In what way are 802.11 channels defined?
A. By a high frequency and channel width
B. By channel width alone
C. By a center frequency and channel width
D. By a low frequency and channel width
What can occur when two copies of a signal wave arrive at the receiver at the same time, but 180 degrees out of phase which each other?
A. Increased signal amplitude
B. Bits may be added to the total count
C. Increased signal strength
D. Signal nulling or cancellation
At what point is RF power typically stipulated in milliwatts?
A. At the transmitter
B. Fifty feet from the transmitter
C. At the receiver
D. One hundred feet from the transmitter
What antenna would be best for a long distance (more than 5 kilometers) bridge link? Select one:
A. Panel
B. Parabolic dish
C. Patch
D. Omnidirectional
What is a common problem in specialty Wi-Fi devices?
A. The use of 802.11 VHT-only chipsets
B. The use of older, less capable 802.11 chipsets
C. The use of 802.11 DSSS-only chipsets
D. The use of newer, more capable 802.11 chipsets
What process is used after authentication to generate and install encryption keys on 802.11 devices using WPA2?
A. 802.1X port-based authentication
B. Passphrase to PSK mapping algorithm
C. EAP authentication
D. 4-way handshake
What 802.11 process must always occur before 802.11 association?
A. Time synchronization
B. Authentication
C. Confidentiality
D. Encryption
How many non-overlapping 20 MHz channels are available in the 5 GHz frequency band assuming the regulatory domain allows them all?
A. 11
B. 25
C. 24
D. 14
What is the maximum channel width supported by 802.11ac (VHT) in the standard?
A. 40 MHz
B. 80 MHz
C. 160 MHz
D. 20 MHz
What Windows Command Prompt command may be used to configure wireless settings on Windows computers?
A. TRACERT
B. PING
C. NETSH
D. IPCONFIG
When configuring an AP to use a RADIUS server, in addition to the RADIUS server IP address and port used, what will always be required?
A. Administrator password
B. Super user password
C. Encryption key
D. Shared secret
What tool is provided in most operating systems and in many APs or WLAN routers that can verify proper
IP operations?
Select one:
A. IFCONFIG
B. PING
C. IWCONFIG
D. NETSH
A user reports sporadic performance problems with the WLAN. She works near the company lunch room, which has typical kitchen equipment. The problems seem to be worse during the lunch hour. What is the likely case?
A. Improper security settings
B. RF interference
C. Improper roaming settings
D. Improper band preference settings
You use 802.1X/EAP for all WLAN authentication in your network. You have several VoIP handsets that work well until they have to roam from one AP to another. When they roam, calls are often dropped or call quality is significantly diminished. What is the most likely cause of this problem?
A. Wrong passphrase entered on the VoIP handsets
B. Non-implemented roaming features on the APs
C. Wrong SSID used by the VoIP handsets
D. Wrong certificate installed on the VoIP handsets
When three APs are placed within ten meters of each other and use the same channel, but are not Single Channel Architecture (SCA) APs, what problem will be exaggerated?
A. Non-Wi-Fi interference
B. Antenna misalignment
C. ACI
D. CCI