Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?

    VHT PHY

A.

HT PHY

B.

SAE

C.

CCMP

You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?

A.

Interference from non-Wi-Fi sources

B.

Faulty drivers

C.

DoS attack

D.

Interference from other WLANs

You are evaluating access points for use in the 5 GHz frequency band. What PHY supports this band and supports 80 MHz channels?

A.

HT

B.

VHT

C.

ERP

D.

OFDM

What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks?

A.

WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not

B.

WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network

C.

WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not

D.

WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal

What statement about the beamwidth of an RF antenna is true?

A.

Horizontal and vertical beamwidth are calculated at the points where the main lobe decreases power by 3 dB.

B.

The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops propagating.

C.

When antenna gain is lower, the beamwidth is also lower in both the horizontal and vertical dimensions.

D.

Vertical beamwidth is displayed (in degrees) on the antenna’s Azimuth chart.

The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using which other 802.11 physical layer specifications (PHYs)?

A.

OFDM

B.

HR/DSSS

C.

ERP-PBCC

D.

DSSS-OFDM

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

A.

7 and 11

B.

2 and 8

C.

1 and 5

D.

4 and 6

An AP is advertised as a tri-band, 4x4:4, Wi-Fi 6, 802. 11ax AP. Based on this information and assuming it is correctly advertised, what can be determined as certainly true about this AP?

A.

It supports four channels in 2.4 GHz and 4 channels in 5 GHz

B.

It supports UL-MU-MIMO

C.

It uses a modified OpenWRT firmware

D.

It has 4 radio chains

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?

A.

WAN interface analysis results

B.

Capacity analysis results

C.

Application Layer protocol availability analysis results

D.

Layer 4 protocol availability analysis results