Which one of the following portions of information is communicated by bits in the PHY Header?
A. SNR
B. Noise
C. Data rate
D. Signal strength
What does the value of the Listen Interval field in an Association Request frame indicate?
A. How long a STA performing active scanning will listen for Probe Responses before changing channels
B. How often a STA will go off channel to look for other BSSs
C. How often a STA in power save mode wakes up to listen to Beacon frames
D. How long a STA waits for an Ack before retransmitting the frame
A PHY Header is added to the PSDU at which layer?
A. LLC
B. Network
C. PHY
D. MAC
ABC International has installed a new smart ZigBee controlled lighting system. However, the network team is concerned that this new system will interfere with the existing WLAN and has asked you to investigate the impact of the two systems operating simultaneously in the 2.4 GHz band. When performing Spectrum Analysis, which question could you answer by looking at the FFT plot?
A. Do the ZigBee channels used by the lighting system overlap with the WLAN channels?
B. Is the ZigBee system using more than 50% of the available airtime?
C. Is the WLAN corrupting ZigBee system messages?
D. Is the ZigBee system causing an increase in WLAN retries?
Which one of the following is an advantage of using display filters that is not an advantage of capture-time filters?
A. They allow for focused analysis on just the packets of interest
B. Once created they are reusable for later captures
C. They only hide the packets from view and the filtered packets can be enabled for view later
D. Multiple of them can be applied simultaneously
Which one of the following is required for Wi-Fi integration in laptop-based Spectrum Analyzer software in addition to the spectrum analysis adapter?
A. An 802.11 wireless adaptor
B. A firmware upgrade for the spectrum analysis adapter
C. A directional antenna
D. SNMP read credentials to the WLAN controller or APs
When performing protocol analysis, you capture an 802.1 lac data frame on channel 52, transmitted at MCS 8. At what data rate was the PHY Preamble transmitted?
A. 54 Mbps
B. 86.7 Mbps
C. 6 Mbps
D. 78 Mbps
In what scenario is Open Authentication without encryption not allowed based on the 802.11 standard?
A. When operating a BS5 in the CBRS band
B. When operating a BSS in FIPS mode
C. When operating a BSS in a government facility
D. When operating a BSS in the 6 GHz band
You have installed a new 802.1 lac WLAN configured with 80 MHz channels. Users in one area are complaining about poor performance. This area is currently served by a single AP. You take a spectrum analysis capture in the poor performing area. While examining the waterfall plot you notice the airtime utilization is higher on the first 20 MHz of the 80 MHz channel when compared to the rest of the channel. What do you conclude?
A. The AP is misconfigured and needs to be reconfigured to 80 MHz operation
B. Non-Wi-Fi interference is preventing the APs 80 MHz operation
C. The first 20 MHz is the AP's primary channel and higher airtime utilization on the primary channel is normal when an AP is configured for 80 MHz operation
D. RRM is enabled and has dynamically picked a 20 MHz channel
As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi- tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.
To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.
What do you conclude from this troubleshooting exercise?
A. The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network
B. The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below
C. The customers APs are misbehaving and a technical support case should be open with the vendor
D. The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power