Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In this question, you will compare the mobility processes of a network that supports WPA2-Personal and WPA2-Enterprise. Assume the use of a 15-character ASCII passphrase for WPA2-Personal and EAP-TTLS/MSCHAPv2 with WPA2-Enterprise. Also, assume that proprietary roaming protocols are not supported. When a device transitions from one BSS to another within the same ESS, what step must be performed in the WPA2-Enterprise transition that is not performed in the WPA2-Personal transition?

A.

Open System Authentication

B.

802.11 Reassociation

C.

802.1X authentication

D.

4-Way Handshake

You have initiated a site survey to be performed and the team has been onsite and is halfway through gathering the necessary data. The project sponsor just asked you to make sure the WLAN supports radio frequency identification (RFID) location tracking. How would you possibly characterize this situation?

A.

Scope creep has occurred.

B.

The 802.3af RTLS standard should be incorporated into the AP configuration.

C.

The 802.11g standard incorporates location tracking.

D.

Any WLAN will support location tracking.

E.

The power requirements on the UPS need to be evaluated.

What kind of site survey helps you identify if roaming is working as designed?

A.

Passive

B.

Predictive

C.

Active

D.

Spectrum analysis walkthrough

What differences exist between VLANs in wireless and wired domains?

A.

Wireless VLANs are not effective for segmenting the available services and network permissions available to clients. Wired VLANs are effective for this purpose.

B.

Wireless VLANs are never carried in 802.11 frames that cross the wireless medium. VLAN identifiers are always carried in Ethernet frames to indicate the proper VLAN.

C.

Wireless VLANs do not always segment traffic into separate broadcast domains on the wireless medium. Wired VLANs do segment broadcast domains on the wired network.

D.

Wireless VLANs are ineffective for utilizing a single set of infrastructure equipment to provide different services to different client groups. Wired VLANs are effective for this purpose.

Main Topic:Post-Design ValidationandTroubleshooting

Question:

When viewing channel utilization information from a protocol analyzer, if high channel utilization is occurring, what should you ensure does not exist?

A.

A high percentage of low PHY rates

B.

An RF signal generator causing an RF DoS

C.

High levels of workload

D.

High frames per second

In a large enterprise (5000+ wireless users), what would NOT be a recommended method by which IP addresses and VLANs are assigned to different clients associated to the same AP?

A.

Each SSID is mapped to a static VLAN assignment

B.

Upstream AAA servers dynamically assign VLANs to each user or group profile

C.

Radio signal metrics (RSSI, SNR, etc.) of WLAN clients are triangulated for location-based VLAN assignment during association

D.

Multiple VLAN pools are designated for an SSID and user IP addresses are selected in a round-robin fashion from the associated pools

You are designing a WLAN and have been asked to recommend a security solution for the network. The organization requires that 802.1X/EAP be implemented, but they do not have a PKI and do not wish to deploy one. They suggest that mostly Windows clients, Apple phones, and Android phones will be used. What do you recommend?

A.

Use CCMP AES with a PSK

B.

Use EAP-PEAP for the authentication solution

C.

Use EAP-TLS for the authentication solution

D.

Use TKIP RC4 with a PSK

Given:For this fill-in-the-blank question, each answer option contains an answer for the first and second blanks, separated by a dash "—". Choose the answer option that correctly fills in both blanks in the following sentence.

A WLAN may use 802.11 admission control to ________, and admission control requirements are configured separately for each ________.

A.

Block stations with inadequate security parameters — SSID

B.

Identify voice-enabled wireless devices — AP radio (that is, 2.4 GHz or 5 GHz)

C.

Regulate the available bandwidth resources — Access Category

D.

Mark ingress and egress frames with priority values — TCP/IP port

Main Topic:Designing for Specific Applications

Question:

In the enterprise, when is WPA/WPA2-Personal generally a recommended solution? (Choose all that apply.)

A.

When client devices do not support 802.1X/EAP

B.

When mobile device applications require high-latency roaming times between APs

C.

When client devices are provisioned in bulk and would otherwise share 802.1X credentials

D.

When the network security policy demands that each user have unique access credentials

What commonly causes a client-to-AP link imbalance?

A.

The client's antenna gain is lower than the AP's antenna gain

B.

The client's transmit power is significantly lower than the AP's transmit power

C.

The AP's transmit power is significantly lower than the client's transmit power

D.

The AP's antenna gain is lower than the client's antenna gain