Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What feature of 802.1 lax (HE) is managed with beacon and trigger frames and is primarily a power management method, but also provides more efficient access to the channel used within a BSS?

A.

TWT

B.

BSS Color

C.

UL-MU-MIMO

D.

OFDMA

Full Access
Question # 5

What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?

A.

SSL

B.

802.1X/EAP

C.

IPSec

D.

WEP

Full Access
Question # 6

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

Full Access
Question # 7

Your consulting firm has recently been hired to complete a site survey for a company desiring an indoor coverage WI-AN. Your engineers use predictive design software for the task, but the company insists on a pre-design site visit.

What task should be performed as part of the pre-design visit to prepare for a predictive design?

A.

Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls

B.

Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers

C.

Test several antenna types connected to the intended APS for use in the eventual deployment

D.

Evaluate the building materials at the facility and confirm that the floor plan documents are consistent with the actual building

Full Access
Question # 8

You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?

A.

Channel 6, because it is always best to use this channel

B.

A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision

C.

Channel 1, because it is best to use the channel with the lowest frequency

D.

Channel 11, because channels 1 and 6 are in use nearby

Full Access
Question # 9

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

A.

Directed Radiation

B.

Beam Digression

C.

Passive Gain

D.

Active Amplification

Full Access
Question # 10

What is always required to establish a high quality 2.4 GHz RF link at a distance of 3 miles (5 kilometers)?

A.

Minimum output power level of 2 W

B.

Grid antennas ateach endpoint

C.

A minimum antenna gain of 11 dBi at both endpoints

D.

A Fresnel Zone that is at least 60% clear of obstructions

Full Access
Question # 11

What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

A.

Signal strength of AP beacons received.

B.

PING latency when testing against an Internet server.

C.

Throughput speed in Mbps.

D.

FCS errors in frames transmitted to and from the AP.

Full Access
Question # 12

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

A.

Each AP responds in turn after preparing a probe response and winning contention.

B.

For each probe request frame, only one AP may reply with a probe response.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

Full Access
Question # 13

What frame type is used to reserve the wireless medium for the transmission of high data rate frames that may not be understood by all clients connected to the BSS?

A.

RTS

B.

ACK

C.

Beacon

D.

PS-Poll

Full Access
Question # 14

What statement describes the authorization component of a AAA implementation?

A.

Verifying that a user is who he says he is.

B.

Implementing a WIPS as a full-time monitoring solution to enforce policies.

C.

Granting access to specific network services or resources according to a user profile.

D.

Validating client device credentials against a database.

Full Access
Question # 15

The BSA of an AP covers the area used by the sales and marketing department. Thirty-five stations operate in this space. The users indicate that they need more throughput and all stations are 5 GHz capable 802.11ac clients. The current AP configuration uses 20 MHz channels in both 2.4 GHz and 5 GHz. What is the least expensive solution available for increasing throughput for these users without implementing configuration options that are not recommended?

A.

Use a 160 MHz channel on the 5 GHz radio

B.

Use a 40 MHz channel on the 5 GHz radio

C.

Install a second AP in the coverage area

D.

Use a 40 MHz channel on the 2.4 GHz radio

Full Access
Question # 16

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?

A.

WAN interface analysis results

B.

Capacity analysis results

C.

Application Layer protocol availability analysis results

D.

Layer 4 protocol availability analysis results

Full Access
Question # 17

What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?

A.

OWE

B.

Kerberos

C.

WPA3-Enterprise

D.

WPA3-SAE

Full Access
Question # 18

When an ACK frame is not received by the transmitting STA, what is assumed?

A.

The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled

B.

The frame was correctly delivered

C.

The frame was not delivered and must be retransmitted

D.

The receiver is offline

Full Access
Question # 19

You support a WLAN using dual-band 802.11ac three stream access points. All access points have both the 2.4 GHz and 5 GHz radios enabled and use 40 MHz channels in 5 GHz and 20 MHz channels in 2.4 GHz. A manager is concerned about the fact that each access point is connected using a 1 Gbps Ethernet link. He is concerned that the Ethernet link will not be able to handle the load from the wireless radios. What do you tell him?

