The OSI model is a 7-layer model for understanding the functions of a communication system. What OSI sublayers are specifically addressed by the IEEE 802.11-2007 standard? (Choose 2)
A. MSDU
B. PPDU
C. PLCP
D. MAC
E. IP
F. 802.1X
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)
802.11 bridge units. 802.1X/EAP will be used for bridge authentication. What device in the bridge implementation acts as the 802.1X Authenticator?
A. The RADIUS server
B. All non-root bridges
C. A designated non-root bridge
D. The root bridge
E. The Ethernet switch
In an 802.11b/g system, what channels are considered non-overlapping? (Choose two)
A. Channels 5 and 10
B. Channels 1 and 5
C. Channels 3 and 7
D. Channels 2 and 8
E. Channels 8 and 11
F. Channels 10 and 13
When planning an access point deployment that utilizes Power over Ethernet (PoE) switches at the network edge, what design decision could adversely affect the operation of 802.3af APs?
A. All ports on the Ethernet switch will be supporting Class 3 PoE powered devices.
B. Some APs are connected to a PoE switch and are also receiving power from an AC outlet.
C. The Ethernet switch's uplink ports are not connected to an 802.3af-compliant core or distribution Ethernet switch.
D. A gigabit Ethernet switch port supporting an 802.11a/g AP auto-negotiates to 100 Mbps.
E. The installation team is not informed that PoE support will reduce the recommended maximum UTP cabling length from 100m to 50m.
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) in IEEE
802.11 WLANs?
A. 802.11a and 11n use six (6) "pilot" subcarriers as a reference for the receiver to detect frequency and phase shifts of the signal.
B. 802.11a/g/n OFDM includes several combinations of modulation and coding to achieve data rates from 1-600 Mbps.
C. With 802.11a OFDM, 16-QAM provides either 48 or 54 Mbps data rates, depending upon coding rates.
D. 802.11n HT-OFDM utilizes 256-QAM, which increases the data rate from 54 Mbps (with 64-QAM) up to 65 Mbps.
E. In 802.11a OFDM, forty-eight (48) subcarriers are used as parallel symbol transmission paths to carry data.
As an RF wave propagates through space, the wave front experiences natural expansion that reduces its signal strength in an area. What term describes the rate at which this expansion happens?
A. MIMO equalization
B. Inverse square law
C. Path spread phenomenon
D. Fresnel zone thinning
E. Ohm's law
In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use?
A. Mode 0: No protection mode (Greenfield)
B. Mode 1: Nonmember protection mode
C. Mode 2: 20 MHz protection mode
D. Mode 3: Non-HT mixed mode
What mechanisms are specified by the IEEE 802.11 standard to attempt to prevent multiple radios from transmitting on the RF medium at a given point in time? (Choose three)
A. Random backoff timer
B. Clear channel assessment
C. Network allocation vector
D. Slot assessment value
E. Collision detection
F. Duty cycle detection
If an 802.11 RF transmission reaches a receiving antenna simultaneously by direct and indirect (reflected) paths, what effect will the reflected signal have on the signal that took the direct line-of- sight path?
A. The direct signal will only be received if the reflected signal is more than 180 degrees out of phase.
B. The direct signal cannot be received if the indirect signal is less than 90 degrees out-of-phase.
C. The signals will be distorted if the indirect signal arrives simultaneously at the receiver, but 90 degrees out-of-phase.
D. If the signals are in-phase, they will combine together, cancel one another out, and create a null.
What statements describe industry practices for communication protocols between WLAN controllers and controller-based APs? (Choose two)
A. All vendors use the same protocol so that APs will interoperate with WLAN controllers from other vendors.
B. Some vendors use proprietary protocols, and some vendors use protocols based on public standards like RFCs.
C. For most vendors, the controller-based APs maintain data and control tunnels with at least two controllers for immediate failover and redundancy.
D. All vendors support at least one L2 or L3 broadcast protocol for controller discovery by controller-based APs.
E. All vendors recommend using L2 (instead of L3) controller discovery and tunneling protocols in large enterprises.