Which type of mount is commonly used for installing an 802.11 AP on a pole or mast?
- A . Wall mount
- B . Pole/mast mount
- C . Ceiling mount
- D . Floor mount
What is the maximum power that an 802.3at Power over Ethernet (PoE) injector can output in the Ethernet interface?
- A . 30 W
- B . 15.4 W
- C . 12.95 W
- D . 25.5 W
What kind of authentication is used by WPA2-Enterprise implementations?
- A . WEP
- B . Preshared key
- C . Passphrase
- D . 802.1X/EAP
Which security problem can occur if the network key used for authentication during the join process in a wireless network is incorrect?
- A . Configuration errors
- B . Incorrect passphrases
- C . Incompatible EAP methods
- D . Incorrect join keys
How many channels are available in the 2.4 GHz frequency band in all regulatory domains?
- A . 3
- B . 14
- C . 13
- D . 11
Which device type is typically characterized by its larger size, stationary nature, and greater processing power?
- A . Laptops
- B . Tablets
- C . Mobile phones
- D . Desktops
What are some common causes of mobility problems in wireless networks?
- A . Configuration errors
- B . Improper network settings
- C . Unsupported fast roaming methods
- D . Non-implemented roaming features
Which location process in 802.11 wireless networks involves actively sending probe requests to discover available networks?
- A . Passive scanning
- B . Active scanning
- C . Authentication
- D . Association
What do antenna pattern charts represent?
- A . Available channels by protocol
- B . Co-Channel Interference (CCI) and Co-Channel Contention (CCC)
- C . Antenna patterns and signal coverage areas
- D . Regulatory constraints on channel selection
At what point is RF power typically stipulated in milliwatts?
- A . At the receiver
- B . Fifty feet from the transmitter
- C . At the transmitter
- D . One hundred feet from the transmitter
How can RF signal propagation be affected by obstacles or materials?
- A . Gain and loss
- B . Reflection
- C . Refraction
- D . Scattering
Which feature of an 802.11 AP determines the supported wireless frequency bands?
- A . PHY and frequency band support
- B . Single-band vs. dual-band
- C . Output power control
- D . Operational modes
What term is used to describe the phenomenon of an RF signal bouncing off a surface?
- A . Gain and loss
- B . Reflection
- C . Refraction
- D . Scattering
What are some common causes of performance problems in wireless networks?
- A . Configuration errors
- B . Interference
- C . Low data rates
- D . Co-channel interference (CCI)
Which one of the following is a non-deprecated security solution in the 802.11 standard?
- A . WEP
- B . CCMP/AES
- C . TKIP/RC4
- D . Shared Key Authentication
What protocol is sometimes used to access a network or user directory by a RADIUS server instead of using an internal user database?
- A . DHCP
- B . NTP
- C . EAP
- D . LDAP
How many non-overlapping 20 MHz channels are available in the 5 GHz frequency band assuming the regulatory domain allows them all?
- A . 11
- B . 25
- C . 24
- D . 14
Which factor determines the available channels for RF communication?
- A . Regulatory constraints on channel selection
- B . Best practices for channel selection
- C . Antenna types
- D . Protocol used
You have implemented an 802.11 security solution that requires certificates.
What are you using?
- A . WEP
- B . WPA2-Enterprise
- C . WPA-Personal
- D . WPA2-Personal
What is a common problem in specialty Wi-Fi devices?
- A . The use of 802.11 VHT-only chipsets
- B . The use of older, less capable 802.11 chipsets
- C . The use of 802.11 DSSS-only chipsets
- D . The use of newer, more capable 802.11 chipsets
When three APs are placed within ten meters of each other and use the same channel, but are not Single Channel Architecture (SCA) APs, what problem will be exaggerated?
- A . Non-Wi-Fi interference
- B . Antenna misalignment
- C . ACI
- D . CCI
What is the term used to describe the minimum signal strength required by a device to successfully receive wireless communication?
- A . Supported channels
- B . Channel widths
- C . Transmit power
- D . Receive sensitivity
What are the basic steps involved in the WLAN connection process for 802.11 wireless networks?
- A . Authentication, Association, 802.1X/EAP authentication
- B . Passive scanning, Active scanning, 4-way handshake
- C . Authentication, Association, 4-way handshake
- D . Passive scanning, Active scanning, 802.1X/EAP authentication
If the AP’s time is not automatically configured to match the rest of the network, what infrastructure service may be unreachable by the AP?
- A . DNS
- B . DHCP
- C . NTP
- D . FTP
What does output power control allow you to do in the configuration of an AP?
- A . Increase or reduce the output power
- B . Change the channel
- C . Implement Dynamic Frequency Selection (DFS)
- D . Increase or reduce the antenna gain
Which security measure is often mistakenly believed to provide network invisibility, but offers no actual security benefit?
