You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?
A. Throughput tester
B. Laptop-based spectrum analyzer
C. Access point spectrum analyzer
D. Wi-Fi scanner
What Linux shell command can be used to view the hardware and PHY capabilities of a wireless adapter in detail including channel widths, output power settings, channels supported, and more?
A. ifconfig
B. iw phy
C. netsh wlan show device
D. iwconfig
A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?
A. 23 dBm
B. 26 dBm
C. 13 dBm
D. 10 dBm
You are configuring an access point to use channel 128. What important fact should be considered about this channels?
A. It is a 22 MHz channel so it will overlap with the channels above and below it
B. It is a 2.4 GHz frequency band 40 MHz channel, so it should not be used
C. It is a channel that is unsupported by most access points
D. It is a channel that likely requires DFS when used
To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.
A. RBAC
B. SNMP
C. WIPS
D. WPA2
In a WALN security, what authentication method always creates Layer2 dynamic encryption keys?
A. Shared Key
B. WEP
C. HTTPS captive portal
D. EAP-TLS
You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?
A. Band steering
B. FT
C. OKC
D. Load balancing
You are planning for PoE in a standard office deployment. Which one of these devices is least likely to be a PoE PD?
A. Video camera
B. Access point
C. VoIP phone
D. Ethernet switch
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?
A. Temporal Key Integrity Protocol
B. Extensible Authentication Protocol
C. Counter Mode with CBC- MAC Protocol
D. Wired Equivalent Privacy
You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?
A. Interference from non-Wi-Fi sources
B. Faulty drivers
C. DoS attack
D. Interference from other WLANs