What standard is referenced in the 802.11-2016 specification and is recommended for robust WLAN client security?
What standard is referenced in the 802.11-2016 specification and is recommended for robust WLAN client security?A . SSID hidingB . WEPC . 802.1X/EAPD . IPSec VPNView AnswerAnswer: C
To double the distance of a signal, the EIRP must be increased by how many dBs?
To double the distance of a signal, the EIRP must be increased by how many dBs?A . 3 dBB . 6 dBC . 10 dBD . 20 dBView AnswerAnswer: B
When is an 802.11ac AP transmitting on 5 GHz required by the IEEE 802.11-2020 standard to respond to probe request frames from nearby client stations? (Choose all that apply.)
When is an 802.11ac AP transmitting on 5 GHz required by the IEEE 802.11-2020 standard to respond to probe request frames from nearby client stations? (Choose all that apply.)A . When the probe request frames contain a null SSID valueB . When the probe request client is also an 802.11ac...
Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association?
Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association?A . Signal strength of access point beacons receivedB . Proximity to potential access pointsC . Retry rate of probe request and response framesD . Average round trip time to reach...
The 802.11 legacy standard defines which wireless security solution?
The 802.11 legacy standard defines which wireless security solution?A . Dynamic WEPB . 802.1X/EAPC . 64-bit static WEPD . Temporal Key Integrity ProtocolE . CCMP/AESView AnswerAnswer: C
Which of the following 802.11 frames carry an MSDU payload that may eventually be transferred by the integration service into an 802.3 Ethernet frame?
Which of the following 802.11 frames carry an MSDU payload that may eventually be transferred by the integration service into an 802.3 Ethernet frame?A . 802.11 management framesB . 802.11 control framesC . 802.11 data framesD . 802.11 action framesE . 802.11 association framesView AnswerAnswer: C
What solutions might you recommend?
The WonderPuppy Coffee Company has hired you to make recommendations about deploying wireless hotspots inside 500 coffee shops across the country. What solutions might you recommend? (Choose all that apply.)A . WPA2-Personal security solutionB . 802.11 a/b/g/n access points at 100 mW transmit powerC . 802.11a/b/g/n access points at 1...
In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network data rate (e.g. 216.7 Mbps) for user data when multiple clients are actively exchanging data with the AP?
In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network data rate (e.g. 216.7 Mbps) for user data when multiple clients are actively exchanging data with the AP?A . Half of the bandwidth is allocated to uplink traffic and half to downlink trafficB . All...
Which protocols can be used to tunnel 802.11 user traffic from access points to WLAN controllers or other centralized network servers? (Choose all that apply.)
Which protocols can be used to tunnel 802.11 user traffic from access points to WLAN controllers or other centralized network servers? (Choose all that apply.)A . IPsecB . GREC . CAPWAPD . DTLSE . VRRPView AnswerAnswer: ABC
What are some results of multipath interference? (Choose all that apply.)
What are some results of multipath interference? (Choose all that apply.)A . Scattering delayB . UpfadeC . Excessive retransmissionsD . AbsorptionView AnswerAnswer: BC