Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot- spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers' wireless computers?
A. Enable station-to-station traffic blocking by the access points in the hotel.
B. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches.
C. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.
D. Require EAP-FAST authentication and provide customers with a username/password on their receipt.
You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.
What kind of application is described?
A. Protocol analyzer
B. Site survey utility
C. Spectrum analyzer
D. WLAN scanner tool
A client complains of low data rates on his computer. When you evaluate the situation, you see that the signal strength is -84 dBm and the noise floor is -96 dBm. The client is an 802.11ac client and connects to an 802.11ac AP. Both the client and AP are 2x2:2 devices. What is the likely cause of the low data rate issue?
A. Weak signal strength
B. CAT5e cabling run to the AP
C. Too few spatial streams
D. Lack of support for 802.11n
In a mesh BSS (MBSS), according to the 802.11 standard, what device connect the mesh to an Ethernet network?
A. Mesh Gate
B. Mesh Switch
C. Mesh Router
D. Mesh Portal
You support a WLAN using dual-band 802.11ac three stream access points. All access points have both the 2.4 GHz and 5 GHz radios enabled and use 40 MHz channels in 5 GHz and 20 MHz channels in 2.4 GHz. A manager is concerned about the fact that each access point is connected using a 1 Gbps Ethernet link. He is concerned that the Ethernet link will not be able to handle the load from the wireless radios. What do you tell him?
A. His concern is valid and the company should upgrade all Ethernet links to 10 Gbps immediately.
B. His concern is valid and the company should immediately plan to run a second 1 Gbps Ethernet link to each AP.
C. His concern is invalid because the AP will compress all data before transmitting it onto the Ethernet link.
D. Due to 802.11 network operations and the dynamic rates used by devices on the network, the two radios will likely not exceed the 1 Gpbs Ethernet link.
What can an impedance mismatch in the RF cables and connectors cause?
A. Increased range of the RF signal
B. Fewer MCS values in the MCS table
C. Increased amplitude of the RF signal
D. Excessive VSWR
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?
A. Receive sensitivity
B. Channel occupied
C. Airtime utilization
D. Protocols utilized
What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?
A. OWE
B. Kerberos
C. WPA3-Enterprise
D. WPA3-SAE
You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?
A. WPAN
B. IBSS
C. Wireless bridging
D. Access BSS
An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop. What WLAN use case is represented?
A. Ad-hoc
B. WPAN
C. BSS
D. IBSS