Select the statement that correctly describes the Wi-Fi Alliance's primary role in the WLAN industry.
A. The Wi-Fi Alliance is a WLAN industry analyst firm that reports market trends and developments.
B. The Wi-Fi Alliance ensures interoperability of band selection and power settings across regulatory domains.
C. The Wi-Fi Alliance creates compliance standards around which vendors can develop products.
D. The Wi-Fi Alliance creates recommended practices by which the IEEE can test and certify product interoperability.
E. The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.
Wi-Fi certified network devices can operate in what frequency band(s)?
A. 2.4 GHz only
B. 900 MHz, 2.4 GHz, and 5 GHz
C. 2.4 GHz and 5 GHz
D. 5.8 GHz only
After installing a wireless client adapter into a laptop computer, what software is required to use the adapter and to configure it to connect to a Wi-Fi network? (Choose 2)
A. Web Browser
B. Client Utility
C. Protocol Analyzer
D. Captive Portal
E. Device Driver
Your customer has asked you to recommend a Wi-Fi solution that includes the following features:
1.
Role Based Access Control
2.
Stateful Firewall
3.
Quality of Service
What device type can perform all of these functions?
A. Wireless Intrusion Prevention System (WIPS)
B. Wireless Network Management System (WNMS)
C. Wireless LAN Controller
D. Wireless Workgroup Bridge
As a general rule, where is the most appropriate location to install a dipole antenna?
A. Near the center of the coverage area
B. At one end of the coverage area facing toward the other side
C. At the perimeter of the coverage area facing inward
D. At the perimeter of the coverage area facing outward
E. Directly below the coverage area
Exhibit:
In what type of Wi-Fi deployment is an antenna mounted using a pole mounting kit, as shown in the exhibit?
A. Indoor Mesh
B. Outdoor Bridging
C. Office space APs
D. Hotel guest access
What two factors are used to calculate the wavelength of an RF wave? (Choose 2)
A. Frequency
B. Speed of light
C. Amplitude
D. Phase
In order to assess your customer's Wi-Fi network needs, you have arranged an initial meeting with your customer's representatives and your systems engineer. So that you can request cooperation and input from all stakeholders, which individuals from your customer's company should you invite to this functional requirements meeting? (Choose 2)
A. Network administrator
B. Wireless end users
C. Director of Human Resources
D. Software engineering manager
E. Facilities manager
What is the most likely cause of low throughput on a hotel's guest network?
A. The 1.5 Mbps Internet connection is creating a bottleneck for the Wi-Fi users.
B. The user's laptop does not have 54 Mbps data rate enabled.
C. The strong security methods used with public access networks often cause low throughput.
D. The user is too close to the servicing access point.
ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is using WEP security with a 128-bit key. You have been asked to provide feedback about the strength of their security. You tell ABC Company that _________.
A. Each currently-used security mechanism is helpful, and the network is secure.
B. MAC filtering will prevent unauthorized access, but SSID hiding and WEP will not.
C. MAC filtering and SSID hiding will prevent unauthorized access, but WEP will not.
D. WEP and SSID hiding will prevent unauthorized access, but MAC filtering will not.
E. Each currently-used security mechanism is weak, and the network is insecure.