A WLAN is implemented using wireless controllers. The Aps must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the Aps?
A WLAN is implemented using wireless controllers. The Aps must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the Aps?A . DHCPB . GREC . NTPD . SNMPView AnswerAnswer: A
You are troubleshooting a client issue on a Windows laptop. The laptop can see and connect to 2.4 GHz APs, but it does not even see 5 GHz APs. While evaluating the issue, you determine that this problem is happening for all of the laptops of this model in the organization. Several other tablets connect on channel 48 and channel 52 in the same work areas. What is the likely problem?
You are troubleshooting a client issue on a Windows laptop. The laptop can see and connect to 2.4 GHz APs, but it does not even see 5 GHz APs. While evaluating the issue, you determine that this problem is happening for all of the laptops of this model in the...
What statement accurately describes the RF cables and connectors that are used in an 802.11 WLAN system?
What statement accurately describes the RF cables and connectors that are used in an 802.11 WLAN system?A . 75 and 125 ohms are the typical impedances of 802.11 WLAN connectors.B . Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications.C . Some...
What ID is typically mapped to an AP's MAC address if a single BSS is implemented?
What ID is typically mapped to an AP's MAC address if a single BSS is implemented?A . VLAN IDB . BSSIDC . Device IDD . SSIDView AnswerAnswer: B
What is the final step in an effective troubleshooting process?
What is the final step in an effective troubleshooting process?A . Document the resultsB . Disable the WLANC . Notify the users of problem resolutionD . Verify the solutionView AnswerAnswer: C
What WLAN feature would allow the network administrator to accomplish this task?
To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based on their department. What WLAN feature would allow the network administrator to accomplish this task?A ....
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?A . Protocols utilizedB . Channel occupiedC . Receive sensitivityD . Airtime utilizationView AnswerAnswer: B
What statement about 802.3. Clause 33 Power over Ethernet is true?
What statement about 802.3. Clause 33 Power over Ethernet is true?A . Only midspan PSEs are supported.B . The lowest voltage drop is achieved when using CAT6 cable instead of CAT5 or CAT5e.C . Only endpoint PSEs are supported.D . When using CAT5 cabling, you increase the maximum draw available...
What network functions are performed by the enterprise-class WNMS?
ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system. What network functions are performed by the enterprise-class WNMS?A . Radio management, fast roaming, key caching, and other centralized control...
What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?
What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?A . WPA2-Enterprise with EAP-TTLSB . WPA2-Enterprise with EAP-TLSC . WPA2-Enterprise with PEAPD . WPA2 -PersonalView AnswerAnswer: B