Which one of the following is an essential metric to measure when performing a survey and design for VoIP across WLANs?
A. Throughput rates above 50 Mbps
B. Data rates above 100 Mbps
C. Latency
D. PoE provided to wireless handsets
What document is typically created to launch a project?
Response:
A. Project Charter
B. Budget
C. Bill of Materials
D. Work Breakdown Structure
In this question, you will compare the mobility processes of a network that supports WPA2- Personal and WPA2-Enterprise. Assume the use of a 15-character
ASCII passphrase for WPA2-Personal and EAP-TTLS/MSCHAPv2 with WPA2-Enterprise. Also, assume that proprietary roaming protocols are not supported.
When a device transitions from one BSS to another within the same ESS, what step must be performed in the WPA2-Enterprise transition that are not performed in the WPA2-Personal transition?
A. Open System Authentication
B. 802.11 Reassociation
C. 802.1X authentication
D. 4-Way Handshake
What statement is true of a WLAN design that supports Real-Time Location Services (RTLS) with 802.11 RFID asset tags?
A. When passive tags are implemented, the AP density should be increased by 25% to make up for the shorter transmit range of passive tags as compared to active tags.
B. Active RFID tags periodically transmit 802.11 beacon management frames that must be synchronized with the AP for proper location of the tagged asset.
C. With passive tags, AP transmit gain should be increased to supply extra power for near- field coupling or backscatter modulation from the tag to the AP since the passive tag lacks an internal power source.
D. Passive tags do not communicate directly with the WLAN infrastructure, but instead they rely on the tag reader to communicate tag information to the
Which of the following items could be considered constraints when performing a network design?(Choose all that apply.)
Response:
A. Timeline
B. Personnel
C. Politics
D. Budget
When designing a static channel plan for an office using voice devices near an airport, which range of channels should be avoided to ensure optimal performance when implemented?
A. 36-40
B. 44-48
C. 116-124
D. 1-11
An MSA commonly addresses at least which two legal categories?
A. Nondisclosure agreement
B. Hold harmless
C. Intellectual property protection
D. Indemnity clause
Your new customer is concerned about maintaining privacy for their proprietary information when you conduct information gathering for their WLAN design. Which document can you use to directly address their concern?
A. NDA
B. SoW
C. BoM
D. Hold Harmless
A cable with 2.5 dB of loss is used to measure the return loss of an antenna. The measured value in-band is shown to be larger than 20 dB. What is the actual return loss of the antenna, and is it considered to be a reasonable value?
Response:
A. Larger than 15 dB and yes
B. Larger than 15 dB and maybe
C. Larger than 17.5 dB and yes
D. Larger than 17.5 dB and no
You're about to deploy an Enterprise-class VoWLAN infrastructure. You need to ensure that QoS is properly configured throughout the network. What Access Category (AC) should voice frames/packets use?
A. AC_VI
B. AC_VO
C. AC_BE
D. AC_BK