Given: A WLAN controller is connected to ABC Company's core layer 3 Ethernet switch with an IEEE 802.1Q trunk connection. The WLAN
controller's native
VLAN is VLAN 6 and its IP address is 10.0.14.2 /24. Lightweight APs supporting centralized forwarding are connected to the network on VLANs 7,
8, and 9, and they each build a Layer 3 tunnel back to the WLAN controller's IP address.
The dynamically assigned IP addresses received by each AP from a DHCP server will be ________________.
What is the chip rate of 1 Mbps 802.11b?
Response:
Your customer's 802.11n laptops are not able to see the SSID in the 5 GHz band in the conference room. When doing a walkthrough using one of
these laptops, you confirm that it is unable to see the SSID in the 5 GHz band in the conference room. When using your own 802.11 ac laptop,
you're able to see the SSID. What is the most likely cause of this problem?
A company wants to connect its headquarters to its remote office that is 13 kilometers away using a wireless bridge. What requirement must not
be forgotten by their Wireless Engineer when considering the Fresnel Zone?
As an implementation engineer, you have just received initial design specs from a network designer for your dual-band 802.11n deployment. The
network design documents prescribe the following data rate configuration for the 2.4 GHz radio:
Basic Rates 5.5, 6, 11, 12 Mbps
Supported Rates 9, 18, 24, 36, 48, and 54 Mbps as well as MCS 0-15
What will result from this design strategy?
Which of the following items could be considered constraints when performing a network design?(Choose all that apply.)
What limitation exists when WMM is not enabled on an 802.11n WLAN?
You're about to deploy an Enterprise-class VoWLAN infrastructure. You need to ensure that QoS is properly configured throughout the network.
What Access
Category (AC) should voice frames/packets use?
In this question, you will compare the mobility processes of a network that supports WPA2-Personal and WPA2-Enterprise. Assume the use of a
15-character
ASCII passphrase for WPA2-Personal and EAP-TTLS/MSCHAPv2 with WPA2-Enterprise. Also, assume that proprietary roaming protocols are not
supported.
When a device transitions from one BSS to another within the same ESS, what step must be performed in the WPA2-Enterprise transition that are
not performed in the WPA2-Personal transition?
A signal passes through a 10-meter cable, an amplifier, and then a filter. The amplifier has an output that is eight times higher in power than its input. Each meter of cable reduces the signal level by a factor of 4. The filter has a loss of 5 dB.
What is the total loss/gain of the three elements in series?
Response:
When designing for a PTP outdoor link, what important consideration should be made about local vegetation?(Choose all that apply.)
Response:
What is the purpose of DHCP Option 43, and how is it used with WLANs?
What is the most cost-effective way to accurately measure the height of a ceiling when ladder use is not allowed?
You are planning for client devices in a WLAN that is be upgraded to 802.11ac. Which one of the following devices is more likely to have support for 3x3:3 radios and 256 QAM?
Response:
SSID hiding is not generally recommended because some frames require inclusion of the SSID. In what frames is the SSID always included?
Response:
As a device starts to shift to lower PHY rates, what factors usually influence a device decision to shift to lower PHY rates?(Choose all that apply.)
Response:
Given: The 802.11ac APs you have selected for your public access deployment support many of the PHY and MAC enhancements offered by the
802.11n and
802.11ac amendments. The AP is configured for a single-band (2.4 GHz) and only allows 20 MHz channels. The WLAN radio in the AP is a 3x3
802.11n chip that supports two spatial streams.
What is the maximum MCS rate that could be supported by this AP?
What commonly causes a client-to-AP link imbalance?
A wireless engineer from your company performed a site survey in an office building where a wireless network extension was needed. He reports
that while performing a Layer 1 sweep near a meeting room full of people, he detected RF activity with a very low duty cycle. He is unsure how to
interpret what he recorded to determine its impact on a future Wi-Fi network.
What is true about this RF environment and its potential impact on the WLAN?
Who should be in the final meeting from the customer-side after successfully implementing a WLAN infrastructure?
What advantages are provided by per-user PSKs when compared with ESS-wide PSKs?(Choose all that apply.)
Response:
When selecting a centralized WLAN architecture, what new problem may arise when you change the data forwarding model from centralized to distributed?
Response:
What document is typically created to launch a project?
Response:
When using a predictive design tool, you have selected APs with an antenna gain 3 dBi and set the transmit power of the predicted APs to 25 mW. What should be EIRP of the APs in the design?
Response:
What document should be created that provides instructions for install technicians to mount and configure APs?
An associated STA detects a new BSS with the same SSID as the STA's current BSS. The new BSS uses a different IP subnet than the current BSS.
If the STA is configured to use 802.1X/EAP preauthentication, what is likely to occur?
When troubleshooting coverage issues for a wireless network as it appears to new client associations, you should perform which type of survey?
Response:
What is a radome?
Assume that your network operates in a regulatory domain that allows use of the entire 5 GHz space allowed in the 802.11ac amendment. In your
upcoming
802.11ac deployment, you would like to take advantage of the performance improvements that result from channel bonding. However, after
extensive testing, you have determined that your mission-critical WLAN should not use channels requiring DFS support.
Given those two criteria (enable channel bonding and disable DFS channels), in the 5 GHz spectrum, how many non-overlapping 40 MHz channels
will your system be able to use?
To increase capacity in a coverage-based wireless network, which of the following techniques are typically recommended?(Choose all that apply.)
