What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on her customers' wireless computers?

Lynne runs a small hotel, and as a value added service for her customers she has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. She wants to avoid this problem at her hotel. What is an...

February 16, 2018 No Comments READ MORE +

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?A . Beacon frames transmitted by the APB . Data frames...

February 12, 2018 No Comments READ MORE +

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?A . Layer 4 protocol availability analysis resultsB . Application Layer protocol availability analysis resultsC . Capacity analysis resultsD . WAN interface analysts resultsView AnswerAnswer: C

February 11, 2018 No Comments READ MORE +

What task should be performed as part of the pre-deployment visit to prepare for a predictive survey?

Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive modeling software for surveying, but the company insists on a pre-deployment site visit. What task should be performed as part of the pre-deployment visit to prepare for a predictive survey?A ....

February 11, 2018 No Comments READ MORE +

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?A . MSKB . WEP keyC . PassphraseD . PSKView AnswerAnswer: D

February 9, 2018 No Comments READ MORE +

In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network bandwidth (e.g. 130 Mbps) for user data throughput when multiple clients are actively exchanging data with the AP?

In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network bandwidth (e.g. 130 Mbps) for user data throughput when multiple clients are actively exchanging data with the AP?A . Radio receiver hardware cannot process data as quickly as it can be transmitted.B . Half of...

February 4, 2018 No Comments READ MORE +

What answer would be accurate?

You are being interviewed by ABC Company for employment as a wireless site survey expert. The interviewing manager asks you what items should be included in a site survey report generated as part of a manual site survey process. What answer would be accurate?A . Itemized list of equipment, licenses,...

January 26, 2018 No Comments READ MORE +

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?A . VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.B . VHT TXOP power save uses the partial AID in the preamble...

January 23, 2018 No Comments READ MORE +

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this...

January 20, 2018 No Comments READ MORE +

When implementing PoE, what role is played by a switch?

When implementing PoE, what role is played by a switch?A . POB . PSEC . Midspan injectorD . Power splitterView AnswerAnswer: C

January 19, 2018 No Comments READ MORE +