Given: Assume that music on hold (MOH) features are unicast only.
What VoWiFi implementations require multicast packet delivery support by the WLAN infrastructure?
A. All VoWiFi implementations
B. Push-to-Talk VoWiFi phones
C. VoWiFi soft phones
D. FMC phones
E. Flat (non-VLAN) VoWiFi implementations
As you plan a WLAN upgrade, you have assessed the network requirements and data signatures of your applications. One of the popular applications used on your network requires high bandwidth and low to medium Wi-Fi loss, but can tolerate moderate latency and jitter.
What application matches this description?
A. Voice
B. Email
C. Skype chat
D. Video-on-demand
E. Video conferencing
F. FTP
You are tasked with designing the WLAN to accommodate certain high density areas on your university campus where users are highly transient (frequently come and go). With a limited DHCP pool size (subnet mask = 255.255.252.0) for this WLAN subnet, you want to ensure that your DHCP addresses are used efficiently and are not exhausted, which would prevent new client associations. The DHCP server is a Windows Server 2008 machine. Your design task is to determine the best configuration to allow as many users as possible while avoiding WLAN service interruptions and also to use the available addresses as efficiently as possible.
What setting would be most effective at achieving this design task?
A. Set the RTS threshold to 2346 bytes
B. Set the inactive wireless client timeout (client age-out) to 5 minutes
C. Set the maximum client limit per radio to 64
D. Set the DHCP lease for this pool to 20 minutes
E. Enable WLAN Controller DHCP relay
F. Enable mandatory admission control
G. Set the AES rekey interval to 5 minutes
H. Set the 802.1X re-authentication timer to 10 minutes
Given: A WLAN controller is connected to ABC Company's core layer 3 Ethernet switch with an IEEE 802.1Q trunk connection. The WLAN controller's native VLAN is VLAN 6 and its IP address is 10.0.14.2 /24. Lightweight APs supporting centralized forwarding are connected to the network on VLANs 7, 8, and 9, and they each build a layer 3 tunnel back to the WLAN controller's IP address. The dynamically assigned IP addresses received by each AP from a DHCP server will be .
A. Associated with the VLAN on which they are connected.
B. Associated with the native VLAN of the WLAN controller.
C. Associated with VLAN 1, the default VLAN for new APs
D. Associated with a non-routable VLAN until the MAC address of the AP is removed from the controller's MAC filter
What is a radome?
A. A type of semi-circular ceiling found in atriums and that is a heavy cause of RF reflection.
B. A weatherproof piece of plastic covering an antenna or antenna system.
C. The unit used to measure the signal reflected backward by the end of a cable.
D. A piece of metal positioned behind APs mounted on outdoor poles, designed to limit the butterfly effect.
E. The unwanted signal coverage provided by either side or back lobes in directional antennas.
A wireless engineer from your company performed a site survey in an office building where a wireless network extension was needed. He reports that while performing a Layer 1 sweep near a meeting room full of people, he detected the RF environment displayed in the exhibit. He is unsure how to interpret what he recorded to determine its impact on a future Wi-Fi network.
A. The signal affects the entire spectrum and will render the wireless network unusable. It must be located and removed.
B. The signal has a low duty cycle and should not be of major impact on the wireless network.
C. The signal is alternating between peaks (high interference level) and valleys (low interference level). The network channel design must be built to avoid the affected peak frequencies.
D. The signal is typical of a high radio card background noise. It shows that the card used for the Layer 1 sweep should be replaced and the Layer 1 sweep re-done.
E. The Real Time FFT shows a high amplitude, narrowband jammer pulsing across the entire 2.4 GHz band. This will cause significant, intermittent interference to the WLAN.
What statement is true of a WLAN design that supports Real-Time Location Services (RTLS) with 802.11 RFID asset tags? (Choose 2)
A. When passive tags are implemented, the AP density should be increased by 25% to make up for the shorter transmit range of passive tags as compared to active tags.
B. Active RFID tags periodically transmit 802.11 beacon management frames that must be synchronized with the AP for proper location of the tagged asset.
C. With passive tags, AP transmit gain should be increased to supply extra power for near-field coupling or backscatter modulation from the tag to the AP since the passive tag lacks an internal power source.
D. Passive tags do not communicate directly with the WLAN infrastructure, but instead they rely on the tag interrogator to communicate tag information to the infrastructure's location tracking server/database.
E. Active tags transmit directly to the APs and may not require 802.11 authentication and association to pass data traffic to the RTLS engine.
F. When tracking assets with passive RFID tags, some APs should be moved, or additional APs be added, to provide more accurate triangulation and location services.
What are some advantages of designing guest access as it is shown in the exhibit?
A. Allows a single SSID with different authentication/encryption models to be used for all WLAN services for corporate users and guests
B. Minimizes configuration requirements for segmentation and filtering of guest traffic across internal LAN
C. The border firewall configuration will not require any additional rules to pass guest traffic to the DMZ controller
D. Enhances performance of web proxy servers in the DMZ for guest Internet traffic
E. Allows simple and secure guest collaboration (file/print sharing) with corporate users
In this question, you will compare the mobility processes of a network that supports WPA2- Personal and WPA2-Enterprise. Assume the use of a 15-character ASCII passphrase for WPA2- Personal and EAP-TTLS/MSCHAPv2 with WPA2Enterprise. Also, assume that proprietary roaming protocols are not supported.
When a device transitions from one BSS to another within the same ESS, what steps must be performed in the WPA2-Enterprise transition that are not performed in the WPA2-Personal transition? (Choose 2)
A. Open System Authentication
B. 802.11 Reassociation
C. 802.1X authentication
D. 4-Way Handshake
E. Transfer of PMK from AAA server to authenticator
F. Conversion of passphrase to PMK
In a centralized WLAN architecture, what new problem may arise when you change the data forwarding model from centralized to distributed? (Choose 2)
A. APs that were designed for a centralized forwarding model may not support all features in distributed forwarding mode.
B. Centralized control functions, such as key management and distribution, RRM, and load balancing will no longer be supported.
C. All RRM controls will also need to be distributed to a master AP that acts as a channel and transmit power arbiter for other APs in the ESS.
D. The Ethernet switch ports to which APs are connected may need to be reconfigured to support VLAN tagging and QoS at the network edge.
E. APs will not have the processing capabilities to support AES-CCMP, so TKIP will be the recommended encryption method.