Response:
Given: You are evaluating the theoretical and real-world RF gain benefits of transmit and receive features introduced by 802.11 with MIMO. This
exercise allows you to quantify the features value in a real-world environment.
What is the maximum theoretical signal gain of chip-based TxBF and MRC (as features) when compared to the same AP using only a single
antenna for transmit and receive (effectively simulating a 1x1 chip)?
While performing a validation site survey, you realize that overlapping channels are being used on the 2.4 GHz bad due to the automatic channel assignment algorithm of the WLAN infrastructure.
What should you do to prevent this?
Response:
What type of protection should be provided to outdoor antenna installations?
Response:
What functions do the control plane of centralized and distributed WLAN architectures help solve?(Choose all that apply.)
Response:
When selecting a centralized WLAN architecture, what new problem may arise when you change the data forwarding model from centralized to
distributed?
A museum wants to offer Wi-Fi to its visitors. One of their requirements is to have the APs blend into the design of the museum. What should you
do to meet this requirement?
What service must be implemented on your customers' network to authenticate users against an LDAP database prior to access to the WLAN
infrastructure being granted?
What functions may be performed by a WIPS?(Choose all that apply.)
Response:
What is the meaning of a Real Time FFT graph?
In the enterprise, when is WPA/WPA2-Personal generally a recommended solution?(Choose all that apply.)
Response:
In an RSN requiring low-latency reassociations and no fast secure roaming protocols, what security solutions are ideal for protecting VoWiFi communication?(Choose all that apply.)
Response:
Which type of authentication and encryption method is mandatory for Voice Enterprise certified devices as specified by the Wi-Fi Alliance?
Excessive uplink RTP frame retransmissions can result in ____________.
Response:
During an RFP analysis, one of the vendors mentioned that you'll need to upgrade your Gigabit Ethernet switches to MultiGig switches to ensure
support for
802.11ac and 802.11ax, which both offer data rates over 1Gbps. Why is this not sound advice?
What functions may be performed by a WIPS?(Choose all that apply.)
What is the minimum PoE budget needed on a switch to support 6 (six) APs that can only be powered using IEEE 802.3at if no other details are
provided?
Your new customer is concerned about maintaining privacy for their proprietary information when you conduct information gathering for their
WLAN design. Which document can you use to directly address their concern?
The thermal noise is at −174 dBm/Hz. A spectrum analyzer has a resolution bandwidth of 1 kHz and a 5 dB noise figure. What is the level of the noise floor?
Response:
A customer wants to deploy a WLAN that employs centralized forwarding. What LAN requirements should you look for?
Response:
What is the best method of gathering attenuation measurements from any building materials or objects?
How are EAP messages transported over 802.11 wireless LANS?
Response:
What kind of site survey helps you identify if roaming is working as designed?
What limitation exists when WMM is not enabled on an 802.11n WLAN?
Response:
What differences exist between VLANs in wireless and wired domains?
Response:
After designing and deploying a WLAN infrastructure, you realized the CCI is causing poor performance in the 2.4 GHz band. Primarily, you've
designed the
WLAN for 5 GHz and 2.4 GHz as a best effort. You found out that the implementers didn't follow your guidelines when configuring the WLAN
infrastructure. What can you do to minimize as much as possible the CCI impact in the 2.4 GHz band?
What is the minimum PoE budget needed on a switch to support 6 (six) APs that can only be powered using IEEE 802.3at if no other details are provided?
Response:
You and 10 other people are connected to a public hot-spot. You issue a ping sweep on the network, but you can't find any devices on the same
subnet as yours.
What feature might be enabled on the WLAN infrastructure that is preventing you from communicating with other devices on that subnet?
When performing an indoor predictive site survey to make the WLAN planning and design cycle more efficient, what is a best practice for
configuration of the simulated APs in the predictive modeling software?
During a customer walkthrough you notice an area of the CAD drawing where it is not accurate. What next step should you take?
Response:
During lunch time in the break room of a company, Wi-Fi connectivity on the 2.4 GHz band is intermittent. Every other time of the day, it works fine. What's the likely cause of this issue?
Response:
You are validating association capabilities from clients to an 802.1X/EAP secure SSID. The RADIUS server's IP address is 10.100.50.25 and the
default RADIUS authentication port is used. When testing them, none of the clients are able to associate to the SSID. Troubleshooting the WLAN
infrastructure, you found out that the server is up and the RADIUS service is up as well, but the authenticator is not able to communicate properly
with the server. What's your next troubleshooting step?
When deploying a new WLAN infrastructure using PoE to power the APs, you realize that a known good AP is not powering up. You use the same
cable to connect your laptop and connect without any trouble. What is the most likely reason the AP did not power up?
An enterprise customer is subject to the highest standards for network uptime. When designing their wireless network, you should consider which of the following?(Choose all that apply)
Response:
Location technology (RTLS) can use which of the following methods?(Choose all that apply.)
Response:
What is the DSCP Per Hop Behavior equivalent classification of the 802.11 AC_VO priority level?
In a large enterprise (5000+ wireless users), by what would NOT be a recommended method by which IP addresses and VLANs are assigned to
different clients associated to the same AP?
What kind of applications has the character traits of many communications back and forth between the server and client for each transaction initiated by the user?
For example, several files, images and other data files may be required to download to the client with each click from the user. Choose the best answer.
Response:
A museum wants to offer Wi-Fi to its visitors. One of their requirements is to have the APs blend into the design of the museum. What should you do to meet this requirement?
Response:
Your customer requires fast secure roaming. Which two types of roaming are specified in 802.11-2016 FT roaming that will help meet this goal?