As an RF wave propagates through space, the wave front experiences natural expansion that reduces its signal strength in an area. What term describes the rate at which this expansion happens?
A. Inverse square law
B. Ohm's law
C. Fresnel zone thinning
D. MU-MIMO
XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.
As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.112016, should be supported to provide the management frame protection and fast secure roaming security features?
A. 802.11j and 802.11k
B. 802.11r and 802.11k
C. 802.11z and 802.11w
D. 802.11r and 802.11w
What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?
A. A single AP supports multiple BSSs with different SSIDs.
B. An SCA network is in use.
C. Multiple APs have been loaded with the same configuration from an image file.
D. An IBSS is used instead of a BSS.
What ID is typically mapped to an AP's MAC address if a single BSS is implemented?
A. VLAN ID
B. BSSID
C. Device ID
D. SSID
When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?
A. VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.
B. VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.
C. VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.
D. Legacy Power Save mode was removed in the 802.11ac amendment.
An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop. What WLAN use case is represented?
A. WPAN
B. Ad-hoc
C. BSS
D. IBSS
You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reposting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?
A. Perform corrective actions
B. Discover the scale of the problem
C. Create a plan of action or escalate the problem
D. Verify the solution
A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?
A. Beacon frames transmitted by the AP
B. Data frames sent between the AP and current clients STAs
C. Authentication frames transmitted by the other client STAs
D. Probe request frames transmitted by other client STAs
You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?
A. Less than 150 Mbps because of 802.11 overhead and contention
B. 54 Mbps because that is the actual maximum throughput of an 802.11 connection
C. More than 150 Mbps because of compression
D. 150 Mbps because the data rate is equal to the throughput
Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to-point WLAN bridge link?
A. MU-MIMO capabilities of the bridges
B. Receive antenna gain
C. Transmit power
D. Operating frequency