You are analyzing a packet decode of a Probe Request and notice the SSID element has a length of zero. What do you conclude about transmitting STA?
A. The WLAN adaptor is configured in promiscuous mode
B. The STA is operating in Ad-Hoc mode
C. The STA's WLAN adaptor is disabled
D. The STA is discovering a list of available BSSs
What should the To DS and From DS flags be to set to in an Association Response frame?
A. To DS = 0, From DS = 0
B. To DS = 0, From DS = 1
C. To DS = 1, From DS = 0
D. To DS = 1, From DS = 1
Which one of the following is not a valid reason for an AP to fail a STAs association?
A. Requesting station has the wrong PSK
B. Does not support the specified authentication algorithm
C. AP is unable to handle additional associations
D. Requesting station does not support all the required data rates
A client is operating in an unstable RF environment. Out of five data frames transmitted to the client it only receives four. The client sends a Block Ack to acknowledge the receipt of these four frames but due to frame corruption the Block Ack is not received by the AP. Which frames will be transmitted?
A. Only the data frame which was corrupted
B. Both the corrupted data and Block Ack
C. All data frames
D. Only the Block Ack
Which one of the following is not an 802.11 Management frame?
A. Action
B. Authentication
C. PS-Poll
D. Beacon
As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity. To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is deauthentication frames. On closer investigation you see that the deauthentication frames' source addresses match the BSSISs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF. What do you conclude from this troubleshooting exercise?
A. The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network
B. The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below
C. The customers APs are misbehaving and a technical support case should be open with the vendor
D. The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their AP's Tx power
What is an AIFS?
A. A form of aggregation performed at the PLCP sub-layer
B. The shortest period of time a STA can sleep
C. A medium access method introduced by 802.11n, but never implemented
D. A variable Interframe Space introduced by802.11e to help prioritize medium access for different Access Categories
ABC International has installed a new smart ZigBee controlled lighting system. However, the network team is concerned that this new system will interface with the existing WLAN and has asked you to investigate the impact of the two systems operating simultaneously in the 2.4 GHz band. When performing Spectrum Analysis, which question could you answer by looking at the FFT plot?
A. Do the ZigBee channels used by the lightning system overlap with the WLAN channels?
B. Is the ZigBee system using more the 50% of the available airtime?
C. Is the ZigBee system causing an increase in WLAN retries?
D. Is the WLAN corrupting ZigBee system messages?
When would you expect to see a Reassociation Request frame?
A. Every time a STA associates to an AP to which it has previously been associated
B. Only when a STA is using FT roaming
C. Only when a STA roams back to an AP it has previously been associated with
D. Every time a STA roams
Which one of the best following is an advantage of using display filters instead of capture-time filters?
A. Display filters allow for focused analysis on just the packets of interest
B. Once created display filters are reusable for later captures
C. Display filters only hide the packets from view and the filtered packets can be enabled for view later
D. Multiple display filters can be applied simultaneously