- A . WEP
- B . Shared Key Authentication
- C . Hidden SSIDs
- D . MAC filtering
Which operating system is commonly used on Google’s Chromebook devices?
- A . Windows
- B . macOS
- C . Chrome OS
- D . Linux
When configuring a standalone AP with a web-based interface, what should be changed to protect the HTTP interface used to manage the AP?
- A . Admin account password
- B . WPA2 passphrase
- C . SSID
- D . WPA passphrase
What is the term used to describe the decrease in signal strength as an RF signal propagates through space?
- A . Gain and loss
- B . Reflection
- C . Refraction
- D . Free space path loss
What EAP method is supported on most operating systems without additional installation requirements?
- A . EAP-GTC
- B . EAP-FAST
- C . EAP-TLS
- D . LEAP
What is the term used to describe the interference caused when multiple devices compete for the same channel in RF communication?
- A . Antenna cables and connectors
- B . Co-Channel Interference (CCI)
- C . Co-Channel Contention (CCC)
- D . Antenna pattern charts
Which characteristic of an RF signal is related to the distance between successive peaks?
- A . Frequency
- B . Amplitude
- C . Phase
- D . Wavelength
What is the maximum channel width recommended in the 2.4 GHz frequency band for 802.11n devices?
- A . 80 MHz
- B . 20 MHz
- C . 40 MHz
- D . 10 MHz
Which of the following is not a commonly used EAP method in wireless networks?
- A . EAP-TLS
- B . EAP-PEAP
- C . EAP-WPA3
- D . EAP-LEAP
What 802.11 process must always occur before 802.11 association?
- A . Time synchronization
- B . Authentication
- C . Confidentiality
- D . Encryption
What antenna would be best for a long distance (more than 5 kilometers) bridge link?
- A . Panel
- B . Parabolic dish
- C . Patch
- D . Omnidirectional
What can occur when two copies of a signal wave arrive at the receiver at the same time, but 180 degrees out of phase which each other?
- A . Signal nulling or cancellation
- B . Bits may be added to the total count
- C . Increased signal strength
- D . Increased signal amplitude
What tool is provided in most operating systems and in many APs or WLAN routers that can verify proper IP operations?
- A . IFCONFIG
- B . PING
- C . IWCONFIG
- D . NETSH
What kind of antenna chart shows the radiation pattern of an antenna from the side view of that antenna?
- A . Top-down
- B . Azimuth
- C . Horizontal
- D . Elevation
You use 802.1X/EAP for all WLAN authentication in your network. You have several VoIP handsets that work well until they have to roam from one AP to another.
When they roam, calls are often dropped or call quality is significantly diminished.
What is the most likely cause of this problem?
- A . Wrong passphrase entered on the VoIP handsets
- B . Non-implemented roaming features on the APs
- C . Wrong SSID used by the VoIP handsets
- D . Wrong certificate installed on the VoIP handsets
You are receiving reports from several users that their clients connect with very low data rates. All reports are confined to a particular area in the facility and the users report that the problem does not occur with the same devices in other areas.
What is most likely problem in that area?
- A . High SNR
- B . Improper AP security configuration
- C . Poor signal strength
- D . Improper client security configuration
Some APs come with a captive portal available within the AP, controller or cloud interface. For what would this captive portal most likely be used?
- A . Guest access
- B . Employee access
- C . Executive management access
- D . Long-term contractor access
What best describes passive scanning used to locate WLANs?
- A . Listening for beacon frames from the APs
- B . Scanning in only on frequency band
- C . Sending probe requests and listening for probe responses
- D . Scanning on only one channel
An AP has two Ethernet ports on the back and another port that looks similar to an Ethernet port.
For most enterprise APs, how many of these ports can be used for Power over Ethernet (PoE)?
- A . 1
- B . 3
- C . 0
- D . 2
What is defined as the bending of an RF wave as it passes through a medium?
- A . Reflection
- B . Refraction
- C . Absorption
- D . Scattering
What is one possible cause of mobility problems in a wireless network if the fast roaming method used by the client is not supported by the access point?
- A . Configuration errors
- B . Improper network settings
- C . Unsupported fast roaming methods
- D . Non-implemented roaming features
How can a device report the strength of the RF signal it is receiving?
- A . Wireless scanner tools
- B . Client signal strength reports
- C . RSSI vs. dBm
- D . Output power vs. received signal strength
Which factor can negatively impact wireless signal strength and cause connectivity issues?
- A . Configuration errors
- B . Interference
- C . Supplicant issues
- D . Co-channel interference (CCI)
Which process in the WLAN connection sequence establishes the encryption keys between the client device and the access point?
- A . Authentication
- B . Association
- C . 802.1X/EAP authentication
- D . 4-way handshake
What is one possible cause of security problems in a wireless network if the EAP method used by the client is not supported by the access point?
- A . Configuration errors
- B . Incorrect passphrases
- C . Incompatible EAP methods
- D . Incorrect network keys