A WLAN is implemented using wireless controllers. The Aps must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the Aps?

A WLAN is implemented using wireless controllers. The Aps must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the Aps?A . DHCPB . GREC . NTPD . SNMPView AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

What statement accurately describes the RF cables and connectors that are used in an 802.11 WLAN system?

What statement accurately describes the RF cables and connectors that are used in an 802.11 WLAN system?A . 75 and 125 ohms are the typical impedances of 802.11 WLAN connectors.B . Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications.C . Some...

August 10, 2018 No Comments READ MORE +

What ID is typically mapped to an AP's MAC address if a single BSS is implemented?

What ID is typically mapped to an AP's MAC address if a single BSS is implemented?A . VLAN IDB . BSSIDC . Device IDD . SSIDView AnswerAnswer: B

August 3, 2018 No Comments READ MORE +

What is the final step in an effective troubleshooting process?

What is the final step in an effective troubleshooting process?A . Document the resultsB . Disable the WLANC . Notify the users of problem resolutionD . Verify the solutionView AnswerAnswer: C

July 30, 2018 No Comments READ MORE +

What WLAN feature would allow the network administrator to accomplish this task?

To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based on their department. What WLAN feature would allow the network administrator to accomplish this task?A ....

July 30, 2018 No Comments READ MORE +

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?A . Protocols utilizedB . Channel occupiedC . Receive sensitivityD . Airtime utilizationView AnswerAnswer: B

July 28, 2018 No Comments READ MORE +

What statement about 802.3. Clause 33 Power over Ethernet is true?

What statement about 802.3. Clause 33 Power over Ethernet is true?A . Only midspan PSEs are supported.B . The lowest voltage drop is achieved when using CAT6 cable instead of CAT5 or CAT5e.C . Only endpoint PSEs are supported.D . When using CAT5 cabling, you increase the maximum draw available...

July 20, 2018 No Comments READ MORE +

What network functions are performed by the enterprise-class WNMS?

ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system. What network functions are performed by the enterprise-class WNMS?A . Radio management, fast roaming, key caching, and other centralized control...

July 19, 2018 No Comments READ MORE +

What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?

What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?A . WPA2-Enterprise with EAP-TTLSB . WPA2-Enterprise with EAP-TLSC . WPA2-Enterprise with PEAPD . WPA2 -PersonalView AnswerAnswer: B

July 16, 2018 No Comments READ MORE +