A client is operating in an unstable RF environment. Out of five data frames transmitted to the client it only receives four. The client sends a Block Ack to acknowledge the receipt of these four frames but due to frame corruption the Block Ack is not received by the AP. Which frames will be retransmitted'
In what scenario is Open Authentication without encryption not allowed based on the 802.11 standard?
You are troubleshooting problems with DHCP in relation to lightweight APs. They vendor class identifier (VCI) is not specified in the DHCP server. When you contact vendor support, they inform you that it is not necessary.
When is this information true?
Given: Adjacent Channel Interference (ACI) can cause frame corruption and poor performance in WLANs. You are using a protocol analyzer in the attempt to detect ACI.
What should you look for in such a scenario?
During a VHT Transmit Beamforming sounding exchange, the beamformee transmits a Compressed Beamforming frame to the beamformer. What is communicated within this Compressed Beamforming frame?
You have been asked to recommend a solution for protocol capture of 802.11 frames consisting of 3x3:3 802.11ac communications. The requirement specifies that you gain a general view of a coverage area and does not require that you capture from specific user locations. The solution must be the least expensive practical solution possible that does not disrupt user access to the WLAN and it must be based on enterprise WLAN hardware.
What solution would you recommend so that any coverage area could be monitored on demand?
While troubleshooting DHCP issues, you perform a protocol capture in order to determine if the DNCP pool is depleted. The capture does not show DHCPnak messages.
Where else could you look to determine if the pool is depleted?
When configuring a long-term, forensic packet capture and saving all packets to disk which of the following is not a consideration?
You are explaining capacity planning to another engineer assisting you on a WLAN implementation project. As part of the explanation, you provide the following formula: C = B * log2(1 + S/N).
What does this formula define?
Which one of the following is an advantage of using display filters that is not an advantage of capture-time filters?
When using a commercial WLAN protocol analyzer, you notice that it is listing vendor names for some APs and client STAs.
What is the source of this information?
You are creating a baseline configuration for a pool of 100 laptops related to Wi-Fi. The laptops have dual-band 802.11ac adapters. They are configured for aggressive roaming.
What additional setting might you configure to ensure they access the WLAN on the channels with the least interference assuming the enterprise WLAN is well-designed?
What is the default 802.11 authentication method for a STA when using Pre-RSNA?
The PHY layer provides framing by adding a header to create what type of data unit?
You are concerned with management overhead in your WLAN. When evaluating the network, you note that each dual-band AP provides for 4 SSIDs in each band with three secure SSIDs and one Open System SSID. The network runs only 802.11ac APs and uses 20 MHz channels in 2.4 GHz and 400 MHz channels in 5 GHz.
What can you do to reduce the impact of beacon frames on CCI and channel utilization?
Where would you look in a packet trace file to identify the configured Minimum Basic Rate (MBR) of a BSS?
Which one of the following portions of information is communicated by bits in the PHY Header?
In which element of a Beacon frame would you look to identity the current HT protection mode in which an AP is operating?
In the 2.4 GHZ band, what data rate are Probe Requests usually sent at from an unassociated STA?
You are performing 802.3 network analysis. For what are the DA and SA fields used in the frame header?
ABC Company requires the ability to identify and quickly locate rogue devices. ABC has chosen an overlay WIPS solution with Wi-Fi sensors that use dipole antennas to perform this task. No other sensors are included. Use your knowledge of location tracking techniques to answer the question.
Which one of the following location methods is not available in the described system?
The manager in the security group is concerned about compliance with security policies on the WLAN. The budget is not available for a full WIPS SOLUTION. He has asked you to implement a process that will verify compliance.
What would you recommend in such a scenario?
802.11k Neighbor Requests and Neighbor Reports are sent in what type of Management Frames?
You are using the real-time FFT display of a spectrum analyzer.
In what domain does this show the RF energy detected in the swept frequencies?
You must report on frame types seen on the WLAN. You want to list the frame types by both name and binary value.
What frame type is represented by the binary value 011010, which includes the Type and Subtype values?
You are evaluating a protocol capture file in Wireshark. The following filter is applied:
wlan_radio.11ac.bandwidth - - 4
What kind of frames are displayed?