What wireless network access technology is used to cover a city with 802.11 or another wireless networking technology?
A. WPAN
B. WMAN
C. WWAN
D. WLAN
Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN.
What is this process of identity validation called?
A. Affiliation
B. Association
C. Authentication
D. Activation
E. Accounting
The two most common modes of WLAN discovery are passive scanning, where a client station listens for _________ frames, and active scanning, where a client sends and receives _________ frames.
A. Data ; Null
B. SSID ; Management
C. Beacon ; Probe
D. Probe Response ; Broadcast
E. Discovery ; Control
Given: You are recommending an AP for use in a warehouse environment. Some APs will require directional antennas and others will use dipole antennas.
What feature must be supported by the APs in this installation?
A. Multiple SSIDs
B. Grounding wire connectors
C. Pole mounts
D. External antennas
E. Variable output power
After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a Wi-Fi network? (Choose 2)
A. Web Browser
B. Client Utility
C. Protocol Analyzer
D. Captive Portal
E. Device Driver
How do Wi-Fi routers differ from Wi-Fi access points?
A. Wi-Fi routers are comprised of both a router and an access point within the same hardware.
B. Wi-Fi routers allow wireless users to connect to a wired network, but Wi-Fi access points do not.
C. Wi-Fi routers offer advanced security options, but Wi-Fi access points are only capable of basic security.
D. Wi-Fi routers allow wireless users to talk to other wireless users, but Wi-Fi access points do not.
Simple antenna diversity mitigates the adverse effects caused by which common Wi-Fi problem?
A. Hidden node
B. RF signal absorption
C. Multipath
D. Co-channel interference
E. Polarization
Where is the use of a Wireless Internet Service Provider (WISP) most appropriate?
A. Wi-Fi bridging between two or more buildings within a city
B. To provide guest access to the Internet in an office building
C. As hot-spot connectivity in large airports and conference centers
D. Last mile wireless data delivery to homes and businesses
Given: In ABC Company's branch office, there are three 802.11n access points serving 20 Wi-Fi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the building during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time.
What is the most likely cause of the slow and intermittent connectivity?
A. The users experiencing connectivity problems are using WPA2-Personal, which has shorter range than 802.1X/EAP.
B. WLANs require visual line-of-sight, and only those clients that can see an AP through a window can connect.
C. The picnic tables are located at the edge of the effective range of Wi-Fi coverage.
D. The client laptops are using 802.11g radios that are not fully interoperable with 802.11n.
After successfully connecting to the Wi-Fi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel- branded page that asks for your name, room number, and a secret key. What has most likely happened?
A. You are the victim of a phishing attack, should not provide the information, and should call the front desk for help.
B. Every room in the hotel has its own access point, and entering the room number and key confirms connectivity to the correct AP.
C. The access point is out of connections and you must enter your room number and code to be added to the hotel's Access Request Queue (ARQ) to obtain the next available connection.
D. The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network.