Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which one of the following portions of information is communicated by bits in the PHY Header?

A.

SNR

B.

Noise

C.

Data rate

D.

Signal strength

Full Access
Question # 5

In which element of a Beacon frame would you look to identity the current HT protection mode in which an AP is operating?

A.

HT Protection Element

B.

HT Operations Element

C.

ERP Information Element

D.

HT Capabilities Element

Full Access
Question # 6

How many frames make up the Group Key Handshake excluding any Ack frames that may be required?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 7

Using a portable analyzer you perform a packet capture next to a client STA and you can see that the STA is associated to a BSS. You observe the STA sending packets to the AP and the AP sending packets to the STA. Less than 2% of all packets are retransmissions. You move to capture packets by the AP and, while the retry rate is still less than 2%, you now only see unidirectional traffic from the AP to the client. How do you explain this behavior?

A.

The portable analyzer is too close to the AP causing CCI, blinding the AP to the clients packets

B.

The STA is transmitting data using more spatial streams than the potable analyzer can support

C.

There is a transmit power mismatch between the client and the AP and while the client can hear the APs traffic, the AP cannot hear the client

D.

The portable analyzer has a lower receive sensitivity than the AP and while it can't capture the packets from the client STA, the AP can receive them OK

Full Access
Question # 8

What is the function of the PHY Preamble?

A.

To terminate a conversation between transmitter and receiver

B.

To set the modulation method for the MPDU

C.

Carries the NDP used in Transmit Beamforming and MU-MIMO

D.

Allows the receiver to detect and synchronize with the signal

Full Access
Question # 9

Which one of the these is the most important in the WLAN troubleshooting methodology among those listed?

A.

Obtain detailed -knowledge of the wireless vendors debug and logging options

B.

Interview the network manager about the issues being experienced

C.

Observe the problem

D.

Talk to the end users about their experiences

Full Access
Question # 10

What does the value of the Listen Interval field in an Association Request frame indicate?

A.

How long a STA performing active scanning will listen for Probe Responses before changing channels

B.

How often a STA will go off channel to look for other BSSs

C.

How often a STA in power save mode wakes up to listen to Beacon frames

D.

How long a STA waits for an Ack before retransmitting the frame

Full Access
Question # 11

What is the function of the PHY layer?

A.

Convert PPDUs to PSDUs for transmissions and PSDUs to PPDUs for receptions

B.

Convert MSDUs to PPDUs for transmissions and PPDUs to MSDUs for receptions

C.

Convert PPDUs to MSDUs for transmissions and MSDUs to PPDUs for receptions

D.

Convert PSDUs to PPDUs for transmissions and PPDUs to PSDUs for receptions

Full Access
Question # 12

When configuring a long-term, forensic packet capture and saving all packets to disk which of the following is not a consideration?

A.

Real-time packet decodes

B.

Analyzer location

C.

Total capture storage space

D.

Individual trace file size

Full Access
Question # 13

When would you expect to see a Reassociation Request frame'

A.

Every time a STA associates to an AP to which it has previously been associated

B.

Only when a STA is using FT roaming

C.

Only when a STA roams back to an AP it has previously been associated with

D.

Every time a STA roams

Full Access
Question # 14

You are troubleshooting a client that is experiencing slow WLAN performance. As part of the troubleshooting activity, you start a packet capture on your laptop close to the client device. While analyzing the packets, you suspect that you have not captured all packets transmitted by the client. By analyzing the trace file, how can you confirm if you have missing packets?

A.

The missing packets will be shown as CRC errored packets

B.

Protocol Analyzers show the number of missing packets in their statistics view

C.

Look for gaps in the sequence number in MAC headers.

D.

Retransmission are an indication of missing packets

Full Access
Question # 15

After examining a Beacon frame decode you see the SSID Element has a length of 0. What do you conclude about this frame?

A.

The frame is corrupted

B.

SSID elements always have a length of 0

C.

This is a common attack on WISP backend SQL databases

D.

The beacon is from a BSS configured to hide the SSID

Full Access
Question # 16

Finish the statement:

It is possible to distinguish between_______22 MHz transmissions and________20 MHz transmissions when looking at an FFT plot.

A.

HR/DSSS and ERP

B.

OFDM and HT

C.

ERP and VHT

D.

HT and VHT

Full Access
Question # 17

Which one of the following is not an 802.11 Management frame?

A.

PS-Poll

B.

Action

C.

Beacon

D.

Authentication

Full Access
Question # 18

How is the length of an AIFS calculated?

A.

DIFS + SIFS + AIFSN

B.

SIFS + AIFS * Time Unit

C.

SIFS * Slot Time + AIFSN

D.

AIFSN * Slot Time + SIFS

Full Access