Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN.
What is this process of identity validation called?
A. Affiliation
B. Association
C. Authentication
D. Activation
E. Accounting
Given: Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational. What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?
A. ESS
B. BSS
C. IBSS
D. BSSID
E. SSID
Which explanations of antenna usage are the most accurate? (Choose 2)
A. A parabolic dish antenna is ideal for directing a beam down a long hallway.
B. An omni-directional antenna is well-suited to provide wireless coverage in most homes.
C. Patch antennas are mounted in the center of a lecture hall to provide circular coverage.
D. A dipole antenna is mounted to a perimeter wall in school buildings to provide coverage inside the building.
E. A grid antenna is designed to perform favorably as part of an outdoor point-to-point link under windy conditions.
What is one difference between autonomous access points and controller-based access points?
A. Controller-based access points can be centrally managed, but autonomous access points cannot.
B. Controller-based access points support client roaming, but autonomous access points do not.
C. Controller-based access points cannot be configured on an individual basis, but autonomous access points can.
D. Controller-based access points associate to a WLAN controller, but autonomous access points do not.
Exhibit:
In what type of Wi-Fi deployment is an antenna mounted using a pole mounting kit, as shown in the exhibit?
A. Indoor Mesh
B. Outdoor Bridging
C. Office space APs
D. Hotel guest access
ABC Academy is currently using non-802.11 2.4 GHz wireless security cameras. What problem will ABC Academy experience if they deploy Wi-Fi client devices in the 2.4 GHz ISM band?
A. The Wi-Fi client devices will experience performance degradation due to co-channel interference.
B. Wi-Fi client devices will create a security hole in the Wi-Fi infrastructure as a protection mechanism.
C. If the Wi-Fi client devices detect the security cameras, they will move to the 5 GHz band and stop transmitting in the 2.4 GHz band.
D. The Wireless Network Management System (WNMS) would not be able to manage the APs near the security cameras.
What type of protection does a lightning arrestor provide to a Wi-Fi system?
A. Protection from direct lightning strikes
B. Prevention of direct lightning strikes
C. Redirection of transient current due to nearby lightning strikes
D. Absorption of the energy induced by direct lightning strikes
Simple antenna diversity mitigates the adverse effects caused by which common Wi-Fi problem?
A. Hidden node
B. RF signal absorption
C. Multipath
D. Co-channel interference
E. Polarization
What symptom would indicate the presence of a hidden node in a Wi-Fi network?
A. An increase in encrypted packets
B. An increase in antenna diversity
C. An increase in signal leakage
D. An increase in retransmissions
ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is using WEP security with a 128-bit key. You have been asked to provide feedback about the strength of their security. You tell ABC Company that _________.
A. Each currently-used security mechanism is helpful, and the network is secure.
B. MAC filtering will prevent unauthorized access, but SSID hiding and WEP will not.
C. MAC filtering and SSID hiding will prevent unauthorized access, but WEP will not.
D. WEP and SSID hiding will prevent unauthorized access, but MAC filtering will not.
E. Each currently-used security mechanism is weak, and the network is insecure.