Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?

A.

WPA2-Enterprise with EAP-TTLS

B.

WPA2-Enterprise with EAP-TLS

C.

WPA2-Enterprise with PEAP

D.

WPA2 -Personal

You are troubleshooting an issue reported by several wireless users. The problem is contained to one cell (several users connected to the same AP). You manage the WLAN and no other network devices. After analysis it appears to be a switch problem. What action should be taken?

A.

Create a plan of action and implement it

B.

Escalate the problem to the network administration team

C.

Document the results and close the case

D.

Escalate the problem to the wireless vendor support staff

What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS?

A.

Increasing or decreasing the number of spatial streams in use by the client station and AP

B.

Implementation of several other clients in the same BSS using 802.11 g radios

C.

Implementing Fast BSS Transition (FT) for roaming

D.

RF interface from more than 10 nearby Bluetooth transmitters

You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.

A.

Every 20 feet and alongside each AP

B.

Closer to the APs

C.

Closer to the client devices

D.

IN critical areas where WLAN performance must be high

Which one of the following channels can be used for VHT transmissions?

A.

44

B.

1

C.

7

D.

13

In a long-distance RF link, which statement about Fade Margin is true?

A.

The Fade Margin is a measurement of signal loss through free space and is a function of frequency and distance.

B.

The Fade Margin of a long-distance radio link should be equivalent to the receiver’s low noise filter gain.

C.

A Fade Margin is unnecessary on a long-distance RF link if more than 80% of

D.

Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

A.

Bluetooth interference

B.

Non-Wi-Fi interference

C.

CCI

D.

ACI

What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

A.

Signal strength of AP beacons received.

B.

PING latency when testing against an Internet server.

C.

FCS errors in frames transmitted to and from the AP.

D.

Throughput speed in Mbps.

You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzer?

A.

Frames with the HN bit set to 1

B.

Frames with the retry bit set to 0

C.

Frames transmitted from the AP without acknowledgement

D.

Retransmitted frames from multiple STAs at higher rates than other STAs

You administer a small WLAN with nine access points. As a small business, you do not run a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-Personal in all APs and clients. Several users are now reporting the inability to connect to the network at times and it is constrained to one area of the building. When using a WLAN scanner, you see that the AP covering that area is online and has a strong signal. No other changes have been made to the environment and all access points are the same model. What is the likely problem?

A.

The AP that covers the problem area requires a firmware update

B.

The clients are improperly configured

C.

The AP that covers the problem area has failed

D.

The AP that covers the problem area is improperly configured