You are on page 1of 14

1

Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability
of 802.11 products?
FCC
IEEE
ITU-R
Wi-Fi Alliance
The Wi-Fi Alliance is a global organization that certifies the interoperability of 802.11 products from
different vendors. The FCC is an American agency that regulates communication but does not certify
interoperability of the devices used for wireless network communication. IEEE created the wireless
standards, but does not certify the interoperability of products from different vendors. ITU-R is part of
the International Telecommunication Union and primarily regulates the allocation of the RF spectrum
and satellite orbits.
Observable

Description

Max Value
correctness of response

2 points for Option 4

0 points for any other option

2
Which two roles are typically performed by a wireless router that is used in a home or small business?
(Choose two.)
repeater
access point
WLAN controller
Ethernet switch
RADIUS authentication server
In addition to its roles as router, a typical SOHO wireless router acts as both a wireless access point and
an Ethernet switch. RADIUS authentication is provided by an external server. A WLAN controller is used
in enterprise deployments to manage groups of lightweight access points. A repeater is a device that
enhances an incoming signal and retransmits it.
Observable

Description

Max Value
correctness of response

Option 2 and Option 4 are correct.

1 point for each correct option.


0 points if more options are selected than required.

3
What type of wireless antenna is best suited for providing coverage in large open spaces, such as
hallways or large conference rooms?
omnidirectional
directional
Yagi
dish
Omnidirectional antennas send the radio signals in a 360 degree pattern around the antenna. This
provides coverage to devices situated anywhere around the access point. Dishes, directional, and Yagi
antennas focus the radio signals in a single direction, making them less suitable for covering large, open
areas.
Observable

Description

Max Value
correctness of response

2 points for Option 1

0 points for any other option

4
Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than
previous versions of 802.11 Wi-Fi standards did?
SPS
WPS
MIMO

MITM
Multiple-input multiple-output (MIMO) technology allows 802.11n devices to use multiple antennas in
order to increase the available bandwidth for the wireless network. Single Point Setup (SPS) is a Cisco
technology that makes AP deployment easier by supporting clustering from a single management
interface. Wi-Fi Protected Setup (WPS) is used to simplify connecting clients to secure wireless
networks. Man-in-the-middle (MITM) is a type of security attack where the attacker attempts to insert
themselves into the middle of a data stream.
Observable

Description

Max Value
correctness of response

2 points for Option 3

0 points for any other option

5
What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate
in a corporate environment?
Autonomous APs are used only in the home environment, and they incorporate the functions of
a router, switch, and AP into one device.
Controller-based APs are used in the corporate environment, and they are server-dependent
devices that require an initial configuration to operate.
Cisco corporate APs do not support PoE.
Some corporate AP models can operate in either autonomous mode or controller-based mode.
Autonomous APs are standalone devices that are configured via Cisco CLI or a GUI. Controller-based APs
are server-dependent devices that require no initial configuration to operate, because they are
automatically configured and managed by a WLAN controller. All Cisco corporate APs support PoE.
Observable

Description

Max Value
correctness of response

2 points for Option 4

0 points for any other option

6
Which type of wireless topology is created when two or more Basic Service Sets are interconnected by
Ethernet?
IBISS
BSS
WiFi Direct
ESS
ad hoc WLAN
Wireless devices operate in either ad hoc or infrastructure modes. An ad hoc WLAN, also referred to as
an independent basic service set (IBISS), operates on a peer-to-peer basis without a network.
Infrastructure modes can consist of a single Basic Service Set (BSS) with an AP interconnecting
associated stations, or an Extended Service Set (ESS), with two or more BSSes interconnected over a
wire distribution system such as Ethernet. WiFi Direct is a compatibility certification unrelated to WLAN
topologies.
Observable

Description

Max Value
correctness of response

2 points for Option 4

0 points for any other option

7
Which type of management frame may regularly be broadcast by an AP?
beacon
probe request
authentication
probe response
Beacons are the only management frame that may regularly be broadcast by an AP. Probing,
authentication, and association frames are used only during the association (or reassociation) process.
Observable

Description

Max Value
correctness of response

2 points for Option 1

0 points for any other option

8
Which statement defines the control frame operation between two stations?
A station sends an RTS frame as the first step in a three-way handshake that is required before
sending data frames.
A station responds to an RTS frame with an ACK frame, thus providing permission for the
requesting station to send a data frame.
If the sending station does not receive an ACK frame within a predetermined period of time, the
sending station will drop the connection.
After receiving a data frame, the receiving station will send an ACK frame to the sending station
if no errors are found.
The control frame operation between two stations includes the following steps:
A station sends an RTS frame as the first step in a two-way handshake that is required before sending
data frames;
A station responds to an RTS frame with a CTS frame, providing clearance for the requesting station to
send a data frame;
After receiving a data frame, the receiving station will send an ACK frame to the sending station if no
errors are found;
If the sending station doesn't receive an ACK frame within a predetermined period of time, the
sending station will resend the frame.
Observable

Description

Max Value
correctness of response

2 points for Option 4

0 points for any other option

9
A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the
laptop send to locate and associate with the campus access point?
beacon frame
control frame
data frame
management frame
Wireless routers advertise services using beacon frames on a wireless network. Control frames are used
to control the exchange of data between wireless stations. The data frame carries the actual
information exchanged on a wireless network. Management frames are used to locate, authenticate,
and associate with an access point.
Observable

