What Interframe space would be expected between a CTS and a Data frame?
A. SIFS
B. DIFS
C. AIFS
D. PIFS
How does a VoIP Phone, using WMM Power Save, request data frames buffered at the AP?
A. The VoIP phone transmits a PS-Poll frame
B. The VoIP phone transmits a trigger frame
C. The VoIP phone sets the More Data bit in the MAC Header to 1
D. The VoIP phone The VoIP transmits a WMM Action frame
Which one of the following is not an 802.11 Management frame?
A. Action
B. Authentication
C. PS-Poll
D. Beacon
In which element of a Beacon frame would you look to identify the current HT protection mode in which an AP is operating?
A. HT Capabilities Element
B. HT Protection Element
C. HT Information Element
D. HT Operations Element
What is the default 802.11 authentication method for a STA when using Pre-RSNA?
A. Open System
B. Shared Key
C. 4-Way Handshake
D. PSK
After examining a Beacon frame decode you see the SSID Element has a length of 0. What do you conclude about this frame?
A. The frame is corrupted
B. This is a common attack on WISP backend SQL databases
C. The beacon is from a BSS configured to hide the SSID
D. SSID elements always have a length of 0
When configuring a long term, forensic packet capture and saving all packets to disk which of the following is not a consideration?
A. Total capture storage space
B. Individual trace file size
C. Real-time packet decodes
D. Analyzer location
Which one of the following is required for Wi-Fi integration in laptop-based Spectrum Analyzer software?
A. A supported WLAN adaptor with a customized driver
B. Any 802.11 wireless adaptor
C. A dual radio spectrum analyzer card
D. SNMP read credentials to the WLAN controller or APs
During a VHT Transmit Beamforming sounding exchange, the beamformee transmits a Compressed Beamforming frame to the beamformer. What is communicated within this Compressed Beamforming frame?
A. Steering Matrix
B. Beamforming Matrix
C. Feedback Matrix
D. Beamformee Matrix
You are troubleshooting a client that is experiencing slow WLAN performance. As part of the troubleshooting activity, you start a packet capture on your laptop close to the client device. While analyzing the packets, you suspect that you have not captured all packets transmitted by the client. By analyzing the trace file, how can you confirm if you have missing packets?
A. Look for gaps in the sequence number in MAC header
B. Protocol Analyzers show the number of missing packets in their statistics view
C. Retransmission are an indication of missing packets
D. The missing packets will be shown as CRC errored packets