In which plane of the three networking planes is an access point configured by a WLAN controller?
Correct Answer:
B
Reference https://books.google.com.pk/books?id=HQxhBgAAQBAJ&pg=PA343&lpg=PA343&dq=plane+of+the+three+n
What is appended to the end of each 802.11 data frame after the payload?
Correct Answer:
A
In WLAN security, what authentication method always creates Layer 2 dynamic encryption keys?
Correct Answer:
B
Reference https://books.google.com.pk/books?id=0ZWLn57EdpsC&pg=PA142&lpg=PA142&dq=WLAN+security,+what
Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive design software for the task, but the company insists on a pre-deployment site visit.
What task should be performed as part of the pre-deployment visit to prepare for a predictive design?
Correct Answer:
A
You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzer?
Correct Answer:
D
Reference
http://setup-wireless.blogspot.com/2008/11/wireless-hidden-node.html