Description

Max Value
correctness of response

2 points for Option 4

0 points for any other option

10
During which stage of establishing connectivity between a WLAN client and an AP does the client learn
the MAC address of the AP?
discovery
probing
association
encryption
authentication
The three stages of establishing WLAN connectivity are discovery, authentication, and association.
Probing describes the scanning used during discovery. Encryption is an optional part of the
authentication stage. Only after discovering and authenticating to an AP does the client learn the BSSID,
which is the AP MAC address.
Observable

Description

Max Value
correctness of response

2 points for Option 3

0 points for any other option

11
For which discovery mode will an AP generate the most traffic on a WLAN?
passive mode
open mode
mixed mode
active mode
The two discovery modes are passive and active. When operating in passive mode, an AP will generate
more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client
initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and
open mode refers to security parameter settings.
Observable

Description

Max Value
correctness of response

2 points for Option 1

0 points for any other option

12
What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment?
It allows a client to detect whether or not a channel is clear prior to transmission.
It is used in a full-duplex environment to detect collisions.
It is used to send data over a half-duplex connection.
It allows the client to change transmission channels.
Distributed Coordination Function is a collision avoidance mechanism that allows the client to transmit if
the channel is clear. This is used in a CSMA/CA 802.11 WLAN environment where shared media

configurations are half duplex. Clients and APs use the Request to Send (RTS) and Clear to Send (CTS)
control frames to facilitate the actual data transfer.
Observable

Description

Max Value
correctness of response

2 points for Option 1

0 points for any other option

13
What is an advantage of SSID cloaking?
It provides free Internet access in public locations where knowing the SSID is of no concern.
Clients will have to manually identify the SSID to connect to the network.
SSIDs are very difficult to discover because APs do not broadcast them.
It is the best way to secure a wireless network.
SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing
the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be
connected to the network, the SSID can be easily discovered. The best way to secure a wireless network
is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in
public locations, but an open system authentication could be used in that situation.
Observable

Description

Max Value
correctness of response

2 points for Option 2

0 points for any other option

14
If three 802.11b access points need to be deployed in close proximity, which three frequency channels
should be used? (Choose three.)
1

3
5
6
8
11
In order to minimize interference, one of the three non-overlapping channels should be used in 2.4GHz
Wi-Fi networks: 1, 6, or 11.
Observable

Description

Max Value
correctness of response

Option 1, Option 4, and Option 6 are correct.

1 point for each correct option.


0 points if more options are selected than required.

15
Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)
802.11a
802.11b
802.11g
802.11n
802.11ac
802.11b and 802.11g operate in the 2.4GHz range, and 802.11n can operate in either the 2.4GHz or the
5GHz range. 802.11a and 802.11ac operate only in the 5GHz range of frequencies.
Observable

Description

Max Value

correctness of response

Option 2, Option 3, and Option 4 are correct.

1 point for each correct option.


0 points if more options are selected than required.

16
Which security mode is the least secure choice when a home wireless router is configured?
WPA
WPA2
WEP
WPA2-Personal
When a home wireless router is configured, it is recommended to use WPA2/WPA Mixed Personal
security mode. WEP should never be used unless it is the only option available.
Observable

Description

Max Value
correctness of response

2 points for Option 3

0 points for any other option

17
A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the
AP. What can the administrator do to accomplish this?
Upgrade the firmware on the AP.
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Deploy a Wi-Fi Range Extender.
Change to WPA2 authentication.
Improving the range of a wireless network can be achieved by deploying a Wi-Fi Range Extender or
Powerline wireless technology. Splitting the 802.11n wireless traffic between the 2.4 GHz band and the
5 GHz band can be used to improve the performance of the network but not extend its range.
Observable

Description

Max Value
correctness of response

2 points for Option 3

0 points for any other option

18
A company has recently implemented an 802.11n wireless network. Some users are complaining that
the wireless network is too slow. Which solution is the best method to enhance the performance of the
wireless network?
Replace the wireless NICs on the computers that are experiencing slow connections.
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
Disable DHCP on the access point and assign static addresses to the wireless clients.
Upgrade the firmware on the wireless access point.
Because some users are complaining about the network being too slow, the correct option would be to
split the traffic so that there are two networks using different frequencies at the same time. Replacing
the wireless NICs will not necessarily correct the network being slow and it could be expensive for the
company. DHCP versus static addressing should have no impact of the network being slow and it would
be a huge task to have all users assigned static addressing for their wireless connection. Upgrading the
firmware on the wireless access point is always a good idea. However, if some of the users are
experiencing a slow network connection, it is likely that this would not substantially improve network
performance.
Observable

Description

Max Value
correctness of response

2 points for Option 2

0 points for any other option

19
An employee connects wirelessly to the company network using a cell phone. The employee then
configures the cell phone to act as a wireless access point that will allow new employees to connect to
the company network. Which type of security threat best describes this situation?
cracking

denial of service
rogue access point
spoofing
Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue
access point. The employee unknowingly breached the security of the company network by allowing a
user to access the network without connecting through the company access point. Cracking is the
process of obtaining passwords from data stored or transmitted on a network. Denial of service attacks
refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate
access to the server. Spoofing refers to access gained to a network or data by an attacker appearing to
be a legitimate network device or user.
Observable

Description

Max Value
correctness of response

2 points for Option 3

0 points for any other option

20
Fill in the blank. Do not use abbreviations.
Ad hoc wireless topologies sometimes can use a feature called _____________to enable a smartphone
to create a personal hotspot.
A smartphone or tablet with cellular data access can use tethering to create a temporary hotspot
without the services of a WiFi router. Other devices associate and authenticate with the smartphone or
tablet to use the Internet.
Observable

Description

Max Value
correctness of response

Observable 1 receives +1 point if it was answered correctly.

Observable 1 receives +0 points if it was answered incorrectly. 1

You might also like