In a long-distance RF link, what statement about Fade Margin is true?
A. Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.
B. The Fade Margin of a long-distance radio link should be equivalent to the receiver's antenna gain.
C. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.
D. The Fade Margin is a measurement of signal loss through free space, and is a function of frequency and distance.
Given: Two co-located 802.11b/g/n APs can interfere with one another and cause contention and collisions, even when the two APs are operating on non-overlapping channels (e.g. 1 and 6).
What deployment flaw could cause this problem? (Choose two)
A. The access points are mounted too closely to one another.
B. Reflective objects in the area are causing significant multipath.
C. A client station is using active scanning to probe for access points on multiple channels.
D. The output power on the access points is too high.
E. A client station authenticates to both access points, but does not associate.
F. The access points are not synchronized to the same NTP server.
What three cipher suites are specified by the IEEE 802.11-2007 standard? (Choose three)
A. Counter Mode with CBC-MAC Protocol
B. Wi-Fi Protected Access v1 and v2
C. Internet Protocol Security
D. Extensible Authentication Protocol
E. Internet Key Exchange v2
F. Wired Equivalent Privacy
G. Temporal Key Integrity Protocol
In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use?
A. Mode 0: No protection mode (Greenfield)
B. Mode 1: Nonmember protection mode
C. Mode 2: 20 MHz protection mode
D. Mode 3: Non-HT mixed mode
What factors are likely to cause the greatest impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS? (Choose three)
A. Use of WEP or TKIP for encryption instead of CCMP
B. Use of passphrase authentication instead of 802.1X/EAP authentication
C. Increasing the beacon interval from 100 to 200 (TUs)
D. RF interference from more than 10 nearby Bluetooth transmitters
E. Increasing or decreasing the number of spatial streams in use by the client station and AP
F. Configuring the AP to perform off-channel IDS scans for rogue devices for 50 ms out of every 20 seconds
Given: Joe runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Joe has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. Joe wants to avoid this problem at his hotel.
What is an efficient and practical step that Joe can take to decrease the likelihood of active attacks on his customers' wireless computers?
A. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches
B. Require EAP-FAST authentication and provide customers with a username/password on their receipt
C. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login
D. Enable station-to-station traffic blocking by the access points in the hotel
Given:
As a consultant, you have been hired by ABC Company to implement an outdoor WLAN connection
between two buildings that are 2 kilometers (1.24 miles) from each other, with no obstructions in between.
Your first required objective is to create a point-to-point link between the two buildings within the local regulatory body's 800 mW EIRP maximum.
Your second required objective is to provide an industry-standard security solution capable of supporting mutual authentication.
As an optional objective, you must minimize the amount of interference from, and to, nearby WLAN networks.
You install an OFDM wireless bridge at each building, configuring one in root mode and the other in non-root mode. You set each radio for 100 mW (20 dBm) and attach 9 dBi omni-directional antennas to both. You configure the network for WPA2-Enterprise with PEAPv0/EAP-MSCHAPv2 authentication.
Which statement is true about the solution you chose to deploy?
A. Your solution meets both required objectives and the optional objective.
B. Your solution meets the first required objective and the optional objective, but not the second objective.
C. Your solution meets the second required objective and the optional objective, but not the first required objective.
D. Your solution meets neither required objective but meets the optional objective.
E. Your solution meets both required objectives, but does not meet the optional objective.
F. Your solution does not meet either required objective, or the optional objective.
What terms accurately complete the following sentence? The IEEE 802.11-2007 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware.
A. CCMP, TKIP
B. 802.1X/EAP, WEP
C. TLS, SSL
D. CCKM, WPA
E. RC5, RC4
Given:
A WLAN transmitter that emits a 200 mW signal is connected to a cable with 3 dB loss.
If the cable is connected to an antenna with 10 dBi gain, what is the EIRP at the antenna element?
A. 10 dBm
B. 13 dBm
C. 20 dBm
D. 26 dBm
E. 30 dBm
When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?
A. After waiting a SIFS, all APs reply at the same time with a probe response.
B. After waiting a SIFS, a designated AP sends an ACK, and then replies with a probe response.
C. Each AP sends its own ACK, and then follows the ACK with a probe response.
D. For each probe request frame, only one AP may reply with a probe response.
E. Each AP responds in turn after preparing a probe response and winning contention.