XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.
As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?
You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?
A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an
AP supports the same data rates that it supports?
Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?
When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?
What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?
A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?
What security option for 802.11 networks supports SAE and requires protected management frames?
A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this
scenario?
When an ACK frame is not received by the transmitting STA, what is assumed?
You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reporting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?
Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?
What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.
Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?
You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?
An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?
What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?
What can cause excessive VSWR in RF cables used to connect a radio to an antenna?
You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
In an 802.11n (H T) 2.4 GHz BSS, what prevents each station from using all the airtime when other client stations are actively communicating in the same BSS?
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)
802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?
In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?
What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?
Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?
What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?
You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?
You are troubleshooting a problem with a new 802.11ax AP. While the AP supports four spatial streams, most clients are only achieving maximum data rates of 150 Mbps. What is the likely cause?