A.

His concern is valid and the company should upgrade all Ethernet links to 10 Gbps immediately.

B.

His concern is valid and the company should immediately plan to run a second 1 Gbps Ethernet link to each AP.

C.

His concern is invalid because the AP will compress all data before transmitting it onto the Ethernet link.

D.

Due to 802.11 network operations and the dynamic rates used by devices on the network, the two radios will likely not exceed the 1 Gpbs Ethernet link.

Full Access
Question # 20

What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks?

A.

WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not

B.

WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network

C.

WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not

D.

WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal

Full Access
Question # 21

You administer a small WLAN with nine access point. As a small business, you do not rum a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-personal in all Aps and clients. Several users are now reporting the inability to connect to the network at time and it is constrained to one area of the building. When using scanner, you see that the AP covering that area is online

A.

The AP that covers the problem area requires a firmware update

B.

The clients are improperly configured

C.

The AP that covers the problem area has failed

D.

The AP that covers the problem area is improperly configured

Full Access
Question # 22

When using a spectrum to look for non Wi-Fi interference sources, you notice significant interference across the entire 2.4 GHz band (not on a few select frequencies) within the desktop area of a users workspace, but the interference disappears quickly after just 2 meters. What is the most likely cause of this interference?

A.

USB 3 devices in the user’s work area

B.

Bluetooth devices in the user’s work area

C.

Excess RF energy from a nearby AP

D.

Unintentional radiation from the PC power supply

Full Access
Question # 23

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

A.

OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.

B.

OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.

C.

OFDM modulation is used only in 5 GHz 802.11 transmissions.

D.

OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.

Full Access
Question # 24

What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?

  • VHT PHY

A.

HT PHY

B.

SAE

C.

CCMP

Full Access
Question # 25

You were previously onsite at XYZ’s facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey.

When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?

A.

Spectrum analysis to locate and identify RF interference sources.

B.

Frequency-band hopping analysis to detect improper RF channel implementations.

C.

Application analysis with an active phone call on an VoWiFi handset.

D.

Protocol analysis to discover channel use on neighboring APs.

Full Access
Question # 26

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

A.

Legacy Power Save mode was removed in the 802.11ac amendment.

B.

VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.

C.

VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.

D.

VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.

Full Access
Question # 27

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)

A.

The number of clientstations associated to the BSS

B.

The power management settings in the access point’s beacons

C.

The presence of co-located (10m away) access points on non-overlapping channels

D.

The layer 3 protocol used by each station to transmit data over the wireless link

Full Access
Question # 28

You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?

A.

Throughput tester

B.

Laptop-based spectrum analyzer

C.

Access point spectrum analyzer

D.

Wi-Fi scanner

Full Access
Question # 29

An RF signal sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?

A.

Refraction

B.

Warping

C.

Scattering

D.

Reflection

Full Access
Question # 30

Which unit of measurement, as formally defined, is an absolute unit that is used to quantify received signal power levels on a logarithmic scale?

A.

SNI

B.

VSWR

C.

dBm

D.

dBi

Full Access
Question # 31

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

A.

Wired Equivalent Privacy

B.

Temporal Key Integrity Protocol

C.

Counter Mode with CBC-MAC Pro tocol

D.

Extensible Authentication Protocol

Full Access
Question # 32

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Full Access
Question # 33

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?

A.

Receive sensitivity

B.

Channel occupied

C.

Airtime utilization

D.

Protocols utilized

Full Access
Question # 34

A POE device requires 47 W of power. What POE specification should be used?

A.

802.3at

B.

802.3af

C.

802.3bt

D.

802. 11at

Full Access
Question # 35

You must plan for POE in an office environment. Which one of these devices is least likely to be a POE PSE?

A.

Midspan multi-port injector

B.

Switch

C.

VolP Phone

D.

Midspan injector

Full Access
Question # 36

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an

AP supports the same data rates that it supports?

A.

Beacon frames transmitted by the AP

B.

Data frames sent between the AP and current clients STAs

C.

Authentication frames transmitted by the other client STAs

D.

Probe request frames transmitted by other client STAs

Full Access