Three access points are used within a facility. One access point is on channel 11 and the other two are on channel 1. The two access points using channel 1 are on either side of the access point using channel 11 and sufficiently apart so that they do not interfere each other when they transmit frames. Assuming no other Aps are in the vicinity, is CCI still a possibility in this network and why?
A. Yes, because the client devices connected to one of the channel 1 APs will transmit frames that reach the other channel 1 AP as well as
B. No, because the Aps are far enough apart that no CCI will occur
C. No, because CCI only occurs in the 5 GHz frequency band
D. Yes, because channel 11 loops around and causes CCI with channel 1
You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?
A. Bluetooth interference
B. Non-Wi-Fi interference
C. CCI
D. ACI
In which plane of the three networking planes is an access point configured by a WLAN controlled?
A. Control
B. Management
C. Security D. Data
Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive design software for the task, but the company insists on a pre-deployment site visit.
What task should be performed as part of the pre-deployment visit to prepare for a predictive design?
A. Evaluate the building materials at ABC's facility and confirm that the floor plan documents are consistent with the actual building
B. Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls
C. Test several antenna types connected to the intended Aps for use in the eventual deployment
D. Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers
What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?
A. AES
B. Shared Key Authentication
C. CCMP
D. Open System Authentication
A string of characters and digits is entered into an AP a client STA for WPA2 security. The string is 8 characters long. What is this string called?
A. MSK
B. WEP key
C. Passphrase
D. PSK
A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?
A. Beacon frames transmitted by the AP
B. Data frames sent between the AP and current client STAs
C. Authentication frames transmitted by the other client STAs
D. Probe request frames transmitted by other client STAs
You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzer?
A. Frames with the HN bit set to 1
B. Frames with the retry bit set to 0
C. Frames transmitted from the AP without acknowledgement
D. Retransmitted frames from multiple STAs at higher rates than other STAs
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
A. MSK
B. WEP key
C. Passphrase
D. PSK
What phrase defines Equivalent Isotropically Radiated Power (EIRP)?
A. Power supplied from the transmission line to the antenna input
B. The power output from the radio after cable losses
C. The power output from the radio into the RF cable
D. The highest RF signal strength that is transmitted from a given antenna