In this question, you will compare the mobility processes of a network that supports WPA2-Personal and WPA2-Enterprise. Assume the use of a 15-character ASCII passphrase for WPA2-Personal and EAP-TTLS/MSCHAPv2 with WPA2-Enterprise. Also, assume that proprietary roaming protocols are not supported. When a device transitions from one BSS to another within the same ESS, what step must be performed in the WPA2-Enterprise transition that is not performed in the WPA2-Personal transition?
You have initiated a site survey to be performed and the team has been onsite and is halfway through gathering the necessary data. The project sponsor just asked you to make sure the WLAN supports radio frequency identification (RFID) location tracking. How would you possibly characterize this situation?
What kind of site survey helps you identify if roaming is working as designed?
What differences exist between VLANs in wireless and wired domains?
Main Topic:Post-Design ValidationandTroubleshooting
Question:
When viewing channel utilization information from a protocol analyzer, if high channel utilization is occurring, what should you ensure does not exist?
In a large enterprise (5000+ wireless users), what would NOT be a recommended method by which IP addresses and VLANs are assigned to different clients associated to the same AP?
You are designing a WLAN and have been asked to recommend a security solution for the network. The organization requires that 802.1X/EAP be implemented, but they do not have a PKI and do not wish to deploy one. They suggest that mostly Windows clients, Apple phones, and Android phones will be used. What do you recommend?
Given:For this fill-in-the-blank question, each answer option contains an answer for the first and second blanks, separated by a dash "—". Choose the answer option that correctly fills in both blanks in the following sentence.
A WLAN may use 802.11 admission control to ________, and admission control requirements are configured separately for each ________.
Main Topic:Designing for Specific Applications
Question:
In the enterprise, when is WPA/WPA2-Personal generally a recommended solution? (Choose all that apply.)
What commonly causes a client-to-AP link imbalance?