The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using which other 802.11 physical layer specifications (PHYs)?
You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test?
You are troubleshooting a client problem with a 2.4 GHz WLAN connection. The client is experiencing surprisingly low data rates during the work day. You analyze the workspace outside of business hours and detect a strong signal with a typical noise floor at the client location. During working hours, the user works with a laptop in the area and uses an external USB hard drive for continuous data access. The user also states that the laptop works as expected on her home network. The user working approximately 8 feet away from this client experiences no problems.
Based on this information, what is the likely cause of the problem?
What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?
Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?
You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.
What kind of application is described?
In a mesh BSS (MBSS), according to the 802.11 standard, what device connect the mesh to an Ethernet network?
What frame type is used to reserve the wireless medium for the transmission of high data rate frames that may not be understood by all clients connected to the BSS?
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?
What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?
|
PDF + Testing Engine
|
|---|
|
$49.5 |
|
Testing Engine
|
|---|
|
$37.5 |
|
PDF (Q&A)
|
|---|
|
$31.5 |
CWNP Free Exams |
|---|
|