You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?
Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?
You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?
You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?
What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11 networks?
Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to-point WLAN bridge link?
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
What non-standard WLAN solution attempts to give a longer transmission windows to devices with higher data rates then devise with lower data rates?
XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.
As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, should be supported to provide the management frame protection and fast secure roaming security features?
What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?
When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?
A string of characters and digits is entered into an AP a client STA for WPA2 security. The string is 8 characters long. What is this string called?
An RF sigma sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?
You are troubleshooting a client problem with a 2.4 GHz WLAN connection. The client is experiencing surprisingly low data rates during the work day. You analyze the workspace outside of business hours and detect a strong signal with a typical noise floor at the client location. During working hours, the user works with a laptop in the area and uses an external USB hard drive for continuous data access. The user also states that the laptop works as expected on her home network. The user working approximately 8 feet away from this client experiences no problems.
Based on this information, what is the likely cause of the problem?
ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.11X Authenticator?
In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connect the mesh to an Ethernet network?
You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz channels. In a particular BSS, only 40 MHz communications are seen. What is the likely cause of this behavior?
Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results?