What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?
You are troubleshooting an issue reported by several wireless users. The problem is contained to one cell (several users connected to the same AP). You manage the WLAN and no other network devices. After analysis it appears to be a switch problem. What action should be taken?
What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS?
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.
Which one of the following channels can be used for VHT transmissions?
In a long-distance RF link, which statement about Fade Margin is true?
You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?
What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?
You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzer?
You administer a small WLAN with nine access points. As a small business, you do not run a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-Personal in all APs and clients. Several users are now reporting the inability to connect to the network at times and it is constrained to one area of the building. When using a WLAN scanner, you see that the AP covering that area is online and has a strong signal. No other changes have been made to the environment and all access points are the same model. What is the likely problem?