for transmissions and MSDUs to PPDUs for receptions

D.

Convert PSDUs to PPDUs for transmissions and PPDUs to PSDUs for receptions

The network administrator at ABC Engineering has taken a large packet capture from one of their APs running in monitor mode. She has very little knowledge of 802.11 protocols but would like to use the capture file to evaluate the overall health and performance of their wireless network. When she asks your advice, which tool do you recommend she opens the packet capture file with?

A.

Spectrum analyzer

B.

Python

C.

Capture visualization tool

D.

WLAN scanner

Which piece of information is not transmitted in an HT PPDU header?

A.

Number of Spatial Streams

B.

PPDU length

C.

MCS index

D.

Channel number

Protocol analyzers may present field values in either binary, decimal or hexadecimal. What preceeds a hexadecimal value to indicate it is hexadecimal?

A.

0x

B.

16x

C.

%

D.

HEX